Hi [[ session.user.profile.firstName ]]

451 Research

  • Date
  • Rating
  • Views
  • Not Your Grandmothers Network: What SDN Really Means
    Not Your Grandmothers Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Recorded: Aug 16 2017 46 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • Taming the Big Database Beast
    Taming the Big Database Beast Henry Baltazar, Research Director at 451 Research. Chandra Reddy, Vp of Marketing at Actifio Recorded: Aug 16 2017 56 mins
    Learn how to instantly clone and recover very large databases in the data center or in the cloud.

    The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Recorded: Aug 2 2017 50 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Software Quality at Speed in Agile and DevOps Environments
    Software Quality at Speed in Agile and DevOps Environments Nancy Gohring, Senior Analyst, 451 Research. Dharminder Dewan, Agile QA Manager, Infostretch Recorded: Aug 1 2017 52 mins
    The meteoric rise of software is putting pressure on development teams to iterate faster. It’s no surprise that this trend has resulted in the adoption of new tools and more agile practices, such as DevOps, the impact of which has been to push testing left. Development and DevOps teams are now building in testing earlier in the development cycle, helping to speed delivery of new releases for maximum competitive advantage.

    This new methodology also is shaking up the relationship between testing teams and development teams. In some cases, developers might take on some QA functions, while the QA teams serve as consultants. A free web seminar on August 1st will explore these topics in-depth with expert advice from Nancy Gohring, 451 Research Senior Analyst for Application and Infrastructure Performance, and Dharminder Dewan, Agile QA Manager for Infostretch.

    Join this web seminar to learn how to:

    •Overcome common quality challenges that are faced by most developers
    •Apply “Shift Left” DevOps best practices to achieve the highest quality and fastest time to market
    •Improve group dynamics across DevOps teams to optimize the development life cycle for continuous delivery of quality software at speed.
  • Colocation Connectivity Management
    Colocation Connectivity Management Andy Lawrence, Research VP at 451 Research & Ulrich Schälling, Head of Business Line Networks at FNT Software Recorded: Jul 26 2017 55 mins
    The competitive advantage of MTDC and hosting providers will be determined by their ability to become a provider of services - not just iron. As space and power have been commoditized, being able to differentiate with new business and financial models and new products will mean the difference between success and failure. To succeed in this market, these companies need to provide the right prod-ucts and services to their customers. To compete effectively in today’s hyper-competitive market, they must offer customers new and innovative network connections and connectivity services. To support this strategy the infrastructure management team and network operations managers need to emphasize on standardized infrastructures, efficient change processes and secure maintenance and operation
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • The Economics of Serverless Computing
    The Economics of Serverless Computing Owen Rogers Recorded: Jul 20 2017 32 mins
    Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
  • Better Incident Response, Less Work: Eradicating Tedium, Double Work, and Errors
    Better Incident Response, Less Work: Eradicating Tedium, Double Work, and Errors Duane Kuroda, Group Manager of Adance Tech at Proofpoint. Eric Ogren, Senior Analyst at 451 Research Recorded: Jul 19 2017 58 mins
    Why does it take six months to a year to build out most security orchestration and automation solutions? In contrast, criminals are constantly innovating with new tools and techniques, allowing them to release more than 300,000 new malware samples every day. Leap past alert fatigue and a security skills shortage with tips and best practices to level-up your incident response game.

    Join Eric Ogren and Duane Kuroda in this webinar to discuss how incident response challenges are being met using Proofpoint’s Incident Response Orchestration and Automation solution, Threat Response.

    Is this webinar, you’ll learn about:


    * Potential traps and pitfalls in orchestration and automation
    * Tips for simplifying and accelerating your IR processes
    * How organizations are setting up, launching and benefiting from our IR solution in one day or less
  • Demystifying Attack Simulation: Top 3 Ways to Get More From Your Security
    Demystifying Attack Simulation: Top 3 Ways to Get More From Your Security Dan Cummins, Senior Analyst, 451 Research & Chris Webber, Director of Product Marketing, SafeBreach Recorded: Jul 19 2017 48 mins
    IT security teams are busier than ever, with executives and board members taking a newfound interest thanks to headline-level breaches. With all this scrutiny, validating whether security controls are actually working is key.

    Red teams, white-hat external penetration testers, and internal scanners can provide some assurance, but with attacks and successful breaches continuing to increase, IT must find new ways to stay out of the headlines. If current market spend is any indicator, many enterprises are simply throwing more tools at the problem—but that can just add to security complexity, and open gaps in policy.

    Automated attack simulations can help IT stay ahead of attackers, and break out of the constant buying cycle, by getting more from existing security controls.

    •Extend/enhance red teams and penetration testers
    •Reduce exposure time
    •Verify that existing tools are working as expected

    Join us at 11am ET on July 19th with Dan Cummins, Senior Analyst, 451 Research and Chris Webber, Director of Product Marketing, SafeBreach as they explore breach and attack simulation technology.
  • Pervasive Intelligence: The IoT Computing Continuum
    Pervasive Intelligence: The IoT Computing Continuum Christian Renaud, Research Director, Internet of Things Recorded: Jul 18 2017 49 mins
    Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.

Embed in website or blog