Hi {{ session.user.profile.firstName }}

Cloud Computing

  • Date
  • Rating
  • Views
  • Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?

    This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
  • Modern enterprise archiving is no longer about the long-term storage of data you’re required to keep and serves limited utility to the business. New cloud architectures are transforming what once was simply a means to protect corporate data to a more valuable information resource that helps address corporate compliance and litigation support needs.

    Join analysts from Blue Hill Research for this live event and learn how progressive organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. During this webinar, the panel will review real life use cases and discuss:

    • The risks of decentralized and dispersed enterprise data
    • How unifying data availability and governance is bringing increased utility to organizations
    • Key considerations for designing a modern enterprise archive strategy

    Registrants will receive a complimentary copy of the full Blue Hill Research white paper on the subject.

    David Houlihan researches enterprise risk management, compliance and policy management, and legal technology. He is an experienced advisor in legal and technology fields with a unique understanding of complex information environments and business legal needs. As an attorney, he has held roles in the United States Attorney’s Office and more.
    For more: http://bluehillresearch.com/author/david-houlihan/

    James Haight focuses on analytics and emerging enterprise technologies, including exploring the business case development and solution assessment for data warehousing, data integration, advanced analytics and business intelligence applications.
    For more: http://bluehillresearch.com/author/james-haight/
  • Governments across the globe are proposing and enacting strong data privacy and data protection regulations by mandating frameworks that include noteworthy changes like defining a data breach to include data destruction, adding the right to be forgotten, mandating the practice of breach notifications, and many other new elements. The implications of this and other proposed legislation on how the cloud can be utilized for storing data are significant. Join this live Webcast to hear:

    •EU “directives” vs. “regulation”
    •General data protection regulation summary
    •How personal data has been redefined
    •Substantial financial penalties for non-compliance
    •Impact on data protection in the cloud
    •How to prepare now for impending changes
  • One of today's biggest cloud trends is enterprise adoption of the Microsoft Office 365 suite. There is one wrinkle, though. Your business wants to move quickly to get immediate value, while your security team needs to proceed a little more cautiously to ensure they can govern usage and protect sensitive data. Can organizations move quickly and instrument the proper controls?

    Join Adrian Sanabria, Senior Security Analyst from 451 Research, Shamiana Soderberg, Senior Business Development Manager Cloud Productivity from Microsoft, and Jamie Barnett, CMO of Netskope for a look at safe enablement best practices for Office 365, and the role Cloud Access Security Brokers play in this effort.

    Attendees will come away with the ten real-world requirements that every organization should consider when adopting a sanctioned cloud productivity suite like Office 365. These requirements will address areas like:
    - Granular administrative and user controls across the Office 365 suite
    - DLP for content “at rest” within and “en route” to or from the suite
    - Usage and data governance within the suite and its ecosystem
  • Today’s customers expect fast, personalized service. But how do you meet customer expectations when you’re clicking through multiple screens to find the correct information, manually combining reports and managing a distributed workforce? Cloud integration can help. Register for our webinar to learn which integration tools you should be leveraging to take your customer experience to new heights and give your business a competitive edge.

    In this webinar you’ll learn:
    - The difference between patchwork and seamless integrations
    - Tips to wow customers and streamline your customer service processes
    - Ways to gain a holistic view of your daily operations
    - How to create consistency between your different locations and departments
  • Backup is not the most fashionable of functions within the datacentre but it is one that every organisation faces. Nevertheless many firms, particularly at the mid and larger end of the scale, find it challenging to sustain high performance, service quality and control costs.

    The emergence of cloud infrastructure offerings such as AWS, Microsoft Azure and Private cloud has only increased the appeal of abandoning the traditional labour-intensive, multi-vendor approach in favour of a service-led utility model.

    This raises the question – are you better off continuing with an in-house solution under your control or deploying a cloud service?

    The webinar will explore 5 challenges that need to be addressed by Enterprise customers looking to take advantage of the opportunity Cloud presents.

    You will learn about:

    * The impact on restore
    * Handling bandwidth constraints
    * Delivering to Service levels in the cloud
    * Assessing security and compliance commitments
    * The true costs and the impact of change
  • Hyperscale clouds get all of the press, but is it really a case of “go big or go home”? The giant cloud providers offer great prices on bulk storage but the cloud can act as much more than just a backup destination. There’s a lot of value residing within the individual cloud offerings of the data protection vendors, with an entire spectrum of services ranging from standard backup storage to Managed Archiving to Disaster Recovery as a Service. And more.

    Join us on this panel discussion to learn about what’s available and how to take full advantage of the range of cloud services offered so that you can precisely match vendors’ offerings to your business needs.

    Arun Taneja, Founder & Consulting Analyst; Taneja Group (Moderator)
    Christophe Bertrand, Vice President of Product Marketing; Arcserve
    Austin McChord, CEO & Founder; Datto
    Abhijit Dinkar, CTO, Dell Data Protection; Dell
    Mark Campbell, CTO; Unitrends
  • How we think about and architect network security has stayed fairly constant for quite some time.

    Until we moved to the cloud.

    Things may look the same on the surface, but dig a little deeper and you quickly realize that network security for cloud computing and hybrid networks requires a different mindset, different tools, and a new approach. Hybrid networks complicate management, both in your data center and in the cloud. Each side uses a different basic configuration and security controls, so the challenge is to maintain consistency across both, even though the tools you use – such as your nifty next generation firewall – might not work the same (if at all) in both environments.

    Presented by AlgoSec and Rich Mogull, Analyst and CEO at Securosis, this webinar explains how cloud network security is different, and how to pragmatically manage it for both pure cloud and hybrid cloud networks. We will start with some background material and Cloud Networking 101, then move into cloud network security controls, and specific recommendations on how to use and manage them in a hybrid environment.
  • There are various new ways to perform data protection using the Cloud and many advantages of using the Cloud this way. However, IT managers need to carefully study all the alternative approaches and the experiences of others (good and bad) to avoid the pitfalls, especially during the transition from strictly local resources to cloud resources. In this live Webcast we will discuss:
    •Critical cloud data protection challenges
    •How to use the cloud for data protection
    •Pros and cons of various cloud data protection strategies
    •Experiences of others (good and bad) to avoid common pitfalls
    •Cloud standards in use – and why you need them

    The short presentation will be followed by a panel discussion with audience participation.
  • Web-based companies figured out a way to make high-capacity storage infrastructures using low-cost, commodity hardware. While this concept makes sense for large ‘hyper-scale’ companies, it’s not easily implemented by traditional IT organizations. The Open Storage Platform (OSP) is a model that the industry is using to define the hyper-scalers’ approach and provide a roadmap for building highly scalable, economical storage environments.

    Join the Evaluator Group for this informative webinar to learn about OSP and what it can do for corporate IT. On the webinar we will:

    • Discuss the challenges of implementing hyper-scale infrastructures
    • Describe the Open Storage Platform and how it addresses these challenges
    • Explain how companies can use OSP to deploy their own private clouds

Embed in website or blog