Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • What Your Object Storage Vendor Isn't Telling You About NFS Support What Your Object Storage Vendor Isn't Telling You About NFS Support George Crump, Storage Switzerland Recorded: Aug 23 2016 61 mins
    NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
  • Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro G2M Communications Recorded: Aug 23 2016 53 mins
    The costs of running VMWare have risen to unmaintainable levels for companies that are looking to expand and scale operations. The ESX Tax over burdens IT budgets, hindering their ability to scale and manage OPEX. In this webcast, we will show IT managers how Microsoft Hyper- V and Storage Spaces can be a game changer for their organization, providing a cost effective, stable and easy to manage virtualization platform. LifeStore Bank will tell you how they transitioned from an infrastructure based on VMWare ESX and EMC VNXe to Microsoft Hyper-V and DataON Storage's Cluster-In-Box (CIB) storage to scale their capabilities, optimize service level agreements and lower the cost of running virtual environments by 1.5X


    Howard Lo, VP of Sales, Dataon Storage
    Aidan Finn – Microsoft MVP
    Josh Rountree – IT Manager, LifeStore Bank
    Kris Menon - Business Development Manager, HSGT
    Shaun Walsh – Managing Partner, G2M Communications
  • Connectivity Matters: Understanding EMC's Networking Portfolio Connectivity Matters: Understanding EMC's Networking Portfolio Dee Wassell and Doug Fierro Recorded: Aug 23 2016 25 mins
    By attending this webinar, you will learn about EMC’s industry-leading Storage Networking offering for the Modern Data Center and why connectivity matters in an all flash storage environment.
  • MeetTheCEO: The CEO of Copy Data, Ash Ashutosh MeetTheCEO: The CEO of Copy Data, Ash Ashutosh Charlie Hodges, Storage Switzerland Recorded: Aug 23 2016 51 mins
    Ash Ashutosh with Actifio is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Ashutosh’s background, introduces listeners to Copy Data Management as the next stage in data protection and what makes Actifio’s solution different. We will also ask him about his goals for Actifio and get his predictions for the future of IT. NO REGISTRATION REQUIRED.
  • Hunting for Threats: tips and tricks for SOC experts Hunting for Threats: tips and tricks for SOC experts Matias Bevilacqua, Mandiant Principal Consultant Recorded: Aug 23 2016 49 mins
    Many Security Operation Centers operate in a reactive mode. They primarily respond to alerts that are being presented to them by implemented detection technologies. And we all know alerts are generated in overwhelming volumes, severely crippling SOC’s effectiveness and efficiency. Today’s threat landscape requires SOCs to operate ever more proactively to keep up with the threat actors. More and more SOCs therefor are actively ‘hunting’ for threats that may be residing in the environment they are to defend. ‘Hunting' however requires a different approach from the traditional, reactive mode, not least for the SOC experts themselves.

    Join Matias Bevilacqua, Mandiant Principal Incident Response Consultant, as he discusses tips and tricks for hunting for those lurking threats: what to look for, what tools to use, etc.? You will leave the session with some hands-on material to start turning over stones and uncover threats you never knew were there.
  • Protect Your Applications and Data with Fault Tolerant Software Protect Your Applications and Data with Fault Tolerant Software James Chillingworth, Founder (CEO), The Consulting Practice Inc. Recorded: Aug 18 2016 27 mins
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Arcserve's Triple Play Arcserve's Triple Play Kervin Myrtil, Chris Rockholt, & Gary Sussman Recorded: Aug 18 2016 49 mins
    Cloud, Virtual Physical – The Arcserve Triple Play
    If yours is like most environments today, you have a mix of hardware, software, virtual platforms, as well as cloud platforms supporting different applications with diverse needs.
    As your IT environment has evolved to support cloud, virtual, and legacy, how has your data protection infrastructure kept pace with the changing needs and functionality of today’s data center? And as more and more data is generated, processed, stored and preserved for longer periods of time, what are the additional threat risks you need to protect your data and applications against?
    This webcast looks at the industry trends, issues, and challenges you face as your environment quickly evolves, and helps you determine the best protection strategy and implementation for your environment: The Triple Play.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers Ransomware Realities for Healthcare: Cloud Backup and Security Answers Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent Recorded: Aug 18 2016 49 mins
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Frank Stienhans, CTO at Ocean9 Recorded: Aug 18 2016 49 mins
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol Monitor with Discipline – Protect Your Data Protocol Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Aug 18 2016 36 mins
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Recorded: Aug 18 2016 61 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Kevin Orbaker & Rajinder Gill Recorded: Aug 17 2016 65 mins
    Migration is a process. We have in-depth methodologies, resources, offers and tools to help you move from Oracle to SQL Server quickly and painlessly. Learn 5 steps to migrate from Oracle and unlock value from your data using the cutting edge capabilities of SQL Server.

    Join this session to learn about the 5 steps in migration:
    •Assess your current data systems
    •Develop a Migration Plan
    •Deploy to the new system
    •Validate everything is working properly
    •Cutover from your old system
  • Aligning IT Disaster Recovery with Business Requirements Aligning IT Disaster Recovery with Business Requirements Dustin Mackie, Managing Consultant at Avalution Consulting Recorded: Aug 17 2016 42 mins
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
  • DRaaS Just Got Real! Public Cloud Democratizes Disaster Recovery DRaaS Just Got Real! Public Cloud Democratizes Disaster Recovery Brett Schechter, Product Marketing, Druva Recorded: Aug 17 2016 50 mins
    Have you been looking for cost efficient, highly reliable, infinitely testable DR for years?

    Find out how organizations can now enjoy both low RTO/RPO performance AND low cost due to natively designed cloud solutions and architectures for DRaaS. The costs and complexities of DR for virtualized environments are greatly reduced, when combined with high data durability and global scale of AWS for public cloud.

    Join Brett Schechter from Druva to hear the benefits of a native cloud disaster recovery strategy and the related best practices. Brett will also focus on the attributes that make VMware and AWS the right choice, for a wide range of use cases.

    You'll also learn:
    * The importance of having both a backup and a DR strategy
    * How security is no longer a concern due to two factor encryption
    * How you can combine best of breed cloud and virtualization to save money and man hours
  • Flash Myth: Flash is for Everything vs. Flash is for One Thing Flash Myth: Flash is for Everything vs. Flash is for One Thing George Crump, Storage Switzerland Recorded: Aug 17 2016 62 mins
    Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
  • Managing Media in a ‘Multi-Multi’ Broadcast World Managing Media in a ‘Multi-Multi’ Broadcast World Moderator: Mary Yurkovic - Digital Strategies Inc. Recorded: Aug 17 2016 62 mins
    As broadcast station groups grow larger through consolidation and acquisition, they’re looking for ways to avoid duplicating content and effort while control costs. And it’s not just dealing with the complexity of multi-site operations, it’s multi-source, multi-format content created for multi-platform delivery.

    By creating “hubs” for content, processes and distribution, station groups can deliver the same content to multiple owned-and-operated stations for multiple platforms, while at the same time tailoring or differentiating the content so that it fits the local audiences or regional market they need to target.

    Attend this webinar and learn how to:
    • Intelligently manage media assets brought into your organization from multiple sources
    • Resolve collaboration issues for content development, processing and approvals
    • Automatically process and prepare content for multiple distribution platforms
    • Optimize storage to streamline processes and meet scalability and cost requirements

    Eivind Sandstrand - Arvato
    Amy Lounsbury - Diversified
    Josh Hatter - Diversified
    Karl Paulsen - Diversified
    Dave Frederick - Quantum
  • Retail Networks for the Holiday Season Retail Networks for the Holiday Season Joe Wagner, Solution Engineer, Cradlepoint Recorded: Aug 17 2016 27 mins
    This year on Black Friday and beyond, retailers will use more technology and applications — in a more mobile environment — than ever before. The biggest challenge is keeping all those applications — everything from gift card kiosks and customer WiFi, to Point-of-Sale and inventory devices — always connected and always protected.

    Is your retail network ready to do more and wire less during its peak selling season?

    Join our webinar at 9 a.m. PDT/12 p.m. EDT on Aug. 16, 2016, to learn how retailers large and small are leveraging cloud-managed wired and wireless network solutions to save time, money, and man-hours this holiday season.

    Attendees will learn about:

    — Common network challenges
    — The latest applications in retail
    — The ability of 4G LTE to increase uptime and flexibility
    — Boosting business continuity
    — Benefits of remote cloud management for retail
    — PCI compliance through wireless routing platforms
    — Opportunities in mobile, M2M, and small branch
  • Data Protection in the Era of Hyperconvergence Data Protection in the Era of Hyperconvergence Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam Recorded: Aug 17 2016 61 mins
    Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?

    In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.

    * Cohesity - Patrick Rogers, VP Marketing & Product Management
    * SimpliVity - Jesse St Laurent, VP of Product Strategy
    * Unitrends - Joe Noonan, Director, Software Product Management
    * Veeam - Rick Vanover, Director of Technical Product Marketing
  • SDS Is The Way To Go For Modern Storage SDS Is The Way To Go For Modern Storage Farid Yavari, VP Technology and Peter McCallum, VP Datacenter Solutions Recorded: Aug 17 2016 59 mins
    It’s time to let your storage infrastructure work for you, not the other way around. Lower the cost of storage hardware, modernize existing infrastructure and take less time to manage and monitor one of your company's most valuable assets: data.
    1. Age is GOOD in software
    2. Decoupling controller software from the controller is GOOD
    3. The same challenges in deploying and maintaining software also exist in HW deployments… so why not use the same methods (i.e. devops!)
    4. Drive down storage costs with an integrated, predictive and proactive approach to analytics for an “always-on” storage infrastructure that supports business growth and stability
  • Backup & Recovery and DR for Next Generation Infrastructure Backup & Recovery and DR for Next Generation Infrastructure Nigel Tozer, Director, CommVault Recorded: Aug 17 2016 42 mins
    With many organisations modernising their infrastructure, it’s easy to think that the new systems will be catered for by existing data protection tools, or even that data protection is ‘built in’. In most cases, neither is true. Out of the box these solutions stacks (and others like them) don’t provide the VM and application recovery options and DR that you need in our ‘always on’ world. And if you don’t modernise your backup and recovery processes, you could be missing some game-changing technology.

    Modern approaches to protect data on systems such as FlexPod, flash arrays, converged and hyper-converged systems can provide VM and Application aware protection that can increase your ability to recover critical data, simplify recovery and DR processes and help you leverage cloud without the need for separate tools or cloud gateways. It also allows you to streamline dev and test operations and leverage commodity hardware for secondary storage to reduce your costs.

    The session will cover:

    • Why data protection is important flash and hyper-converged and converged systems

    • The value of modernising: expanding your recovery options

    • Modern Disaster Recovery for your modern infrastructure

    Many organisations have their data protection fragmented between different systems, based on virtual, legacy, cloud and hardware specific tools; choosing modern solutions for your new infrastructure could be the first step to unifying these systems to reduce costs and do more with your data.

    Keywords: Backup, Recovery, Disaster Recovery, DR, FlexPod, SmartStack, FlashStack, converged, software defined, Cisco, Netapp, Nimble, Pure, Cloud
  • Microsoft SQL Series: Running your Mission Critical Line of Business Apps Microsoft SQL Series: Running your Mission Critical Line of Business Apps Ross LoForte & Jimmy May Recorded: Aug 16 2016 57 mins
    In a recent Gartner survey, more than 85% of enterprise respondents indicated that data growth, performance and availability was their largest challenge.

    Join this session to learn how SQL Server can help you run your mission critical line of business applications including:

    •Enterprise performance
    •Security and compliance
    •High availability and disaster recovery
  • A Deeper Dive Into Object Storage A Deeper Dive Into Object Storage Ryan Meek, Product Manager Recorded: Aug 16 2016 44 mins
    Caringo SDK and Integrations Product Manager Ryan Meek talks about the internal workings of object storage and identifies the areas developers should focus when searching for a best-of-breed solution. He will also explain how object storage can be used to provide a cost-effective, scalable and searchable foundation for Big Data, IoT and application development.
  • Modernizing Database Application Data Protection Modernizing Database Application Data Protection Deborah Van Petegem Recorded: Aug 16 2016 30 mins
    The rapid shift in data center technologies enables enterprises to optimize existing IT and legacy investments to free up resources for next generation IT that will transform the business. Hear how EMC helps enterprises drive down costs and optimize traditional database workloads through our latest technologies and innovations with our Data Protection Solutions portfolio.
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Aug 24 2016 3:00 pm UTC 30 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • Next Generation Data Centers – Are you ready for scale? Next Generation Data Centers – Are you ready for scale? Qing Xu, Technology and Applications Manager, Belden; Stephen Worn, CTO, DatacenterDynamics Aug 24 2016 4:00 pm UTC 60 mins
    This presentation will provide a general overview of the data center trends and the ecosystem that comprises of “hyperscale DC”, “MTDC”, and “enterprise DC”.
  • ClearCase to Git ClearCase to Git Doug Robinson Aug 24 2016 5:00 pm UTC 60 mins
    On the surface, ClearCase and Git seem like polar opposites, yet setting architecture aside, they have interesting similarities. A deeper understanding of ClearCase and Git will ease the migration planning process.

    Register for this webinar to learn:
    - How Git and ClearCase differ and how they support some of the same development models
    - Options for moving data into Git with low technical risk
    - How ClearCase MultiSite, ClearCase UCM, and ClearQuest fit into the picture
    - ...and more!
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Aug 24 2016 6:00 pm UTC 60 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • State of Open Source Report State of Open Source Report Adam Bacia, Senior Product Marketing Manager and John Boyle, Community Manager Aug 24 2016 7:00 pm UTC 60 mins
    Join us for a webinar to share the results of the 2016 State of Open Source Software Report. We’ll share insights from IT professionals on the adoption of Open Source software, how open source is being used in monitoring and what’s important to consider when evaluating an open source solution.
  • The Evolution of File The Evolution of File Glen Olsen Product Manager Aug 25 2016 2:00 pm UTC 60 mins
    Over a decade ago, API-accessible key/value-based storage was introduced as a service by Amazon and as software by Caringo. Amazon’s service-based approach matured quickly, while the general storage market slowly adopted the API approach. The on-premise market demanded a traditional file interface, leading to various “gateway” products. However, for the majority of use cases, the logical file gateway architecture is flawed. Is it time for file to evolve with object? This webinar examines the past decade in file interface gateways and the needs of the market versus what is available.
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Aug 25 2016 5:00 pm UTC 60 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Aug 26 2016 12:00 pm UTC 45 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
  • The Cost Shift Model for Video Storage and Data Management The Cost Shift Model for Video Storage and Data Management Brian Morsch, VP of Sales, Surveillance & Security – Americas and Andy Brinck, VP of Channel Sales – Americas Aug 30 2016 4:00 pm UTC 45 mins
    If you are a security integrator then this webinar is for you!

    Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform.

    Join us on Tuesday, August 30 at 9:00 AM PST for The Cost Shift Model
    for Video Storage and Data Management to learn how Quantum is taking a different approach to revolutionize storage solutions within the surveillance and security industry.

    Attend this webinar and learn:
    - How a multi-tier storage approach is shifting the budget spent in the surveillance market
    - How to extend your customers’ surveillance budget
    - How you can offer a scalable storage solution without compromising video quality, retention time, or camera streams

    Quantum can help you design and implement a scalable storage foundation that will enable you to differentiate your offerings in the market.
    Register for this webinar today!
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

     about other available Azure programs
     application development tests on Azure
     what other customers are doing on Azure and how it is paying large dividends
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Arcserve's Battle Royale Arcserve's Battle Royale Gary Sussman, Kervin Myrtil, Chris Rockholt Sep 1 2016 6:00 pm UTC 60 mins
    There is a lot of talk about who's the best in the business. But what do the numbers say? Join us as we take a look in the world of data back up and disaster recovery to see how Arcserve stands up against the competition.
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

     Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

     Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

     Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • Exercising your continuity plan Exercising your continuity plan Barbro Thöyrä MBCI Sep 5 2016 2:00 pm UTC 60 mins
    Exercising is vital in order to keep your continuity plan and staff up-to date.
    We will talk more about why it is important to exercise and what the useful prerequisite are to exercise.
    There are several types of exercises and I will high light some of them and how to conduct an exercise.
  • Best Practices for Running Virtualized Workloads in All-Flash Data Centers Best Practices for Running Virtualized Workloads in All-Flash Data Centers Mike Cooney Sep 6 2016 4:00 pm UTC 60 mins
    This session explores the reasons for one of the quickest revolutions that the storage industry has seen in the last 20 years, and how XtremIO can enable breakthrough capabilities for your server virtualization and private cloud deployments. We through specific use case issues and how to overcome them. With lots of real-world tips and tricks, you can consolidate your most demanding virtualization workloads successfully and gracefully.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Mike Fazio, Product Marketing Manager, DataCore Software Sep 6 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Data Protection 101: Follow and protect your critical data, wherever it lives Data Protection 101: Follow and protect your critical data, wherever it lives Sunil Choudrie, Global Solutions Marketing Manager Sep 7 2016 10:00 am UTC 45 mins
    When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

    Organizations today face the following challenges:
    •Identifying the type of data that needs to be protected
    •Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
    •Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

    Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

    Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
  • Network security, seriously? 2016 Network Penetration Tests Network security, seriously? 2016 Network Penetration Tests Peter Wood Sep 7 2016 10:00 am UTC 45 mins
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Exploring Russia’s Cyber Operations Exploring Russia’s Cyber Operations Dan McWhorter, Chief Intelligence Strategist at FireEye Sep 7 2016 1:00 pm UTC 45 mins
    Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
  • Protection des données:comment gérer & protéger les données,où qu’elles résident Protection des données:comment gérer & protéger les données,où qu’elles résident Hervé Doreau, Directeur Technique – Symantec France Sep 7 2016 1:00 pm UTC 45 mins
    Lorsqu’il s’agit de vos données sensibles, comment pouvez-vous être certain qu’elles sont protégées et qu’aucune ne quitte votre environnement ?

    Les entreprises sont aujourd’hui confrontées aux difficultés suivantes :

    - Identifier le type de données à protéger
    - Contrôler l’accès aux données et garantir la confidentialité des identités, en particulier face aux fortes amendes prévues par la réglementation
    - Empêcher les fuites de données en dehors de l’organisation, les mégafuites et pertes de données s’accroissant d’année en année. 

    En 2015, plus d’un demi-milliard d’enregistrements personnels ont été dérobés ou perdus, et les campagnes de spear-phishing à l’encontre des salariés d’entreprise ont augmenté de 55 %.

    Dans un premier temps, il convient de permettre aux bonnes personnes d’accéder aux données pertinentes, où qu’elles se trouvent, en contrôlant l’accès, en surveillant les flux et en évitant qu’elles tombent entre de mauvaises mains. Vous pouvez alors facilement passer à la seconde étape : appliquer des politiques qui contrôlent l’accès aux données et leur utilisation, que ce soit sur le cloud, les appareils mobiles ou le réseau.

    Assistez à un webinaire Symantec sur les derniers enseignements tirés en matière de protection des données pour l’ensemble des applications qui composent votre environnement.
  • Deep-dive into Linux Based Applications on Microsoft Azure Deep-dive into Linux Based Applications on Microsoft Azure Jose Miguel Parrella, Open Source Product Manager, Microsoft Corporation Sep 7 2016 6:00 pm UTC 60 mins
    As a follow-up to the previous highly rated session, this session will deep dive into all the relevant features of enterprise development pertinent to an open source developer. It’s no surprise that one in three Virtual Machines in Azure run Linux. In fact, over 60% of the images provided by our application partners in Azure Marketplace are Linux-based and chances are you are running applications on top of Linux as well.

    Which applications are a better fit for the cloud, and what are common use cases and patterns for them? How can Azure provide a first-class experience for your Linux-based applications?

    Attend this webcast to discover:

     How Docker, LAMP, Gluster, JBoss, Hadoop and MySQL enterprise-grade applications running on top of Linux can benefit from Azure.

     How Azure offers you a hyper-scale, open and flexible cloud platform that adds value to your existing investments.

     The powerful architectures made possible with Azure Resource Manager and more.
  • Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Sep 8 2016 8:00 am UTC 45 mins
    Quando le comunicazioni condividono dati sensibili, come puoi assicurarti che siano protetti e non filtrino fuori dal tuo ambiente?

    Le aziende oggi devono affrontare le seguenti sfide:

    - Identificare il tipo di dati da proteggere
    - Controllare l’accesso ai dati e garantire la riservatezza delle identità, soprattutto per non esporsi a pesanti sanzioni normative
    - Prevenire le fughe di dati sensibili, considerato che il numero di grandi violazioni e perdite di dati aumenta di anno in anno. 

    Nel 2015, infatti, oltre mezzo miliardo di dati personali sono stati rubati o persi e, nello stesso anno, le campagne di spear phishing contro i dipendenti aziendali sono aumentate del 55%

    Qual è il primo passo? Consentire a specifici utenti di accedere a specifici dati, ovunque siano, monitorando il flusso dei dati per evitare che cadano nelle mani sbagliate. Il secondo: la semplice applicazione di policy per controllare accessi e uso dei dati su cloud, sui dispositivi mobili e/o sulla rete.

    Partecipa al webinar Symantec per sapere come proteggere i dati in molte applicazioni del tuo ambiente.
  • Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Ramsés Gallego - Symantec Strategist Sep 8 2016 9:00 am UTC 45 mins
    Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

    En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

    - Identificar los tipos de datos que se deben proteger.
    - Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
    - Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

    En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

    El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

    Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.