Browse communities
Browse communities
Presenting a webinar?

Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • The Fastest, Easiest Way to Backup and Store Data—so You Can Do More Important Things

    Are you still spending too much time backing up and storing data rather than using that information to drive business innovation? If so, it just might be time to consider an all-in-one backup target appliance (BTA).

    Join us as Seagate appliance experts Anne Haggar and Samuel Nagalingam will help you answer these important questions:

    1. Why are backup target appliances gaining steam in the market?
    2. How do you know if a BTA is right for you?
    3. How can Seagate’s BTA solve the problems you have managing your information and backing up enterprise applications?

    After taking a high-level look at the latest trends in BTA technology, Anne and Samuel will introduce you to the powerful, all-new Seagate Backup Target Appliance—an all-in-one solution that provides an onsite backup point for your most important information, let’s you optionally run the EVault Director Backup and Recovery Software, and allows you to replicate to another BTA or to the cloud.

    Find out how you can protect the information that matters most—wherever it resides—freeing you to use the information to drive innovation.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • File sync has become commonplace in business environments, due in large part to the technology’s ease of use. But despite the potential for file sync to address many of today’s common business challenges, most file sync deployments aren’t used beyond basic file sharing.

    In this BrightTALK exclusive webinar, eFolder explores five unique file sync and share deployments and shares how real organizations such as yours are deploying business-grade file sync solutions to dramatically improve employee productivity and transform their businesses.
  • How can you migrate critical data, applications and servers without the risk of downtime and decreased productivity in the business? This short video shows how you can solve this dilemma - migrating 10s to 1000s of servers with a platform independent solution.
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
  • GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
  • ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • Between rapidly growing data volume and stricter protection requirements, you might be finding that your tape archives are simply too slow to keep up. Fortunately, a solution has emerged: the Virtual Tape Library (VTL).

    Before you choose a VTL, however, it’s vital that you know all the major considerations. See what they are in a live webcast led by acclaimed IT technologist Mel Beckman and Dell’s Marc Mombourquette. Don’t miss out on your chance to hear them demystify VTL technology and explain its inner workings. Sign up today and discover:

    • How VTL works and why it's so good
    • Secrets of reduplication
    • The importance of encryption at rest and key management
    • VTL interconnect technologies
    • Shopping for feeds, speeds, and features
    • Backend archival strategies
    • Real-world solutions
  • The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • What's New at FalconStor!
    True Software Defined Storage.
    How Intelligent Abstraction merges legacy and modern infrastructure for optimized IT processes.
    Rethinking how we provision, protect, and recover data resources, and how that impacts your business.
  • As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services, they are searching for solutions that allow them to quickly identify and isolate noncompliant data sharing and prevent unauthorized access to sensitive information.

    Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze and share documents from a mobile device or a cloud computing platform.

    Learn how:
    •Secrata deployed with McAfee provides a unified file sync and share experience with military-grade security, to address this need.
    •McAfee Enterprise Security Manager enables businesses with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring.
  • Would you ever consider leaving your house for the day without locking your door? Of course not!!
    It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.

    Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.

    In this presentation, Vormetric will demonstrate:
    • How to complete database security, to assure that back door entry is as locked down as the front door
    • How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers
  • Le débat sur l’explosion – voire la prolifération des données – est un sujet pour toutes les entreprises, quelle que soit leur taille. C’est aussi une problématique qui semble sans fin pour tous les services informatiques : quelles solutions apporter à l’augmentation exponentielle de l’information ?
    Il faut mesurer le risque induit par une mauvaise protection pouvant occasionner des violations de données : risque financier bien sûr, impact sur la réputation, mais aussi et surtout, risque juridique. Les entreprises ont en effet soumises à des temps et des termes de conservation de données. Découvrez comment Symantec peut vous aider à mettre en place une bonne gouvernance de l’information dans votre entreprise. Au programme :
    -Qu’est-ce que la gouvernance de l’information?
    -Mettre en place une politique adaptée à votre entreprise
    -Cas concrets : comment répondre aux problématiques business relatifs à la conservation et la gestion des données
  • Learn how Arcserve the Unified Data Protection portfolio delivers comprehensive Assured Recovery™ for virtual and physical environments with a next generation unified architecture and unmatched ease of use.

    This feature-rich solution allows users to seamlessly scale their data protection needs, and allows them to achieve their recovery point and recovery time objectives. Overly complex traditional backup policies are replaced by modern, task-based data protection plans. Deep integration with industry-leading hypervisors enables the automation of complex, repetitive tasks.

    The Arcserve UDP portfolio also includes the UDP7000 Series appliance offering. This unique set and forget solution provides all the power of UDP in an appliance form factor, and is easy to deploy and manage.

    The Arcserve Unified Data Protection portfolio eliminates the need to have multiple data protection vendors.

    It supports heterogeneous environments including:
    •Physical and Virtual Platforms
    •Platform or application or database type
    •On-Premise to Off-Premise (DR site or in the cloud)

    Come join this informative session to learn how to achieve all of this in a simple, unified management console!
  • Rapidly deploy and dynamically manage secure networks at geographically distributed stores, branch locations, and on the road with Cradlepoint’s Enterprise Cloud Manager. This innovative cloud platform is the next generation management and application platform that helps you improve productivity, increase security and network reliability, and reduce costs; all while enhancing the intelligence of your network and business operations.

    Join us for this webinar to learn about the benefits of deploying and managing an intelligent network with Enterprise Cloud Manager. This webinar will include a live product demo.

    Attendees will learn how to:
    •Set up and configure groups of devices for “zero-touch” installation and continuous remote management.
    •Troubleshoot their network, limit truck rolls, and reduce downtime
    •Perform remote diagnostics – status reports, error logs, and alerts
    •Easily upgrade firmware on multiple routers at once
    •Implement best-in-breed security applications from the cloud
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Risk management is an increasingly important
    business driver and stakeholders have become
    much more concerned about risk. Risk may be a
    driver of strategic decisions, it may be a cause of
    uncertainty in the organisation or it may simply be
    embedded in the activities of the organisation. An
    enterprise-wide approach to risk management
    enables an organisation to consider the potential
    impact of all types of risks on all processes,
    activities, stakeholders, products and services.
    Implementing a comprehensive approach will
    result in an organisation benefiting from what is
    often referred to as the ‘upside of risk’.
    The global financial crisis in 2008 demonstrated
    the importance of adequate risk management.
    Since that time, new risk management standards
    have been published, including the international
    standard, ISO 31000 ‘Risk management –
    Principles and guidelines’. This guide draws
    together these developments to provide a
    structured approach to implementing enterprise
    risk management (ERM)
  • Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

    The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:

    • Risk Management
    • Physical Security
    • Emergency Management
    • Cyber Security/ Information Technology

    Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
  • Enterprises of all sizes have started using the public cloud for some workloads. Backup and recovery and archiving are two prime examples of such workloads. But can the public cloud be used as a disaster recovery site? What are the pros and cons of such an approach? What best practices should apply? Is it only for small businesses that do not have a secondary site of their own? Or is there relevance even for larger organizations?

    Panelists:
    Ranga Rajagopalan, Director of Product Management; Symantec
    Mark Campbell, CMO & CTO; Unitrends
    Rick Vanover, Product Strategy Specialist; Veeam
    Joshua Stenhouse, Technology Evangelist; Zerto
  • Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • The growth of unstructured data, especially files, continues unabated and strains datacenter resources. Not just storage of that data, but protecting it, providing for disaster recovery, and making that data available in remote offices for collaboration all wreak havoc on staff and budgets. It’s time for a new approach to NAS that takes advantage of the cloud, while still providing local access and performance in the datacenter.

    Learn about this new generation of NAS that solves the challenges of file data storage, protection and access across the enterprise, costs less to own and manage, and ends the cycle of NAS hardware refreshes forever.
  • It is no secret that we live in a 24/7 world that demands information be always available, always accurate and always secure. In order to meet these demands a comprehensive risk management program must be in place. At the forefront of these efforts are the preventive measures that try to reduce the probability of a disruptive incident occurring. But as has been all too often the case, these protective actions may not be enough. Whether it be the force of nature, the actions of terrorists, the fragility of infrastructures or so many other disruptive events will and do happen.

    Left with the reality that we must prepare for interruptions to occur, the job of the Business Continuity Professional is to minimize the resulting impacts. Creating environments that will provide connectivity, processing and data integrating, more and more organizations are looking toward the clouds. Whether it be to ensure that data can be shared or looking for full automated recovery cloud computing has a possible answer. This presentation will discuss what the cloud is, how it can make organizations more resilient and some of the issues pertaining to its usage.
  • Changing IT needs and complex infrastructures require flexible and dynamic solutions to help you transition your environment. The release of Symantec™ Backup Exec 15 is the perfect time for you to review your backup and recovery infrastructure to meet these changing demands. Whether you are an existing Backup Exec customer or not, now is the time to upgrade to a reliable choice; the leading-edge offering for virtual, physical and cloud platforms.

    Join us to understand how Backup Exec 15 provides the flexibility to protect confidently whatever your platform, technology or application need. Delivering the power to protect your information faster, restore what you need when you need it and the ease the time and burden of “doing backup.
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Next Generation Data Protection Architecture – What You Need to Know Now

    Your expensive, complex, headache-inducing data protection architecture is rapidly becoming obsolete.

    Powerful next generation solutions are entering the market, and they’re empowering small¬ to mid-size businesses to manage their data with the robust technologies once reserved for enterprise.

    Now, easy¬to¬implement physical data protection appliances; emerging, cloud-native appliances; unified data protection and recovery technologies; and all-inclusive licensing make protecting against system disruptions and data loss more efficient and effective than ever.

    Join Bob Spurzem as he discusses how to navigate this new era of data protection. Are you ready?
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • Information is the lifeblood of any business. If the data required to operate and maintain market presence becomes inaccessible, compromised, or worse – unrecoverable, the business impact could be devastating. Learn about the existing and emerging risks to your critical data infrastructure and business operations. What mitigation strategies are available and what considerations do you need to assess? How does the changing landscape for consumption of IT such as cloud, on-premise, and hybrid solutions effect survivability and securitization of your prized assets?
  • Companies operating data center in areas prone to earthquakes need to take a systematic approach to quantifying and mitigating their risk. For several years, Molly managed disaster recovery planning for a large Southern California utility. During her tenure, she commissioned two "seismic audits" of three data centers located in the region. Through these studies, she was able to inform management about the level and probability of the risk of losing the use of all three locations following an earthquake. This presentation will describe the techniques used and the benefits the study brought.
  • As Git gains in popularity and Subversion extends its features for enterprise development, the two often operate side-by-side. This session will outline the benefits of each system (centralized vs. distributed), and how to best support a hybrid deployment.
  • Misconception: Cloud data does not need to be backed up.

    Reality: A survey in 2013 revealed that 32% of businesses running cloud applications reported data loss.

    As a result, many companies are considering adopting cloud-to-cloud backup solutions – but how do you choose the right cloud-to-cloud backup solution? In this BrightTALK exclusive webinar, you’ll learn exactly what features to consider when evaluating a cloud-to-cloud backup solution.
  • Toutes les entreprises sont d’accord pour dire qu’avoir une bonne infrastructure de sauvegarde est essential. En réalité, la plupart de ces infrastrcutures ont du mal à évoluer et à s’adapter à environnements de plus en plus difficiles à gérer et complexifiés par les architectures virtualisées et le cloud hybride.
    Ne rien faire est impossible !
    Découvrez comment exploitez la puissance de vos informations avec les solutions de sauvegarde et de restauration Symantec :
    -en rendant votre entreprise conforme aux futures demandes de la réglementation Européenne sur la Protection des Données ;
    -en standardisant votre information au sein d’une plateforme de sauvegarde unique, pour casser les silos ;
    -en s’adaptant à la taille de votre environnement, avec une performance prédictible ;
    -en offrant à vos utilisateurs des possibilités de self-service ;
    -en modernisant votre infrastructure grâce aux appliances.
  • In today’s economy, companies need to be highly focused on managing costs. Strategies involving far-flung suppliers with single-source, just-in-time contracts and outsourced manufacturing and assembly agreements are aimed at reducing costs and boosting the bottom line. This type of procurement strategy may increase profit margins, but it also significantly raises the risk and potential impact of an unexpected disruption in the supply chain. This is particularly true when little is known about key and critical suppliers and their business continuity plans.

    The most recent port slowdown in the US had global ramifications. Eight months of failed labor talks with longshore workers have brought West Coast port congestion to a breaking point.

    It is no wonder that the results from the most recent BCI/BSI Horizon Scan report showed that Supply chain disruption has risen by 11 places from 16th last year. As a global economy with so many interrelated processes, it is imperative that we evaluate and address third party risk with the utmost urgency in order to find a way to mitigate and manage them.

    Approaches to addressing risk can vary greatly with what types of risk are considered acceptable along with the methods chosen to mitigate and minimize potential impacts. Assessing critical suppliers as well as those downstream Tier 2 and Tier 3 providers is a critical part of doing business in a globalized marketplace. Objective evidence of compliance, such as certification to international business continuity standards like ISO 22301, as well as updating supplier information on a regular basis is quickly becoming part of the initial screening process for choosing suppliers and maintaining a level of confidence and transparency.

    Join us as we discuss best practice business solutions.
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • The road to data center efficiency is paved with good intentions…but littered with unintended consequences. In this presentation, Chris Crosby will discuss how the industry-wide drive to increase data center efficiency by data center operators, end users, IT equipment manufacturers and others can ironically lead to major inefficiencies and dysfunction that go directly against the objects of these efforts. Crosby will discuss how high-density server architecture, government regulations, virtualization and other efficiency-minded initiatives are resulting in unexpected challenges and negative results. Crosby will also talk through approaches to achieving data center efficiency that avoid these unintended consequences.
  • For years vendors have been trying to drive down the cost of flash so that the all-flash data center can become reality. The problem is that even the rapidly declining price of flash storage can’t keep pace with the rapidly declining price of hard disk. As a result data that does not need to be on flash storage has to be stored on something less expensive. But does that less expensive storage need to be another hard disk array or could it be stored in the cloud?

    In this webinar join Storage Switzerland’s founder George Crump and Avere Systems CEO, Ron Bianchini for an interactive webinar Using the Cloud to Create an All-Flash Data Center.

    In this webinar you will learn:

    1. The Challenges to Building an All-Flash Data Center

    2. The Challenges to using On-Premise Hybrid Arrays

    3. The Cloud Answer

    4. The Three Steps to a truly All-Flash Future

    A. Identifying Data

    B. Designing The Right Infrastructure

    C. Implementing That Infrastructure

    Register today to learn how you can create an all-flash data center today, and be able to afford it. As always, we will leave plenty of time for an extensive Q&A session, so tune in to get your flash and cloud storage questions answered by our panel of storage experts. All registrants will also be able to access Storage Switzerland’s extensive library of on-demand webinars, many with exclusive white papers, without having to re-register.

    Special Offer: All pre-registrants for this webinar will receive a copy of Storage Switzerland's latest white paper "How Cloud can enable the All-Flash Data Center" emailed after they register.
  • How often have you heard, “We don’t need a Business Continuity Plan because Everyone Can WFH (Work From Home)!” How many times has this oft-quoted bromide been an excuse for lack of proper planning? How many times has this strategy been proven to be inadequate? Who will be the next organization to learn the hard way? Will it be yours?
    In this discussion you will learn:
    · The common myths about working remotely

    · The pitfalls and problems you will encounter

    · Why WFH is an essential but not complete solution

    · Lessons learned from practice – and actual – mass Work From Home events

    · How to strengthen your WFH strategy and mitigate the shortcomings