The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Join us for a fast-paced and informative 30-minute webinar in which the Taneja Group will talk with David Bailey about how he was able to store over 10 billion files. We will discuss with David how he was able to design a 10 Billion file storage system, who is using systems of this size, how he tracks the analytics for a system this large and what this means for the datacenter. David works for Qumulo, a leader in “data-aware” storage systems. Data-aware systems have real-time analytics that enable users to instantly obtain information about data and how it is being used. Attendees will be encouraged to submit their questions during the session.
This webinar will go through 10 proven ways to assure your business can be resilient to any sort of downtime event including disaster recovery as a service, instant recovery, recovery assurance, archiving, and other best practices.
Watch this EMC Tech Talk recorded on Thursday, May 21st!
Are you looking to design an in-house infrastructure that delivers the flexibility, and scalability of today’s cloud based IaaS solutions to your end-users while also satisfying the demands of today’s high-performance applications? Would you like to learn about a technology that can help you leverage commodity servers and storage devices to deliver a software defined converged infrastructure solution that can scale to cost-effectively meet your most demanding performance requirements?
By watching you’ll learn the answers to these questions and more as ESG introduces the challenges, technologies and trends associated with delivering scale-out solutions.
Watch this Tech Talk to:
- Get a ScaleIO Overview
-Learn about the lab validation findings with ESG
Cloud computing has broken down traditional geographic borders, and defining data ‘location’ has become more complex. Global enterprises embracing the cloud must deal with the compliance and risk challenges that arise when information is distributed across multiple physical, logical, and legal locations.
Join our guest Holger Mueller, Vice President and Principal Analyst, Constellation Research, and Todd Partridge, Product Marketing Director, as they explore the challenges of information governance in the cloud:
- The critical emerging topic of data sovereignty and jurisdiction
- How governments are responding in different ways to the questions of data privacy and ownership
- What organizations must do to address the varying requirements and regulatory environments
Organizations need to be more business-centric in their approach if data loss prevention is to be successful. By supplying McAfee Data Loss Prevention (DLP) with reliable insight into the meaning and value of data, Classifier complements the detection methods based on keywords and regular expressions alone, helping reduce the risk of data- loss.
The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of DLP decision making, improves system effectiveness and reduces false positives.
In this webinar we will explore:
- The role of user-driven classification
- How user-driven classification benefits DLP
- When to introduce user-driven classification into a DLP project
- How to measure and monitor the benefits of user-driven classification
Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?
Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:
-Top peer challenges, according to leading industry research
-What the future holds for the competing data storage architectures
-The difference between converged and hyper-converged infrastructures
-Best and worst use case for SDS
How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?
The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.
There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.
Attendees will learn:
• The basics of Disaster Recovery and accessibility of your data
• How to extend your DR strategy all the way to the desktop
• DaaS deployment best practices
If you’ve ever felt alone with your data protection frustrations, this webcast will prove you’re not ― and that there are some simple, real-world strategies that’ll make your job a whole lot more enjoyable. We’ve put together a panel of IT professionals from a range of industries ― including a network engineer, an IT director and a CTO ― to share with you what worked for them, and what didn’t, when it comes to data protection. You’ll get to hear about the common struggles they shared and the best practices that empowered them to stop wasting time and energy on slow backup and recovery processes.
By the end of this educational webcast, you’ll be able to:
•Manage the gap between users who expect "always on" and the reality of system downtime.
•Overcome the headache of administrative challenges.
•Modernize your data protection strategy while keeping costs low and meeting requirements.
What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices. Hadoop clusters can use a mix of solid-state and spinning disk storage, while Hadoop compatibility layers and connectors can use enterprise storage systems or share storage between Hadoop and legacy applications.
In this webinar, 451 Research Director Matt Aslett will review the storage options available to Hadoop architects and provide recommendations for each use case. WANdisco's Randy DeFauw will then present an active-active replication option that makes data available across multiple storage systems.
Join us in a series of fast-paced and informative 60-minute webinars on vSphere Virtual Volumes (VVol). In this session, the Taneja Group will talk with David Glynn from Dell Storage. VVols is packaged as a feature in nearly all VMware vSphere Editions and is being embraced by VMware’s storage partners at an unprecedented rate. IT professionals, especially those involved in datacenter operations, are showing great interest in implementing VVol in their own environments. The Taneja Group will discuss VVol technology with David and the impact this game-changing capability will have in the datacenter and how Dell is enabling this technology with their arrays. Attendees will be encouraged to submit their questions during the session.
Is Software Defined Storage (SDS) getting hijacked? It seems every vendor, old and new, is claiming that their storage is “software defined”. The original intent was to create software-only solutions that could be deployed on the customer’s choice of servers. But that original intent has evolved, and now hardware vendors are providing what they claim to be software defined storage solutions too. In addition, SDS is being combined with an embedded compute function to create hyper-converged solutions as well.
In this webinar we will discuss the differences in these approaches and you will learn what the four key deliverables of a SDS solution should be so you can decide which makes the most sense for your organization.
The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.
Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.
Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.
The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.
Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,
The webinar will be led by Ian Beale, Senior Director, CEB Risk
Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
Vous en saurez plus sur :
-Les changements observés dans les techniques d’attaques
-La vitesse d’exécution des nouvelles attaques
-Les cibles privilégiées et les enjeux financiers
-Les tendances à suivre (social media, IoT…)
Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.
It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.
Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
- How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
- Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
- How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.
Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
The power to seamlessly migrate, recover, protect, and deduplicate data - on or off the cloud - without tying your business to specific hardware, networks or protocols.
Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.
Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.
Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.
Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
Following our overview session, Andy Ebbs, discusses how you can overcome these challenges with migrations without business disruption. And, as an example, he demonstrates a full server migration from ESX to Hyper V which takes just 5 minutes using Double-Take Move.
If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
On this webcast we will cover;
•The main security challenges and trends in 2014
•Highlight how threats operate to allow you to better informed
•Key takeaways for executive / functional leaders
ISO 31000 was published as a standard on the 13th of November 2009, and provides a standard on the implementation of risk management. A revised and harmonised ISO/IEC Guide 73 was published at the same time. The purpose of ISO 31000:2009 is to be applicable and adaptable for "any public, private or community enterprise, association, group or individual." Accordingly, the general scope of ISO 31000 - as a family of risk management standards - is not developed for a particular industry group, management system or subject matter field in mind, rather to provide best practice structure and guidance to all operations concerned with risk management.
With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.
In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.
Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.
To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Join John Hudson, Thinking Dimensions, to learn how to:
- Identify the key stakeholders represented in any situation
- Identify the Critical Thinking skills and processes that underlie a successful Root Cause Analysis
- How to successfully prioritise issues every time
- Identify the core issues represented in any situation
What you will take-away:
- An appropriate set of Thinking processes to adopt
- An intuitive and structured set of Questioning techniques
- Structured templates that allow for the timely analysis/filtering of information
- The confidence to adopt the process for your everyday work
Rapidly deploy and dynamically manage secure networks at geographically distributed stores, branch locations, and on the road with Cradlepoint’s Enterprise Cloud Manager. This innovative cloud platform is the next generation management and application platform that helps you improve productivity, increase security and network reliability, and reduce costs; all while enhancing the intelligence of your network and business operations.
The webinar is a cloud presentation and live product demonstration.
Attendees will learn how to:
•Set up and configure groups of devices for “zero-touch” installation and continuous remote management.
•Troubleshoot their network, limit truck rolls, and reduce downtime
•Perform remote diagnostics – status reports, error logs, and alerts
•Easily upgrade firmware on multiple routers at once
•Use next generation Out-of-Band Management through the cloud
•Implement best-in-breed security applications from the cloud
Source code management systems contain the crown jewels of a software company's intellectual property. Effective auditing gives you a picture of who's accessing that IP and when changes are being made. This information can satisfy compliance and security requirements and give you new insights into your development practices. In this webinar we'll explore standard and extended audit reports available for Subversion and Git administrators.
Do you run mission critical applications in the cloud? If the answer is yes, then you already know how important it is to have visibility into all aspects of your infrastructure. An alert telling you your application is down is no longer sufficient. Today’s IT managers need to be made aware of potential problems before they arise.
Join me, Dan Waymire, Sr. Account Manager at HOSTING, for a webinar on May 28th at 3 p.m. EST to learn how Hosting can provide unprecedented visibility into your infrastructure, allowing you to be one step ahead of service impacting events. Leveraging the industry leading ScienceLogic platform, I will cover the following:
•A demonstration of how you can build real-time dashboards showing availability, utilization, and performance of your entire IT infrastructure
•A walk-through of an Executive dashboard showing your leadership team the application availability in real time
•IT manager dashboards capable of showing utilization & performance of web servers, database servers, switches, and firewalls all in a single pane of glass
Problem Management is one of the most useful processes within ITIL as it allows an organisation to identify the underlying issues that generate incidents over and over again and removes them. It supports the change from reactive to proactive and makes customers happy by providing information and a process on those annoying issues that keep coming back to haunt them, and when they can expect to see them gone forever. However, with all this to offer many organisations still struggle to get the funding to implement this process as its seen as a duplication of effort with incident management.
Join Peter Hubbard, Pink Elephant, as he shows you how to set up this process on a part time, unfunded, but effective way. The point is not to say that Problem Management does not need a budget, its to show you how to build up support by doing the basics anyway and showing how much better it could be if the organisation DID fund it properly!
Even though users and application owners are demanding it, the Always-On Data Center seems unrealistic to most IT professionals. Overcoming the cost and complexity of an Always-On environment while delivering consistent results is almost too much to ask. But the reality is that data centers of all sizes can affordably meet this expectation. The Always-On environment requires a holistic approach, counting on a highly virtualized infrastructure, flexible data protection software and purpose built protection storage.
Listen in as experts from Storage Switzerland, Veeam and ExaGrid architect a data availability and protection infrastructure that can meet and even exceed the Always-On expectations of an Always-On organization.
1. The Criticality of Virtualization
2. Availability is more than Backups
3. Disk Backup needs to be production ready
In these days of always-on IT, agile provisioning of processing and networking resources, and mobile systems of interaction and engagement, what is missing from the next generation data center is highly available data. Without careful attention to the design of storage infrastructure and how it fits the current meme of active-passive server clustering for high availability, are businesses realizing the potential of software-defined everything?
Absent a high availability data infrastructure,
- Critical workload and data are at elevated risk
- No meaningful gains are made in the reduction of scheduled downtime
- Storage costs remain high and capacity remains isolated behind proprietary hypervisor software stacks
Stop rearranging deck chairs on the Titanic! Join Jon Toigo of the Data Management Institute and Sushant Rao of DataCore Software as they discuss the problem of data infrastructure availability and what can be done to address it. It will be time well spent for anyone who is endeavoring to realize the dream of agile, available and resilient IT operations.
Hyperscale infrastructure — like that used by Amazon, Google, and Facebook — delivers performance in aggregate and extreme high density — leading to enterprise IT managers incorporating commodity off-the-shelf servers, networking, storage, and a do-it-yourself (DIY) approach.
While the divergence approach is gaining momentum, so too is the opposite convergence trend. The current convergence fashion has several names: hyper-convergence, engineered systems, appliances, and software-defined compute/networking/storage that are shrink-wrapped in hardware.
View this on-demand webinar as industry experts Marc Staimer, President & Chief Dragon Slayer, Dragon Slayer Consulting; Enrico Signoretti, Gigaom Research Analyst; and David A. Chapa, Chief Technology Evangelist for Seagate Cloud Systems and Solutions discuss the pros and cons of DIY versus hyper-converged solutions.. Moderating the discussion will be Caroline McCrory, Sr. Director, Gigaom Research.
Here’s what you’ll learn:
- Compare and contrast the DIY and Hyper-convergence approaches
- Processes and procedures for utilizing either
- Pros and cons of each
- Systematic methodology (including checklists) in determining which approach works best for a given data center, project, department, location, or application workload
Multi-national businesses must have an endpoint backup strategy that goes beyond simple laptop backup and restore capabilities. Organizations with employees in different regions, under different legal jurisdictions, face more complex and complicated challenges to manage and secure data while enabling user productivity. Policies for privacy, security and governance and flexible assignment of regional data storage access are but a couple of unique needs of enterprises that span borders. Join Druva to learn best practices around rolling out a global endpoint backup strategy. Uncover critical points to consider as well as hints and tips to successfully protect laptop and mobile device data using global policy.
Globally, product lifecycles are shrinking. 50% of annual company revenues across a range of industries are derived from new products launched in the past three years. As time for the development and introduction stages of the product lifecycle shrink, maturity and decline stages need to be more flexible and support change. But how does the modern business facilitate this?
Join Stephen O'Donnell as he explores why you should use Hybrid Cloud solutions
to achieve business alignment with product life-cycles, showing that Hybrid Cloud can improve agility, deliver innovation and drive speed.
Every IT consumer is using cloud in one form or another, and just as storage buyers are reluctant to select single vendor for their on-premises IT, they will choose to work with multiple public cloud providers. But this desirable "many vendor" cloud strategy introduces new problems of compatibility and integration. To provide a seamless view of these discrete storage clouds, Software Defined Storage (SDS) can be used to build a bridge between them. This presentation explores how SDS, with its ability to deploy on different hardware and supporting rich automation capabilities, can extend its reach into cloud deployments to support a hybrid data fabric that spans on-premises and public clouds.
Black Friday kicks off the peak-selling season each year. For the 2014 peak season, the National Retail Federation (NRF) reported a 4.1% increase over 2013 to $616.1 billion for retail sales. These sales results were welcome news to the retail industry. For the 2015 peak-selling season NRF predicts 5% uplift from 2014.
Is your network ready for the 2015 peak-selling season?
Join our webinar on June 17th, 2015 at 8:30am PDT/11:30am EDT to learn how to maximize your network infrastructure and management operations to get the most out of the 2015 season.
Attendee will learn how:
•WiFi can offer greater control of the customer experience
•4G LTE failover can keep your network’s busiest days of the year running (because uptime is money)
•Implementing instant networks and new marketing strategies can enable maximum revenue
•Cloud-managed networks reduce costs, complexity and enable PCI Compliance
•Best-in-breed security applications and best practices can keep your networks safe from data breaches.
NPM, NPMD, APM, and AA-NPM – are all different flavors of network performance management varying in focus and features. AA-NPM, which stands for Application-Aware Network Performance Management is the latest generation and most powerful of the NPM tools. Attend this webinar from Emulex and Dynatrace on what AA-NPM is and why you can’t live without it.