The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.
In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
By the end of this event, you’ll be asking, “what’s next?” In this final session of our virtual summit, Technical Fellow & Managing Director at Microsoft Research, Eric Horvitz, will discuss the next generation of emerging technology, with a particular eye to artificial intelligence.
In this session, you’ll hear about innovative ways start-ups are using emerging technologies. Microsoft’s own Entrepreneur-in-Residence will tell us what’s happening in the start-up world, and two start-up moguls, Kevin O’Brien of GreatHorn and Kristen Smith of littleBits, will tell us how their companies are using emerging tech.
In a constantly-evolving world of technology, it's near impossible to stay up to date with all the new advancements in tech. Whether you're launching a start-up, working for one, or in the planning stages, join us to hear from entrepreneur experts in cyber security, cloud communication, infrastructure, inventions and more!
Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.
Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.
In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.
Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.
In this webinar you will learn:
•How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
•How to protect against advanced modern attacks utilizing real-user browsers
•How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
•Real-world attacks and how organizations use behavioral analysis to prevent them
•How to future-proof your business and your infrastructure
Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices, including solid-state or spinning disk for clusters and enterprise storage for compatibility layers and connectors.
In this webinar, our experts will review the storage options available to Hadoop architects and provide recommendations for each use case, an active-active replication option that makes data available across multiple storage systems.
You’ve heard about all the advantages of using object storage, but how can you get on the fast track and make it a reality? Caringo VP of Marketing Adrian Herrera and Sr. Solutions Engineer John Bell provide an overview of just how to make the jump to object storage so you can lower your overall storage TCO, increase productivity, and eliminate risk with no disruption to current processes or workflows.
How do IT organizations manage data and control costs across paradigms in a way that does not restrict or prohibit portability? How do IT organizations provide consistent core-to-edge insight, capabilities and data services regardless of the location, vendor or platform? As organizations move to Software-Defined Data Centers, new approaches are required to address long-standing challenges, such as the need for interoperability, insight, and common tools. Modernizing existing infrastructure results in IT organizations needing to achieve greater efficiencies, reduced downtime, lower costs, and improved simplicity in a way that only a software-defined approach can deliver.
Addressing These Challenges With A Unique Architecture
-Choose the right storage paradigm
-For the right service-level
-With the right performance and economic benefit
Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.
This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.
Join our upcoming webinar and learn about:
•The importance of workflow for Incidence Response
•How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
•How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
•The integrated incident response process that supports security incident investigation and remediation
•The follow up actions required to close an incident
Ransomware is the number one threat to an organization's data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the title ransomware. Studies indicate that malware infected as many as 70 percent of businesses just this year!
The problem is most of the recommended ransomware protection strategies are not able to protect an organization from this type of attack. In this live webinar join experts from Storage Switzerland and Nexsan as we discuss the five reasons you are not as protected from a ransomware attack as you think you are. More importantly learn how to create rock solid protection from any kind of ransomware attack.
Join Peter McCallum as he hosts several partners and service providers in a roundtable discussion. Hear what is happening in their business, challenges they are facing and successes. If you’re an Enterprise or Service Provider, you’ll want to participate in this conversation and learn how to be a market differentiator, how to create new revenue streams and offer richer services.
The ability to match service-level performance to economic performance results in decisions many enterprise customers and service providers are faced with making today due to the ongoing transformation of storage environments. How do xSPs offer customer monitoring, reporting, and notification at all levels which are isolated to specific tenants, users, and clients? Digitalization and cloud technology have resulted in better economic performance for enterprise customers and service providers.
Don’t miss an exciting hour of candid conversation between colleagues discussing issues important to you and your business. Get some new ideas, learn new things and ask questions to help solve your business needs.
Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
Unstructured data is growing exponentially across all industries; the industry is in a state of transition from a sheer scale-of-data perspective. And now we’ve completely redesigned one of our flagship storage platforms to help you deal with it. Be the first to experience our newest storage platform for large-scale unstructured data.
After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.
While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.
Imagine this scenario: you’re a business leader, and you learn that cyber attackers have compromised your organisation’s systems. Do you have a crisis communication plan in place to ensure the right stakeholders are informed at the right time to reduce impact?
Don’t worry you’re not alone. Although, most organisations plan for crisis communications for other incidents, many are ill-prepared when it comes to communicating with internal and external stakeholders during and after cyber attacks.
Join this webinar, where Vitor De Souza, VP Global Communications at FireEye, will discuss:
•How to create a cyber crisis communication plan
•When should customers be told and how they will be informed
•How and when to respond to media queries
•How to prepare the c-suite
•How the right plan can reduce the impact of a data breach
•Real-life case studies showing the impact of having a cyber crisis management plan in place
Digitalization and cloud technology have resulted in better economic performance for enterprise customers and service providers. Workloads can now be located in proper storage destinations - in the cloud, at a hosted provider or on-premise.
Enterprise customers are not only evaluating the storage destination and type but the appropriate hypervisors and operating systems to match the service levels and economic costs of the workloads they need to support.
FreeStor, on its third iteration in less than 18 months, is 100% focused on delivering high-performance block-based storage services that customers need - at public cloud prices. Customers have been in need of such services but have been unable to achieve this level of service with traditional branded suppliers. FreeStor gives customers total choice to build the right destination, on the right storage paradigm for the right price and service level.
The European Cybersecurity policy - the Network Information Security (NIS) Directive - is about to become the new law that sets security standards for many organisations across Europe.
Recent research carried out by FireEye shows that many organisations are not fully prepared to implement the legislation, which comes into effect in less than two years' time, and it is critical these organisations begin preparing now to be in compliance and not be caught unprepared.
In this webinar, Mandiant’s Nathan Martz, Principal Strategic Consultant for Central Europe, will cover:
-The basics of the European Cybersecurity policy - the Network Information Security (NIS) Directive
-Timeline, key components and possible penalties for noncompliance
-Practical recommendations on compliance and security standards to keep your company prepared
Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
For sites that focus on content distribution, value is often measured by how quickly and easily digital assets are delivered to the audience. Caringo VP of Marketing Adrian Herrera and PM Ryan Meek share how object storage can be used to store and deliver massive amounts of unstructured data including video and images.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, 2016 is the year of ransomware!
Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Get significant security protection with Windows 10! As the most secure Windows ever, Windows 10 offers significant security protection.
With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.
Join this webcast to learn more about the two major new security features that launched with the Anniversary update:
•Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
•Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
Companies have struggled to find their feet when it comes to combining technology, people and workflow in their mobile application development strategies. All too often fragmented technologies have impeded progress. As technologies mature however and mobile (as distinct from pure web development) becomes better understood, there is light at the end of the tunnel. In particular integration across the lifecycle is delivering significant productivity gains for developers and business stakeholders that makes moving from handfuls of apps to a scaled mobile app strategy more of a reality.
Hacktivists are targeting healthcare organizations with cyber-attacks at an alarming rate. Their objective is not just getting data access, it is more about holding your critical data hostage until you pay a ransom. In this webinar, Dell EMC will cover the impact cyber-attacks are having on healthcare organizations, the regulatory ramifications, and how Isolated Recovery helps you protect your organizations from these attacks.
The decision to procure or to subscribe to a new ITSM tool invariably involves a significant investment. Such a purchasing decision should be treated like any other significant business investment, yet experience suggests that with regards to ITSM Tool selection the normal rules of procurement good practice are often not heeded.
Research shows that organisations typically replace their ITSM tools every 3-5 years. This is arguably because organisations suffer a lack of ITSM improvement road maps, which baseline the current state and outline the people, processes and technology resources required to reach the desired state.
The challenge is compounded as the ITSM tools market is increasing crowded, complex and dynamic. In short ITSM tool selection is a complex decision!
Join Eddie Potts, Principal Consultant of Pink Elephant EMEA, as he highlights best practice methods of choosing an ITSM tool as an introduction to the ITSM Tooling Whitepaper being released in mid-November 2016.
Improving the efficiency of existing processes is critical for enterprises, and one of the first proof points of many big data projects. In the long-term enterprises may be looking for big data to generate revenue from new projects and applications, but proving the potential benefits by improving the efficiency of existing business processes – such as optimizing supply chains, or accelerating compliance – is a good place to start. Additionally, operating more efficiently at lower cost and with lower risk enables an organization to redirect budget towards driving growth.
Join Oracle and 451 Research for a webinar exploring how to make this operational efficiency possible through a combination of data management, statistical analysis and visualization.
NVM Express® (NVMe™) is catching fire in the market and after years of incubation, is poised to become a major player in server, storage and networking implementations. In its recently announced NVMe Ecosystem Market Sizing Report, G2M®, Inc. predicts the NVMe market to be more than $57 billion by 2020. Clearly, the NVMe landscape is dynamic, and if you are investigating, planning, designing, introducing, or actively selling NVMe products, you’ll want to attend this webcast to understand the potential of NVMe to disrupt existing IT architectures, support, and spend plans. Webcast topics include:
• Key findings of the industry-first NVMe market report
• Deployment models, use cases and market opportunities for NVMe across enterprise, telco, cloud, IoT and embedded applications
• Key factors that characterize NVMe product segment leaders
Agile IT: it is far easier to say than to implement. But data centers need to make the move to Agile IT so their organizations can survive the digital transformation. At the heart of these efforts are modern DevOps environments that leverage container technology to create applications that are mobile and scale, up or down, as demand requires. The problem is most data centers also have legacy, not containerized, applications that are inflexible and immobile. The combination of a burgeoning DevOps Infrastructure and Legacy Applications is called “bi-modal IT” but it is not ideal.
Join experts from Storage Switzerland and HyperGrid as they discuss new alternatives to bi-modal IT that allow organizations to containerize legacy applications to create a completely agile data center.
Eva Tsai will share her experience as a woman in tech charting a journey spanning multiple disciplines and excelling as a strategic business leader, her thoughts on the challenges women are facing, both in entering and advancing in their careers, and what her recommendations are on both professional and personal fronts.
Eva has extensive experience leading go-to-market transformation and managing company telemetry to drive growth worldwide. Her innovation and leadership has been recognized with significant industry awards and patents. She was selected by Silicon Valley Business Journal in 2015 as one of Silicon Valley's 100 Most Influential Women and won the 2014 Marketer That Matters™ award, sponsored by The Wall Street Journal. At vArmour, Eva has transformed the company into a growth machine via innovative and well-executed go-to-market strategy, insightful telemetry, and process optimization. vArmour has been named a “Company to Watch” by TechCrunch and a "Cool Vendor" by Gartner. Prior to vArmour, Eva held strategic roles at Citrix, BroadVision and Oracle. Eva holds a BS and a MS in Computer Science from Massachusetts Institute of Technology.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
As a cloud platform, OpenStack has storage requirements that are challenging for traditional storage solutions and appliances. As cloud architectures based on OpenStack transition further into mainstream use cases, storage architectures will need to become more flexible and cost efficient for clients to meet customer needs.
Please join us on November 2 at 12 PM EST for a discussion on the storage challenges facing enterprise and service provider customers, and the potential to leverage Software-Defined Storage to make infrastructures more agile and flexible.
Agility is the single most critical competitive factor in today’s business landscape and policy-driven automation is key across a complex, hybrid network.
Cisco ACI is a policy-based network automation solution for accelerating application delivery, reducing operating costs, and gaining greater business agility. Tufin Orchestration Suite is a unified platform for orchestrating application connectivity across the heterogeneous enterprise network, including firewalls, hybrid cloud platforms and now also Cisco ACI.
Join the webinar to:
1. Learn more about the alliance and integration between Cisco and Tufin
2.Review how the integration maximizes agility and compliance for enterprise customers from different industries
3.Focus on the ability to manage application connectivity across the heterogeneous network
Heard of Netflix' Chaos Engineering & the Simian Army? Google's legendary DiRT exercises? Hear about how Twilio is getting started on its journey with Chaos Engineering. This talk is the story of how Twilio got started with Chaos Engineering, lessons learned, and the impact to our engineering culture.
This session is collectively part of PagerDuty Virtual Summit.
Join industry leaders, advocates and practitioners as they discuss the digital transformation ecosystem, address the challenges they see in moving towards a modern IT operations environment, and share successful strategies that lead to achieving digital transformation.
This session is collectively part of PagerDuty Virtual Summit.
Monitoring still largely looks the same as it did 15 years ago: configure a separate system of checks and thresholds and attempt to separate signal from noise in the flood of resulting alerts. Modern environments require a completely new approach to monitoring which puts the service, what the user actually consumes, at the core and an approach which is driven based on observed data, metrics, events and logs, which tell the entire story of service health. Containers can come and go in milliseconds. Cloud environments can dynamically scale with load. Monitoring needs to be dynamic and ever shifting along with the environment. Learn how to implement a monitoring approach with data at the core, and hear about a few organizations who have been successful at doing it.
This session is collectively part of PagerDuty Virtual Summit.
The two key dimensions to incident response are handling the incident as it occurs as well as driving follow up to prevent future issues. An incident response framework can provide structure for both of these two dimensions. Register and explore how to prevent future issues with the framework Dropbox uses.
This session is collectively part of PagerDuty Virtual Summit.