The Five Questions WAN Optimization Vendors Don’t Want You to Ask
All WAN Optimization products are not created equal, especially as bandwidth requirements in data center-to-data center connections increase. Finding an effective solution in these environments requires more than simply comparing the features that vendors claim and assuming they’re accurate.
Join George Crump, Lead Analyst at Storage Switzerland and Haseeb Budhani, Chief Product Officer at Infineta and learn the truth about WAN Optimization. In this revealing 45-minute webinar you’ll discover the five questions that WAN optimization vendors hope you won’t ask them:
* Can you scale TCP flows to at least 1Gbps speeds?
* Does a 10Gbps NIC mean 10Gbps of throughput?
* Could your WAN optimization device be doubling the effective application latency?
* Will your WAN optimization solution scale as my network bandwidth grows?
* What happens to data reduction ratios as the network speed increases?
RecordedMay 15 201261 mins
Your place is confirmed, we'll send you email reminders
Any organization that takes a moment to study the data on their primary storage system will quickly realize that the majority (as much as 90 percent) of data that is stored on it has not been accessed for months if not years. Moving this data to a secondary tier of storage could free up massive amount of capacity, eliminating a storage upgrade for years. Making this analysis frequently is called data management, and proper management of data can not only reduce costs it can improve data protection, retention and preservation.
Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.
In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
Ransomware is the number one threat to an organization's data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the title ransomware. Studies indicate that malware infected as many as 70 percent of businesses just this year!
The problem is most of the recommended ransomware protection strategies are not able to protect an organization from this type of attack. In this live webinar join experts from Storage Switzerland and Nexsan as we discuss the five reasons you are not as protected from a ransomware attack as you think you are. More importantly learn how to create rock solid protection from any kind of ransomware attack.
Typical disaster recovery plans leverage backup and or replication to move data out of the primary data center and to a secondary site. Historically the secondary site is another data center the organization maintains. But now organizations look to the cloud to become a secondary site, leveraging the cloud as a backup target and even a place to start their applications in the event of a failure. The problem is this approach merely simulates a legacy design and presents some significant recovery challenges.
Join Storage Switzerland and ClearSky Data for a live webinar to discuss how organizations might be able to re-invent disaster recovery using the cloud.
VMware, NetApp and even EMC are proponents of using NFS based storage systems to support mission critical workloads like virtual machines, databases and performance sensitive unstructured data. But in comparison to mission critical fibre channel, the tools to monitor and optimize your NFS infrastructure are lacking. In this webinar Storage Switzerland and Virtual Instruments will discuss the five challenges facing IT professionals that depend on NFS-based storage infrastructure for performance-intensive workloads. You will learn how to detect and overcome:
If object storage is the future of unstructured data storage, NFS is clearly the present. Object storage vendors realize this and provide NFS support. The problem is most of these vendors leverage a NFS gateway to act as the bridge. Gateways create their own problems however, diminishing the value of the object storage investment. In this ChalkTalk video watch as Storage Switzerland’s George Crump and Caringo's Jonathan Ring discuss the ideal way to address NFS on Object shortfalls.
Software Defined Storage (SDS) is one of the most hyped terms in the industry. It is supposed to break vendor lock-in, allowing the use hardware from any vendor. Yet most data centers buy their storage hardware and storage software from a single vendor. Why? Mostly because software defined storage is answering the questions that IT professionals aren't asking. Join Storage Switzerland Lead Analyst George Crump as he discusses the three lies of SDS:
1. Software Defined Storage breaks vendor lock-in (no it doesn't)
2. Hardware doesn't matter with Software Defined Storage (yes it does)
3. There is a TRUE Software Defined Storage solution (no, there isn't)
NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
Ash Ashutosh with Actifio is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Ashutosh’s background, introduces listeners to Copy Data Management as the next stage in data protection and what makes Actifio’s solution different. We will also ask him about his goals for Actifio and get his predictions for the future of IT. NO REGISTRATION REQUIRED.
Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
Spectra Logic's Nathan Thompson is our guest on this MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. The team will discuss Nathan's new book “Society’s Genome: Genetic Diversity’s Role in Digital Preservation” and how enterprises can overcome the challenge of preserving an organization's knowledge base and evolutionary approaches to safeguarding it forever.
Join us for this live conversation and get your long term data preservation questions answered by our panel of experts.
Most organizations making an investment in NetApp Filers count on the system to store user data and host virtual machine datastores from an environment like VMware. In addition these organizations want their NetApp systems to do more and be the repository for the next wave of unstructured data; data generated by machines. NetApp systems are busting at the seams, so these organizations are trying to decide what to do next.
To help you find out what to do next, join Storage Switzerland and Caringo for our live webinar and learn:
1. What are the modern unstructured data use cases
2. The challenges NetApp faces in addressing its customers’ issues
3. Other solutions; can all-flash or object storage solve these challenges
4. Making the move - how to migrate from NetApp to other systems
5. How to re-purpose, instead of replacing your NetApp
NoSQL databases like Cassandra and Couchbase are quickly becoming key components of the modern IT infrastructure. But this modernization creates new challenges – especially for storage. Storage in the broad sense. In-memory databases perform well when there is enough memory available. However, when data sets get too large and they need to access storage, application performance degrades dramatically. Moreover, even if enough memory is available, persistent client requests can bring the servers to their knees.
Join Storage Switzerland and Plexistor where you will learn:
1. What is Cassandra and Couchbase?
2. Why organizations are adopting them?
3. What are the storage challenges they create?
4. How organizations attempt to workaround these challenges.
5. How to design a solution to these challenges instead of a workaround.
SoftNAS’ Rick Braddy is our guest on the latest MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. Rick is the CEO and CTO and we will discuss his plans for the leading provider of software-defined NAS solutions into the future. Join us to learn about SoftNAS and Rick. No registration required.
Organizations looking to move some or all of their workloads to the cloud will at some point look for a way to provide those applications with basic file services. In this live webinar Storage Switzerland and SoftNAS will lead an in-depth discussion of why organizations need cloud based file services and an analysis of the various file services solutions. In this webinar you will learn:
* Why Cloud Based File Services
* What the Use Cases for Cloud File Services are
* What Cloud File Services Solutions are Available
* The Pros and Cons of the Various Cloud File Services Solutions
In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.
In this webinar you will learn:
1. What Public Cloud Storage Architectures Look Like
2. Why Public Providers Chose These Architectures
3. The Problem With Traditional Data Center File Solutions
4. Bringing Cloud Lessons to Traditional IT
5. The Five Reasons IT can Do it Better
Panzura’s Patrick Harr is our guest on the latest MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. Patrick recently joined Panzura as CEO and we will discuss his plans to lead the company into the future. Join us to learn about Panzura and Patrick. No registration required.
Storage Switzerland - experts on storage, server virtualization, cloud
Tune into Storage Switzerland's channel to learn from this analyst firm focused on storage, virtualization and the cloud. Storage Switzerland’s goal is to provide unbiased evaluations and interview content on sponsoring and non-sponsoring companies through articles, public events and product reviews.
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.
Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.
And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:
- What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
- How your cloud vendor can support you
- What questions auditors typically ask
- How all this impacts your disaster recovery plans as well as your public cloud use
The Internet of Things (IoT) is already a huge deal and it's only going to get bigger
There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.
That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.
Join this webcast to learn how to:
•Conceptualize why you might need a cloud-based hub solution
•Easily set up an IoT Hub in Azure
•Create simulated devices and communicate to your hub
Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.
Join this webcast to learn how integrated PPM solutions:
•Bring increased accountability across agency projects
•Facilitate real-time collaboration between project and program managers and their teams
•Reduce redundancy and manual effort
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.
Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.
Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.
At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
There has always been change in our profession. We originally started by implementing disaster recovery programmes. Soon after that, the businesses realized that the people aspect of recovery was needed as well. The results were the beginning of business continuity programmes. DR and BC have worked together almost two decades now with great success. We are now at a major transformation point again. Business continuity is now sharing more information and interacting more with security and compliance groups.
This session will go over what most of us already have in place, what we will need to add, and how all three groups interface together to provide a new resilience program for your environment. The goal of this session is to show the interactions between risk management, business continuity, security and compliance that form the components of a resilience programme.
58% experienced issues when failing over IT systems! - The State of IT Disaster Recovery in the UK – 2016 Survey
Find out if you’re ahead or behind on IT Disaster Recovery. In a survey commissioned by iland and conducted by Opinion Matters, 250 IT decision makers in the UK were asked about their DR experiences, challenges and strategies. And, we’re sharing the results!
Learn from your peers:
- The frequency of DR testing – how much is enough?
- The impact of IT outages – how disruptive would it be to your business?
- The trade-offs IT leaders make between downtime, cost and security – what trade-offs make sense for you?
Join iland and Zerto as we dig into the survey findings which will be a useful benchmark for your own DR strategies. Don’t miss it.
Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?
Aujourd’hui, les responsables sécurité sont confrontés à :
•un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
•une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
•peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT
Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.