Ready for Cloud Storage? Key Considerations & Lessons Learned

Kingman Tang, SNIA; Nathan McBride, IT AMAG Pharmaceuticals; Ajay Chandramouly, IT@Intel; Kipp Bertke, Ohio Dept of Dev. Dis.
Kingman Tang of the SNIA Cloud Storage Initiative will moderate a panel of end-users discussing their experiences with cloud storage. The panel will open with five minutes of data based on a recent research report looking at adoption trends amongst IT shops. It will then dive into a lively panel discussion focused on overcoming barriers to adoption and looking at key considerations for companies weighing pros and cons of the cloud. Audience questions are welcome so invite your team and bring your toughest questions.
Jun 9 2011
58 mins
Ready for Cloud Storage? Key Considerations & Lessons Learned
Join us for this summit:

Webinars and videos

  • Live and recorded (1544)
  • Upcoming (31)
  • Date
  • Rating
  • Views
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Transforming the Data Center with Dell Storage Recorded: Dec 8 2011 45 mins
    When organizations look to streamline datacenter operations, they often discover that acquiring, managing, and maintaining storage can make up nearly 20% of the IT budget. Recognizing the opportunity to reduce that cost, Dell has built a game-changing portfolio of solutions that enable enterprises to better manage data growth, reduce storage costs, and simplify the management of their IT infrastructure. Those solutions are built on the Fluid Data architecture, which automates and optimized business growth and delivers the efficiency, agility and resiliency enterprises need to adapt to an ever-changing business environment. See how several customers, including Dell IT, have leveraged this portfolio to transform their datacenter.
  • Optimize VDI with Fluid Data Storage Recorded: Nov 10 2011 49 mins
    Balancing performance and cost are critical to a successful VDI project. A key component in this effort is architecting an efficient storage infrastructure, which can help reduce storage capacity requirements and simplify provisioning and management. This webinar will highlight recent advances and best practices in optimizing the storage infrastructure specifically for VDI environments.

    Join us to learn how you can:
    •Reduce the required storage footprint for large scale deployment
    •Minimize infrastructure costs
    •Automate data placement across multiple storage tiers for optimal performance and cost efficiency
    •Achieve the best combination of performance and space utilization
  • Architecting Storage Infrastructure for the Private Cloud Recorded: Oct 11 2011 49 mins
    Virtualization and the emergence of private cloud solutions are providing organizations with the computing and infrastructure resources they need more quickly and cost-effectively than ever before. Yet managing these virtual resources presents new challenges for today's IT departments. To overcome these challenges, Dell Storage and VMware have been working together to create infrastructure to enable the private cloud. A central element of that infrastructure is virtualized shared storage. Please join us for an informational webinar where we'll explore questions such as:

    - What is private cloud computing?

    - What are the specific technologies needed to support the private cloud?

    - How do I identify key storage architecture attributes to optimize VMware environments?

    - How can I evolve my current infrastructure toward a private cloud model?

    - How does virtualized shared storage enable private cloud computing?
  • Interoperability Challenges for Virtualization Management Recorded: Sep 8 2011 55 mins
    This session will look at the needs of customers for interoperable virtualization management standards. Virtualization which is an important cloud computing enabling technology, is driving customer requirements for management standards to improve their agility while reducing their TCO. The goal of virtualization management standards is to improve IT consumer agility and define a set of architectural semantics that unify the interoperable management of workloads and resources between enterprises of all sizes and cloud computing infrastructures.
  • Optimizing Storage Tiering & Replication in a VMware Environment Recorded: Sep 8 2011 43 mins
    Server virtualization enhances IT flexibility while reducing costs. Your storage should do the same. Join this session to explore best practices for implementing enterprise storage virtualization in a VMware environment. Understand how to enhance manageability, accelerate provisioning and streamline disaster recovery with the vSphere client plug-in, bundled Site Recovery Manager 5 and support for vCenter server integration. See these technologies in action and get peer feedback on best practices in real-world implementations. The practical advice in this session will help you:

    • Understand best practices for implementing tiered storage in a VMware environment
    • Learn how to leverage thin provisioning to support VDI implementations
    • Learn how to establish automated recovery with storage replication and SRM
  • Four Strategies for Growing Towards the Cloud Recorded: Jun 9 2011 44 mins
    Many IT managers are looking to separate hype from reality when it comes to cloud computing strategy. Often times expert advice for getting to the cloud can be miles above the real-world reality. Follow alongside an expert from Dell Compellent as he outlines the four Fluid Data technologies that will help you optimize your Microsoft environment and expand your virtual architecture towards the cloud.
  • Ready for Cloud Storage? Key Considerations & Lessons Learned Recorded: Jun 9 2011 58 mins
    Kingman Tang of the SNIA Cloud Storage Initiative will moderate a panel of end-users discussing their experiences with cloud storage. The panel will open with five minutes of data based on a recent research report looking at adoption trends amongst IT shops. It will then dive into a lively panel discussion focused on overcoming barriers to adoption and looking at key considerations for companies weighing pros and cons of the cloud. Audience questions are welcome so invite your team and bring your toughest questions.
  • Live Volume Demo Recorded: May 19 2011 21 mins
    Compellent has long been recognized for its best-in-class data movement capabilities. Fluid Data technology moves data within the volume, among different disks and RAID types and between storage arrays. In this demo, Senior Virtualization Product Specialist Josh Raw demonstrates Live Volume, the next generation of the Compellent data movement engine. Learn how Live Volume frees organizations to share volumes between data centers, a key enabler for virtualization and IT clouds.
  • Dell Compellent Storage Center Demo Recorded: May 19 2011 49 mins
    Watch the Dell Compellent Storage Center Demo to learn how we can support the growth and continuity of your business. Our innovative Storage Center offers automated tiered storage, perpetual licensing, and scales on a single platform that will grow with your business. Learn how to manage your data more efficiently while protecting your data against downtown and disaster.
  • Virtual Storage for Virtual Servers Recorded: May 19 2011 40 mins
    The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments.
Fluid Data redefines your data center
Dell delivers an all-in-one enterprise storage array that always puts the right data in the right place at the right time –automatically and continually. By always, we mean in real-time, again and again, automatically placing, storing, optimizing, protecting and dynamically adapting based on granular block-level intelligence and automated data movement. Our Fluid Data technology anticipates how your business will change and dynamically adjusts to optimize the price, performance and protection your organization needs.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ready for Cloud Storage? Key Considerations & Lessons Learned
  • Live at: Jun 9 2011 4:00 pm
  • Presented by: Kingman Tang, SNIA; Nathan McBride, IT AMAG Pharmaceuticals; Ajay Chandramouly, IT@Intel; Kipp Bertke, Ohio Dept of Dev. Dis.
  • From:
Your email has been sent.
or close
You must be logged in to email this