Cloud Storage: Determining Its Worth – Panel Session
With everyone talking about cloud storage, you would think it would be the end-all solution for many organizations wanting a better storage strategy for their infrastructure. However, is it a strategy you should be looking at? Join this panel of storage experts as they jump into the cloud to see when cloud storage is worth it and when it isn't.
This presentation will cover topics such as:
- the definition of cloud storage
- security and legal issues
- management problems by incorporating cloud into your storage strategy
- the future of cloud storage and new technologies
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Analysts have been advising for many years that all businesses are becoming software businesses and one of the key software platforms that organisations invest in to support this is SAP's Enterprise Solutions. With this transformation, the availability of these mission-critical enterprise services increases every day.
During this webinar, you can learn how:
• SAP and SUSE have collaborated for 16 years to make Linux the preferred operating system upon which SAP applications run.
• SUSE can help you unleash the power of Open Source whilst providing the most performant and resilient platform available for your SAP applications
• Highly-Available SAP HANA, the core of SAP's next generation business suite S4/HANA, is ONLY available on SUSE Linux
One of SUSE’s Platinum Partners – Securelinx – who specialise in the deployment, configuration and support of Linux, are sponsoring this webinar.
Hewlett Packard Enterprise Flexible Capacity is a solution that provides Cloud like agility & economics, in the privacy of your own data centre, across Storage, Server and Networking. It enables you to respond to business demands and scale up capacity in minutes, not months and our advanced metering and billing ensures customers are only paying for what they consume.
In this webcast we will discuss:
•How to reduce operational costs: Free up CAPEX – pay for what you consume, whilst aligning IT cost to business demand
•How to reduce risk: Reduce capacity risk, as we ensure you always have enough to respond to business demand & reduce unplanned downtime through tailored proactive support
•How to maximise business agility: Respond to business & market demands in minutes, not months. Reduce Time to Market through easing procurement cycle from months to days
•And finally we will talk you through the solution and show how it has helped meet our customers’ business challenges.
На этом вебинаре вы услышите ответы архитектора облачных решений AWS Дениса Баталова на предварительно присланные вопросы по тематике DevOps – сервисам и лучшим практикам AWS по разработке и обслуживанию программного обеспечения с помощью облака AWS. В частности, приветствуются вопросы по таким AWS сервисам как CloudFormation, Elastic Beanstalk, OpsWorks, а также CodeCommit, CodeDeploy, CodePipeline и EC2 Container Service.
Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
Gli strumenti Command Line Interface (CLI) di AWS forniscono un’interfaccia a riga di commando semplice da utilizzare che permette di creare potenti script di automazione. In questo Webinar, scopirari techiche avanzate che aprono nuovi scenari nell’utilizzo della CLI AWS. Ti mostreremo come filtrare e trasformare le risposte dei servizi via JMESPath, come concatenare script e comandi per ottenere automazioni complesse, ed esplorare le nuove caratteristiche e funzionalità.
IT organizations today are under constant pressure to deliver better services more quickly and with lower cost. Traditional approaches are being rapidly replaced with enabling technologies such as virtualization, software-defined architectures, and cloud computing, introducing more complexity while the relentless growth of data pushes the limits of scalability. As IT undergoes this transformation, backup and recovery services must transform with it, and together can enable a greater transformation for your business.
Join our upcoming webcast to:
•Identify three ways NetBackup 7.7 reduces the complexity of enterprise data protection
•Understand three ways NetBackup 7.7 helps you scale with growth
•Realize three ways in which NetBackup 7.7 can make your organization more agile
•Learn about the latest capabilities added in the 7.7.1 release.
Find out how you can improve enterprise backup and recovery and ultimately move faster and take bigger risks trusting that your information is safe.
Descubra los beneficios de nuestra plataforma EMC Isilon, el líder en arquitecturas Scale-Out Nas que proporciona sencillez, escalabilidad, eficiencia y flexibilidad así como innumerables beneficios a su negocio: elimina las islas de NAS y las migraciones manuales de usuarios y datos, redefine la eficiencia en la administración, hace predecibles las actualizaciones sin agregar complejidad y cuenta con una organización en niveñes automatizada simple y eficaz. Accede ahora al contenido completo.
Cesar Tapias, Isilon Regional Territory Manager de EMC, cuenta con más de 15 años de experiencia en el sector de las tecnologías de la información. Durante su trayectoria profesional ha desarrollado distintos puestos de responsabilidad relacionados con el desarrollo de negocio participando en proyectos estratégicos para la compañía en España. En los últimos 4 años Tapias ha liderado la división de Isilon en España, uno de los pilares de la visión Big Data definida por EMC.
The webcasts are on demand.
Решайте любые задачи с помощью унифицированных гибридных флэш-массивов VNX.Выберите подходящее сочетание цены, производительности и емкости. Вы сможете работать с широчайшим диапазоном смешанных рабочих нагрузок и будете готовы к реализации модели "ИТ как услуга".
¿Necesita actualizar su solución de almacenamiento? Ha llegado el momento de plantearse un enfoque diferente. Acceda a la webcast del programa EMC 4U sobre la familia de almacenamiento EMC VNX diseñada para ofrecer eficiencia y sencillez de almacenamiento y transforme su negocio en cuanto a rendimiento, simplicidad y costes.
Jose Manuel Álvarez, Senior Specialist CTD de EMC España, compañía a la que se unió en 1998 como Implementation Specialist. Cuenta con más de 20 años de experiencia en los mundos de IT de ellos 15, en el mundo de EMC.
The webcasts are on demand.
Seyi Verma, Product Marketing, Druva; Michael Shisko, Director, Information Technology, Hitachi Consulting
Gartner just released their 2015 Critical Capabilities for Enterprise Endpoint Backup report. In this must-read for IT professionals, Gartner notes that endpoint backup has gone beyond simple backup to address broader end-user data protection and governance use cases.
Join us for an overview of the 11 critical capabilities that help you as an IT leaders evaluate enterprise endpoint backup solutions for your organization.
Michael Shisko, Director, Information Technology, at Hitachi Consulting, will provide a practitioner's view at how these capabilities support his organization’s ability to manage and govern sensitive data.
During this webinar, the speakers will discuss:
* Key report findings and recommendations
* New features that go beyond endpoint backup, such as Security, Data Governance, Public Cloud Integration, and Mobile Device Support
* Real-world advice for evaluating solutions for your organization
Find out why Gartner has rated Druva highest overall for Enterprise Endpoint Backup, for the third consecutive time.
Registrants will receive a free copy of the Gartner report.
Dave Minturn, Storage Architect, Intel; J Metz, SNIA Board Member, R&D Engineer, Office of the CTO, Cisco
Non-Volatile Memory Express (NVMe) has piqued the interest of many people in the storage world. Using a robust, efficient, and highly flexible transportation protocol for SSDs, Flash, and future Non-Volatile Memory storage devices, the NVM Express group is working on extending these advantages over a networked Fabric.
This live Webcast will explain not only what NVMe over Fabrics is, but also specifically pay attention to how it works. We’ll be exploring:
•Key terms and concepts
•Differences between NVMe-based fabrics and SCSI-based fabrics
•Practical examples of NVMe over Fabrics solutions
•Important future considerations
Come join us as we discuss the next iteration of NVMe.
Russ Fellows, Senior Partner & Analyst, Evaluator Group
Deploying Solid-State for Virtualized Environments: Use Cases for All Flash, Hybrid and Alternative Storage Implementations
This session is dives into common use cases for all-flash and hybrid storage systems for virtualized environments in mid and large enterprises. Russ will focus on actual deployments, allowing listeners an opportunity to learn how to build a solid business case for solid-state, based upon findings from enterprise firms, as well as hands on performance testing with multiple systems in head to head comparisons, providing practical information.
Review the options and architectures that are best suited for server and desktop virtualization
Understanding of when and where to deploy solid-state storage or hybrid to maximize your IT budget and ROI.
The bottleneck in flash storage is often the interface. SAS/SATA interfaces were designed specifically for hard disk drives not for flash media. For example, flash storage can support many more simultaneous I/O operations. The resolution to the problem is to use a different interface, one that is higher throughput and is more directly accessible from the CPU. Leveraging one of these interfaces and extracting optimal performance from the flash media means leaving the confines of the SCSI protocol with customized proprietary drivers. The result is complexity and slow innovation.
Join Storage Switzerland and OCZ, a Toshiba Group Company, for a live webinar “How NVMe Will Change Flash Storage”. In this webinar we will answer these questions:
- What is NVMe?
- Why is NVMe Flash superior to SAS/SATA SSDs?
- Is NVMe Flash superior to proprietary PCIe flash drives?
- How to get started with NVMe?
Joshua Thomas, Manager, Business Solutions Architecture, Fujitsu Caribbean
For Enterprise Architects, it can be difficult to relink Big Data to business goals since it requires a different way of looking at a business' capability and maturity model. This is particularly true in the Caribbean where traditional data warehousing is very much present, but means for processing and deriving value for unstructured data sources haven't yet fully caught on.
Join Joshua as he speaks on what an EA needs to understand about Big Data in order to capitalize on its capabilities for meeting business goals, without getting caught up in the 'shiny hammer' effect.
Today, cyber attacks are broader, deeper, and more sophisticated than ever before. Criminals view the network’s Edge as a soft target, since the distributed locations frequently process highly sensitive data while often employing weaker security practices. With security at forefront of every distributed enterprise’s consciousness, it’s more important than ever to cultivate a comprehensive solution for network security.
It takes a layered, scalable approach to check all the boxes that IT managers are responsible for — and preparing for the known unknowns — like phishing/spoofing attacks, defending IoT on-ramps, and how to respond using open source security analytics.
Join Cradlepoint Chief Security Officer, Kent Woodruff, a white-hat hacker, to learn about social engineering, spoofing, phishing, and a review of IoT attacks to learn best practices for defending enterprise networks.
SAFEGUARDING THE ENTERPRISE WITH SECURE DATA AS A SERVICE
It seems like every other day another industry leader is caught off-guard by data theft. As data breaches continue to make headlines, commercial and public organizations are seeking solutions to protect sensitive customer data, including health, financial, and identity information.
What are the biggest challenges for organizations in securing sensitive data? What are some things that you can do to mitigate risk?
Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data masking approaches fail. With Delphix, application teams get full, fresh, and secure data sets in just minutes, via self service.
Key challenges organizations face in securing sensitive data
Why traditional approaches to data masking fail
How the combination of virtual data and service-based masking transforms security
Chris Harrold, Global CTO for Big Data, EMC; and Anant Chintamaneni, VP of Products, BlueData
Join this webinar with EMC and BlueData for a discussion on cost-effective, high-performance Hadoop infrastructure for Big Data analytics.
When Hadoop was first introduced to the market 15 years ago, it was designed to work on dedicated servers with direct-attached storage for optimal performance. This was sufficient at the time, but enterprises today need a modern architecture that is easier to manage as your deployment grows.
Find out how you can use shared infrastructure for Hadoop – and separate compute and storage – without impacting performance for data-driven applications. This approach can accelerate your deployment and reduce costs, while laying the foundation for a broader data lake strategy.
Get insights and best practices for your Big Data deployment:
- Learn why data locality for Hadoop is no longer relevant – we’ll debunk this myth.
- Discover how to gain the benefits of shared storage for Hadoop, such as data protection and security.
- Find out how you can eliminate data duplication and run Hadoop analytics without moving your data.
- Get started quickly and easily, leveraging virtualization and container technology to simplify your Hadoop infrastructure.
And more. Don't miss this informative webinar with Big Data experts.
How do YOU choose the ideal data storage solution for your virtual server environment? Do you need Flash/SSD?
This webinar focuses on common questions that data storage buyers ask when they are looking to purchase storage to handle their virtualized server environment and solutions that can increase their productivity while saving on costs.
With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexible and simple and transparent security that while invisible, was highly secure.
Join us for the Nutanix – Vormetric webcast which will discuss the most common infrastructure and security concerns that are draining valuable resources in organizations like yours and how you can stop the bleeding. Join us to learn about the Nutanix Hyperconverged Infrastructure & Vormetric Transparent Encryption.
For fast-growing companies, it is difficult to build an IT infrastructure that meets the needs of today and the future. Faced with the same challenge of rapid growth at MuleSoft, we have deployed MuleSoft to decouple core systems and enable the automation of core business processes.
Hubert Yoshida, CTO, Hitachi Data Systems, Greg Knieriemen, technology evangelist, Hitachi Data Systems, Adrian De Luca, CTO
Innovative technology companies that quickly capitalize on business opportunities and satisfy the demands of today’s empowered consumer have caused a wave of disruption. In 2016, businesses will turn to IT for solutions that will keep them competitive. Chief information officers will invest in faster delivery of applications and analytics, and transform IT by leveraging the third platform, social, mobile, analytics and cloud to reduce infrastructure expenses. Learn how to avoid distractions and remain focused on the IT trends that matter in 2016, as well as gain the knowledge to help accelerate your IT transformation and success.
Ben Wilson, Senior Director, Product Management, Fortinet
Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?
This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
David Houlihan, ESQ, Principal Analyst & James Haight, Analyst, Blue Hill Research; Dave Packer, VP Product Marketing, Druva
Modern enterprise archiving is no longer about the long-term storage of data you’re required to keep and serves limited utility to the business. New cloud architectures are transforming what once was simply a means to protect corporate data to a more valuable information resource that helps address corporate compliance and litigation support needs.
Join analysts from Blue Hill Research for this live event and learn how progressive organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. During this webinar, the panel will review real life use cases and discuss:
• The risks of decentralized and dispersed enterprise data
• How unifying data availability and governance is bringing increased utility to organizations
• Key considerations for designing a modern enterprise archive strategy
Registrants will receive a complimentary copy of the full Blue Hill Research white paper on the subject.
David Houlihan researches enterprise risk management, compliance and policy management, and legal technology. He is an experienced advisor in legal and technology fields with a unique understanding of complex information environments and business legal needs. As an attorney, he has held roles in the United States Attorney’s Office and more.
For more: http://bluehillresearch.com/author/david-houlihan/
James Haight focuses on analytics and emerging enterprise technologies, including exploring the business case development and solution assessment for data warehousing, data integration, advanced analytics and business intelligence applications.
For more: http://bluehillresearch.com/author/james-haight/
Whether adopting Exchange Online, or rolling out Office 365 web or native mobile apps, many organizations are still trying to figure out a deployment and user management strategy that spans the mobile cloud. Learn how VMware Identity Manager can simply federate even the most complex Active Directory environments and then automate the provisioning and licensing of Office 365 accounts while users simply login with their existing credentials. Then learn how to integrate Office 365 for mobile platforms with AirWatch Mobile Management to secure data at rest on iOS, Android and Windows 10 devices.
Join this session to find out more about what's new with the Horizon portfolio of desktop and application virtualization solutions--including Horizon 6, Horizon Air and Horizon Flex and how these products tie into the software defined datacenter-understand how other customers are taking advantage of these technologies and map out a plan for when to deliver these services through a cloud provider and when to manage these on premises.
The retail industry is becoming more complex and changing faster than ever before. Join us as we talk about the latest industry trends and explore how retailers are adopting End User Computing solutions to revamp customer engagement, store operations, employee communication, and security.
The blending of our work and personal lives is a reality for many digital employees. While many organizations continue to maintain strong lines of division, other organizations are struggling to find the right balance of security and privacy. This session will review trends, myths and best practices with our own VMWare in-house privacy council for establishing and communicating Bring-Your-Own policies.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.