Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
The modern science of securing applications to a broad range of devices.
Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.
In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.
Now in 2017, SNIA presents a new survey developed to assess the following details:
1. Who needs to retain long term information
2. What information needs to be retained and for how long
3. If organizations are able to meet their retention needs
4. How long term information is stored, secured and preserved
Join us as we see where we were and where we need to be in the preservation and retention of data.
As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?
During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.
You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?
This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:
• Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.
• Improvements: Planning and processes are improved by incorporating lessons learned.
• Communications: Restoration activities are coordinated with internal and external parties.
To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.
Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
Google and Chef have come together to collaborate to manage the Google Cloud Platform (GCP) natively with Chef. Leveraging the ability of idempotency and Chef you can now declare cloud resources, using Chef, to manage GCP. By combining Chef Automate with GCP, we will show off the ability to programmatically spin up complete cloud infrastructures, without leaving Chef or the need of other tools.
This webinar will show in action the first wave of products supported deploying a complete end-to-end solution into the cloud, from the ground up, straight from Chef.
If you have Chef in your infrastructure or are interested in using Chef, your administrators, auditors, and executives will be interested in viewing this webinar.
Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value
The moment an organization starts making a move to Cloud, the way they look at their security changes as well. A traditional security operation is more focused towards a bunch of solutions such as Firewalls, IDS/IPS, Anti-Malware, etc. Security Operations in the cloud is more about following the pragmatic approach. It is about using effectively the huge set of already available resources in the cloud to effectively harden, monitor and defend cloud infrastructures and applications.
Join Vandana Verma, Manager of Global Information & Application Security, Pegasystems, will discuss creating and managing a successful defensive security program in the cloud. Her talk will be geared towards public cloud infrastructures in AWS.
Cumplir las expectativas de los clientes significa proporcionar un excelente desempeño en las aplicaciones web, móviles y portátiles, lo cual puede ser difícil debido a la complejidad de las aplicaciones modernas.
It's not a secret anymore that cloud facilitates digital transformation and that many companies are happily embracing it - slower or faster, it really depends on the IT infrastructure already in place. What remains a mystery though, is what's next?
BrightTALK has invited experts to discuss what is the cloud of the future and which trends are worth your attention to stay ahead of the game.
We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.
Panel of speakers
Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
Al Huger: VP Engineering - Security, Cisco
The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture - introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
The concept of the container as technology is not new; In recent years it has seen remarkable attention from every industry. The adoption of containers is increasing beyond just stateless conditions such as a load balancer or a web application server. For many adopters of container technology, the persistent storage and data management are the top pain points.
The way how storage is consumed has indeed changed - This talk is to take you through the journey of data storage evolution. You'll understand the challenges in data storage world due to the demand of new way of consuming storage by the container. Specific use cases, the solution of storage in container environments such as Docker Swarm and Kubernetes will be discussed.
Kumar Nachiketa is a data storage consultant in IBM Systems Lab Services, ASEAN based in Singapore. In his 11 years of career, he's been helping customers from various industry solving typical data storage challenges in several ways - deployment, consulting, finding ways to evolve. He is currently focusing on IBM Software Defined Storage and cloud technologies. He has co-authored IBM Redbooks on IBM storage cloud and OpenStack integration with IBM Spectrum Scale.
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
Winner of "Best Overall Value" three years in a row, Agiloft Help Desk is top rated by users and analysts alike. Streamline your operations to close tickets faster, improve consistency, and gain actionable insights. With a customizable end user portal, full workflow engine, dashboard performance metrics, and more. Automate assignments and improve efficiency across your entire organization. Trusted by 3+ million users. Start today and see how Agiloft can work for you.
Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.
Learn how Avi Networks delivers flexible application services beyond load balancing, including:
• Application analytics and visibility
• Predictive autoscaling
• Automation in private data centers or the public cloud.
Up-front design of your cloud environment can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Security by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability across, such as:
- Organizational governance
- Asset inventory and control
- Logical access controls
- Operating system configuration
- Database security
- Applications security configurations
Why this session:
Cloud Computing is becoming the new normal, the question isn’t “if” anymore, it’s really just “how fast can we move?” and “what are we going to move first”
Because of this trend organizations need to understand their security and compliance capabilities and shared responsibilities for security as they migrate resources to the cloud. Whether its clinical trial simulations with Bristol Myers-Squibb, who uses AWS to run clinical trial simulations for 64% less cost; in 1.2 hours vs. 60 hours or Galata Chemicals who are running their development and test workloads in the cloud. Organizations need to start with a “Secure by Design approach, which support security at scale as they increase their use of cloud resources.”
According to Gartner, there are more than 1.7 million potential considerations when deploying an Amazon EC2 instance. While there are likely many options that could work for your organization, cost benefits of the cloud won't be realized without a strategic approach and ongoing management.
In this session, Amiram Shachar, Founder & CEO of Spotinst, will discuss how to find the right balance between On-Demand, Reserved and Spot Instances and considerations for making the right decisions to achieve the proper balance between Cost and Performance. Specifically:
- How it works - what is the Spot market, why should you use it and for what?
- Who’s Afraid of the Spot Market? deep dive with Actual production, mission-critical use-cases
- Predictive and proactive approach to the EC2 Spot Market
Ok, so your data center may not catch on fire (at least we hope not). However, the consequences can be just as dire if critical data is lost, a virtual machine crashes or a portion of your data center becomes unavailable. In an emergency, how confident are you about restoring your company’s data in a timely fashion, especially when every minute of downtime may mean lost revenues from and credibility with your customers. What if your company can’t afford the cost of maintaining a disaster recovery site? How long would it take for you to recover from a site disaster?
Participants will learn:
- How you can leverage the public cloud for cost effective DR for your on-premises infrastructure
- What factors do you need to consider to use the Cloud for DR
- Different approaches to architecting DR in the Cloud, including pilot light, warm standby and hot site.
Business agility and faster speed to market are often primary drivers of enterprise cloud strategies. IT organizations often implement a Cloud Center of Excellence (CCoE) model to streamline operations, but without effective automation these teams can quickly become a bottleneck to the broader business strategy.
In this session, enterprise cloud thought leader Nathan Wallace, CEO & Founder of Turbot, will address how Software-Defined Operations can deliver agility, elevate the business value of the Cloud Center of Excellence, and ensure compliance for your organization.
- The business impact of moving to Software Defined Operations
- How to enable self-service cloud while improving security and compliance.
- How automation allows the CCoE to focus on higher value delivery.
- Benchmarks and KPIs to measure the effectiveness of your automation strategy
About the Speaker
Nathan Wallace is the Founder and CEO of Turbot HQ, Inc. Nathan is recognized as a transformational leader that has enabled some of the World's largest enterprise organizations to make the transition to public cloud. Nathan has recently been profiled by CIO Applications and was a featured guest on the AWS podcast. Prior to starting Turbot, Nathan was the Global Director of Cloud & DevOps for a Fortune 50 Multi-National Pharmaceutical Company.
Creating a Center of Excellence allows organizations to better:
- Leverage the knowledge of diverse stakeholders
- Reduce rework and cost
- Manage change and measure success
However, to efficiently achieve these results organizations must first initiate a cultural shift, co-create a shared vision of the future and align teams around a strategy for communicating and acting moving forward.
In this session, Adam Hoffmann will discuss 5 steps that can be used to innovate a custom organizational action plan, foster a culture of collaboration and establish the role of the Center of Excellence in the organization that it serves.
About the Speaker:
Adam Hoffmann is the Principal Consultant at HelloNimble; a design consultancy in Melbourne, Florida. He is motivated by leveraging collaboration and research to gain human insights, craft stories and inspire actionable steps toward a desired future state.
Adam’s diverse education from both the Art Institute of Portland and the Defense Information School paved the way for him to become a highly regarded program manager. Adam prides himself on fusing process and creativity, helping organizations reframe problems and co-create solutions that result in simple, innovative experiences for both the creator and the consumer.
Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.
Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.
Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.
Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
- Current environment and challenges in building hybrid infrastructures that support traditional and object storage
- Five not-to-be-ignored trends ripe for adoption in 2018
- How compute and storage can mix in the new cloud-enabled world
As digitalization and the Internet of Things (IoT) become commonplace, big data has the potential to transform business processes and reshape entire industries. But antiquated and expensive data storage solutions stand in the way.
A new generation of cloud storage has arrived, bringing breakthrough pricing, performance and simplicity. Cloud Storage 2.0 delivers storage as an inexpensive and plentiful utility, so you no longer have to make difficult decisions about which data to collect, where to store it and how long to retain it. This talk takes a look into how you can cost-effectively store any type of data, for any purpose, for any length of time. Join us to learn about the next great global utility, Cloud Storage 2.0.
-The next biggest cloud storage trends and technologies that are shaping the industry
-How to embrace the era of digital transformation and IoT without breaking the bank
-Best practices for storing, analyzing and utilizing big data
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellonox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
Automated configuration management has been one of the biggest enablers in cloud transformation in the past. By using automated configuration management tools and techniques organizations have been able to provision and configure new environments, servers and applications into use quickly to respond to changed needs. During the past couple of years containers have become an increasingly popular way to deploy applications and services. When applications are deployed using container technologies, what is the role of configuration management? This talk takes a look into configuration management, what is was before and what it is becoming in the new container era.
In this webinar, James Griffin, cloud evangelist at Vodafone, will look at the common reasons organisations find themselves working with multiple clouds, the challenges this creates and how organisations are adapting their approach to get more value from their investment.
He will also cover topics such as:
- Challenges and benefits of multi-cloud environments
- How to manage all the clouds securely, while getting the most out of it.
Security and privacy continue to be the primary concerns for any enterprise considering cloud adoption. Traditional security technologies have failed to keep pace with the rapidly changing cloud architecture resulting in sub-optimal protection for cloud infrastructure.
It is time to look at emerging technologies such as Blockchain & Software Defined Perimeter (SDP) to reclaim cyber security and build robust architectures which are resilient to cyber-attacks.
1. Traditional vs next-gen security architecture
2. Understand Software Defined Perimeter (SDP)
3. Overview of Blockchain enabled cyber security
With more than 16 years of experience in the area of Cyber Security, IT Governance, Risk & Compliance and IT Infrastructure, Narayan is an entrepreneur & an innovative thought leader responsible for strategizing, implementing and maturing Risk Management & Cyber Security.
He has co-founded Block Armour – a blockchain based cyber security product startup. Prior to founding Block Armour, he worked with National Stock Exchange (NSE) as Head – IT Risk & Compliance & CISO.
He has been a visionary and driving force in building NSE’s IT Risk Management strategic plan, roadmap, methodology, policies, organizational model, staffing, governance, and reporting from the ground up.
Narayan is a well-known speaker at various national and international conferences where he shares his passion, views & concerns on Cyber Security.
He is on the advisory board of the Cyber Security Research Institute (UK) and member of several security forums.
With HyperScale Clouds reaching their eleventh year of operation, The Cloud is no longer a semi-autonomous shadow-IT playground, but rather the critical component of any Enterprise Transformation strategy. The fear of cloud failure is no longer the deterrent it once was, and modern strategies dictate a multi-cloud architecture allowing for optimized value and simultaneous risk mitigation. This webinar discusses why there is now widespread adoption of a multi-cloud strategy, and how it helps to achieve several business objectives; namely: optimized ROI, superior security, lower latency and higher throughput, greater autonomy, greater availability and resource optimization. Antonio will also dig into the most current emerging trends of the multi-cloud, including immutable infrastructure and the concurrent tools transformation accompanying this paradigm shift.
In this webinar we will talk about practical steps that will help you:
- Reap the benefits of hybrid cloud by adapting to cloud devops
- Deal with the technical and operational pitfalls involved in migrating to native cloud
- Make the right choices for your cloud architectural to achieve lean devops
According to Pulse, over 84% of Digital Transformation efforts are failing. Companies are worried about how they balance legacy systems while keeping pace with new nimble players in the Cloud Era.
How do you overcome the traditional silos between IT and the business to achieve success in Digital Transformation? What are the challenges politically, technically, and operationally that need to be overcome to turn your cloud vision into transformation reality?
Join our host Jeanne Morain, Author & Cloud/Digital Strategist and her special guests Rahul Ravulur, Founder & CEO, appOrbit and Chris Orlando, Co-Founder & Chief Sales & Marketing Officer, ScaleMatrix, as they explore the top 5 challenges and solutions both they and/or their customers have faced to achieve success in Digital Transformation, both from an IT and a business management perspective.
The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.
We will discuss:
- How agile integration can benefit your organization and make it more responsive to market demands
- Successful agile application integration approaches
- Best practices for implementing an agile application integration environment
The webcast is intended for system architects and application developers.
“Digital transformation” isn’t necessarily a quantum leap in technology or even a linear progression—it’s a change that takes place across a spectrum. In fact, you’re likely already in the midst of some form of it. A recent IDC survey reveals that companies across all sectors are applying connected digital technologies—mobile apps, social networks, cloud services, big data and analytics, etc.—to achieve cost reductions, revenue increases, and service improvements.
Clearly, digital transformation is well underway. The question is, how far along the continuum are you and what does it take to fully realize digital transformation? In “Taking Digital Transformation Beyond the Buzz”, a webinar from Comcast Business, our knowledgeable panelists will discuss how rapid changes in technology and culture have impacted changing infrastructure needs; how mobility, analytics, social media, IoT, and future AI workloads are driving greater digitalization and the need for scalable, agile systems; the need to eliminate siloed environments to enable growth; and the ways to assess where your company is on the path to change.
Our panelists are:
•John Burke, principal research analyst, Nemertes Research. John advises key enterprise and vendor clients, conducts and analyzes primary research, and writes thought-leadership pieces across a wide variety of topics.
•John Keller, director, Product Management Data Center/Cloud Connectivity for Comcast Business. John is responsible for solutions and services focused on enabling customers to leverage multi-tenant data centers and cloud providers through private, direct connections.
Key takeaways include:
•Digital Transformation Drivers and Challenges
•Key Components and Priorities
•Additional Considerations and Tools
Register now for this webinar broadcast on October 18th at Noon EST, today!
As a modern object storage platform, Elastic Cloud Storage (ECS) brings cloud economics and Exabyte scale to your datacenter, thereby drastically lowering the total cost of ownership for your storage. In this session, you will learn about tiering your data to ECS from Dell EMC platforms like Isilon, Data Domain, as well as third party storage platforms to take advantage of modern infrastructure and get more out of your IT investments.
Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
La innovación es una palanca estratégica que se utiliza para hacer crecer el negocio y mantenerlo competitivo. El constante cambio tecnológico requiere estrategias que usen el análisis predictivo; la nueva tecnología que está transformando de forma exitosa la administración de proyectos.
Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.
BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.
For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.
Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
As today’s businesses come under attack from increasingly malicious cyber threats, a traditional “defense in depth” strategy may become insufficient to effectively fend off attackers and prevent business disruptions and downtime. As mobility, IoT, and BYOD open new attack vectors and attacks become more sophisticated, the situation only worsens. While 100% prevention is impossible, rapid identification and containment is not.
In this live webinar, TierPoint Director of Security Product Management, Brian Anderson will discuss why we need to redefine defense in depth approaches to safeguard data from emerging threats.
Join Brian as he shares insight into the following key considerations when developing a better, more comprehensive security strategy:
• The implications of the disappearing network edge.
• Why a traditional “defense in depth” approach, while still a good start, is no longer sufficient
• Keys to rapid identification and containment
• How visibility, detection, escalation, and automated response help close the loop
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
This webinar will show how to set up an ELK (elasticsearch-logstash-kibana) logging stack on top of a Tectonic Kubernetes cluster. These three components work together to provide a solid logging, searching, and visualization of your infrastructure's data logs. We'll split this webinar into 3 segments to teach how to deploy the stack, how to query your log data, and how to integrate the ELK stack with Tectonic's cloud-native tools.
Part I: Deploy the stack
This involves three new components which will be deployed on the cluster: Elasticsearch statefulset, Fluentd daemonset, and Kibana.
Part II: Querying log data
Next, we'll look at how to effectively reference Kubernetes metadata when querying log objects in stored in Elasticsearch, and some common patterns in querying Kubernetes logs and gaining visiblity into various cluster components and/or deployed applications.
Part III: EFK/ELK cluster logging on tectonic
Finally, we will address how to deploy the ELK stack optimally on top of Tectonic.
You've heard about the many ways CloudCheckr can keep your cloud in check! Now you can see CloudCheckr in action, including demos of our 500+ Best Practice Checks, our Cost Savings Reports and Right Sizing tools, and our Security & Compliance features.
In this webinar, you can view and ask questions as Tim Twarog demonstrates popular features of this award-winning platform.
How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.
In this session we'll provide:
-Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
-How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
-Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.