Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Improve application response times with Software-defined Storage?
    Improve application response times with Software-defined Storage? Sushant Rao,Sr. Director of Product Marketing, DataCore & Bill Hansen, Sr. Product Manager & Product Planner, Lenovo Recorded: Sep 26 2017 31 mins
    Surveys show that 61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. Companies are desperately trying to improve their I/O performance to speed-up applications and increase VM density.

    The most common performance measurement is IOPS, but is this the best metric?

    IOPS depends on a number of variables, including the type of workload being simulated, read/write percentages, sequent/random percentages and block size. Most importantly, IOPS doesn’t indicate the response time.

    In this webinar, we’ll discuss better ways to measure response times as I/O increases. These metrics will help you understand why some storage products can claim high number of IOPS but still perform poorly when they are used for critical applications in production.

    We will also show how a software-defined storage appliance (the Lenovo DX8200D Powered by DataCore) can speed up your applications.
  • HPC Comes of Age: Handling Large Data Sets with Object Storage
    HPC Comes of Age: Handling Large Data Sets with Object Storage Glen Olsen, Product Manager Recorded: Sep 26 2017 61 mins
    High-Performance Computing (HPC) has come of age, and object storage is a key enabler as we have access to larger and larger data sets. Join Caringo Product Manager Glen Olsen to learn how object storage can be used to manage massive pools of data and how Caringo's multi-protocol ingest capabilities, elimination of storage silos and advanced search capabilities are enabling organizations in the 21st century.
  • Cloud Object Storage and the Use of Gateways
    Cloud Object Storage and the Use of Gateways Dan Albright, Cloud Object Storage Program Manager, IBM, Alex McDonald, SNIA Cloud Storage Chair, NetApp Recorded: Sep 26 2017 43 mins
    The use of cloud object storage is ramping up sharply, especially in the public cloud, to reduce capital budgets and operating expenses. However, enterprises are challenged with legacy applications that do not support standard protocols to move data to and from the cloud.

    Enterprises have developed strategies specific to the public cloud for Data Protection, Archive, Application development, DevOps, Big Data Analytics and Cognitive Artificial Intelligence. However, these same organizations have legacy applications and infrastructure that are not cloud friendly.

    Object storage is a secure, simple, scalable, and cost-effective means of managing the explosive growth of unstructured data enterprises generate every day. Gateways enable SMB and NFS data transfers to be converted to Amazon’s S3 protocol while optimizing data with deduplication and providing QoS efficiency on the data path to the cloud.

    This webcast will highlight the market trends toward the adoption of object storage and the use of gateways to execute a cloud strategy, the benefits of object storage when gateways are deployed, and the use cases that are best suited to leverage this solution.

    Join this webcast to learn:
    •The benefits of object storage when gateways are deployed
    •Primary use cases for using object storage and gateways in private, public or hybrid cloud
    •How gateways can help achieve the goals of your cloud strategy without
    retooling your on-premise infrastructure and applications
  • Making the Digital Transformation a Reality
    Making the Digital Transformation a Reality Laura DuBois, IDC & Ashvin Naik, Dell EMC Recorded: Sep 26 2017 57 mins
    Making Digital transformation real is a tough challenge for most businesses. A successful strategy is to start with a data platform that simplifies data collection, consolidation, protection and preservation which further drives insights, and services at scale. Laura Dubois, Group Vice President of Storage, Servers, and Infrastructure at IDC joins us to discuss why organizations should be prioritizing the data platform as they embark on their digital transformation journey.
    In this webinar you will learn about industry trends that are reshaping how IT is used as a strategic asset extracting the value of your data effectively. You will also learn about how Elastic Cloud Storage (ECS) can build on insights to modernize and build cloud native applications accelerating your move to the third platform and beyond.
  • Hitting Your Data Protection Sweet Spot
    Hitting Your Data Protection Sweet Spot Storage Switzerland, Carbonite Recorded: Sep 26 2017 58 mins
    The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is a need for cost effective long term retention so that the organization is protected from ransomware. Finding the right balance between these extremes is called hitting the data protection sweet spot. In this live webinar, experts from Storage Switzerland and Carbonite will help you get there.
  • 6WIND & Intel Deliver 50%  Performance Increase for SW-based Security Gateways
    6WIND & Intel Deliver 50% Performance Increase for SW-based Security Gateways Kelly LeBlanc, VP of Marketing for 6WIND Recorded: Sep 26 2017 25 mins
    Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.

    In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
  • ANSI/TIA-942-B, The Important Non-Network Changes
    ANSI/TIA-942-B, The Important Non-Network Changes Edward van Leent Recorded: Sep 26 2017 64 mins
    The new release of the TIA-942-B has many great improvements. Other webinars have addressed the changes to the network chapters. But what about all the other important chapters? This webinar will address changes made to the Rating (a.k.a. Tier) system as well as other non-network related changes. This webinar will cover the important updates critical to those who design, build, and own/operate data centers.

    The speaker, Edward van Leent, Chairman & CEO of EPI Group of Companies, is a long-standing TIA-942 committee member and active contributor. He is a highly experienced data center veteran with over 30 years of experience and has personally audited and overseen the audits of hundreds of data centers all over the world.
  • The Blockchain Bubble: Identifying viable  opportunities for blockchain
    The Blockchain Bubble: Identifying viable opportunities for blockchain Joe Pindar, CTO Office Director of Strategy Recorded: Sep 26 2017 61 mins
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
    The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Jim Waggoner, Sr. Director, Product Management Recorded: Sep 26 2017 55 mins
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • 5 things you can do with a security policy management solution [US/UK]
    5 things you can do with a security policy management solution [US/UK] Jeffrey Starr, CMO & Edy Almer, VP Product Recorded: Sep 26 2017 51 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Recorded: Sep 26 2017 45 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • 10 inTech with Mark Stouse, CEO, Proof Analytics
    10 inTech with Mark Stouse, CEO, Proof Analytics IT Chronicles Media Recorded: Sep 25 2017 12 mins
    Mark Stouse, CEO of Proof Analytics speaks with the Ten in Tech team about how they use gathered data to provide insight to marketing departments by addressing the challenge of measuring the results they are getting for their marketing spend.
  • Fireside Chat: Lessons Learned from Facebook
    Fireside Chat: Lessons Learned from Facebook Ashish Thusoo, CEO/Co-Founder, Qubole & Horia Margarit, Resident Data Scientist, Qubole Recorded: Sep 22 2017 48 mins
    In the final session of Data Platforms Online 2017, Ashish Thusoo will offer some of his highlights from the week’s sessions, pick out some emerging themes and trends, and answer questions from the audience. Ashish built the original data team at Facebook, is a co-author of Apache Hive, co-author of “Building a Data Driven Enterprise with DataOps” and CEO of Qubole. He’ll be moderated by Horia Margarit, resident Data Scientist at Qubole. Get your questions ready for what will be a lively and entertaining discussion!
  • Big Data Trends with Oracle Bare Metal Cloud
    Big Data Trends with Oracle Bare Metal Cloud Andrew Reichman, Sr. Director of Cloud Strategy, Oracle Recorded: Sep 22 2017 36 mins
    Cloud has changed the game when it comes to data analytics. Previously, organizations had to lock themselves into a particular architecture and level of capacity for three to seven years and do all the lifting themselves. Cloud on the other hand allows them to experiment with different hardware and software options, get more of the solution as a service and scale up and down to meet project spikes and accelerate busy jobs at will. This makes it much more viable for any company to get the advantages of advanced analytics against large data sets, without an oversize IT staff or huge capital investments.

    Oracle cloud is specifically designed to help enterprises take advantage of cloud for data analytics—it offers massive non-variable performance, predictable low cost and broad choice of deployment and software options. Oracle and Qubole work together to deliver a new breed of data platform—capable of taming the scale, performance, cost and complexity issues associated with gaining business insight from data of all types.

    Watch this webinar to understand:
    - Summary of industry trends for big data on the cloud
    - How Oracle Cloud Infrastructure is optimized for big data workloads from a cost, performance and flexibility perspective
    - How Oracle Cloud Big Data solutions compare with on-premises and competing cloud options
  • Untangling the Cloud Services Hairball
    Untangling the Cloud Services Hairball James Curtis, Senior Analyst - Data Platforms & Analytics, 451 Research Recorded: Sep 22 2017 25 mins
    The question is not much whether to migrate to the cloud or not. That question has likely already been answered by many organizations and the answer is a resounding full steam ahead. But the start of the journey can be daunting especially with a lot of ‘as-a-service’ terminology floating around. Please join James Curtis, senior analyst at 451 Research, as he discusses not only some industry trends and what many organizations are doing but also a simplified approach to understanding cloud services and how that might best fit your organization. Because it’s not so much buyer beware; it’s more about buyer understand.
  • 10 inTech interview with Dominic Wellington, Chief Evangelist at Moogsoft
    10 inTech interview with Dominic Wellington, Chief Evangelist at Moogsoft IT Chronicles Media Recorded: Sep 22 2017 14 mins
    Dominic chats to the Ten in Tech team about the ever increasing pace of IT proliferation, how AI Ops can help system administrators to keep pace with the change in IT operations and how to integrate new IT management techniques into existing enterprise environments.
  • BS-free Data Science
    BS-free Data Science Aman Naimat, Senior Vice President, Technology, Demandbase Recorded: Sep 22 2017 45 mins
    There is a surge in hype around Artificial Intelligence. Startups are raising hundreds of millions of dollars by bedazzling investors with Deep Learning, word embeddings, and reinforcement learning. This is a distraction from the very real problems that data and AI can solve if done right. By working across dozens of machine learning problems that are live in the real world, I’ve worked out the most common problems encountered and recurring design patterns on how to solve real-world problems using AI as a tool. This talk will arm you with a perspective on how to get pragmatic solutions with AI today.
  • Get "Datopia": Transforming to an Agile Data Culture
    Get "Datopia": Transforming to an Agile Data Culture Tripp Smith, Chief Technical Officer, Clarity Recorded: Sep 22 2017 35 mins
    This webinar is focused on:
    - Increasing collaborative friction between engineers, analysts, and business
    - Process-driven iteration i.e. balancing agility with discipline
    - Making the quantitative business case for moving from big bang to continuous enhancement (convincing your CFO/CIO to shift from CapEx to OpEx)
    - Case studies and outcomes from our clients
  • What's New with iCDM on XtremIO X2?
    What's New with iCDM on XtremIO X2? Bryan Walsh Recorded: Sep 22 2017 35 mins
    XtremIO's unique integrated Copy Data Management (iCDM) offering combines performance & scalability with reduced operational risk through automation and self-services. Recently released, XtremIO X2 takes iCDM even further! Maximize the value of your All Flash Array deployment while simplifying application workflows and reducing development timelines. See how application admins and DBAs can repurpose and refresh different copies of Oracle and SQL Server DBs nearly instantaneously and become more agile.
  • Nutanix Technical Webinar
    Nutanix Technical Webinar Grant Friend Recorded: Sep 22 2017 63 mins
    Nutanix 101: An introduction to the nuts and bolts of Nutanix and Prism Management

    Nutanix Overview - Naming conventions and agnostic hardware and hypervisor support
    Nutanix technical detail - where and how the software runs and handles data
    Prism Management Demo - Detailed run through the core entities in Prism
  • Modern Data Architecture with AWS
    Modern Data Architecture with AWS Pratap Ramamurthy, Partner Solution Architect, Amazon Web Services Recorded: Sep 21 2017 29 mins
    Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Every use case might be different and different use cases might need different tools. AWS provides a variety of options for your needs from RDS, EMR, Redshift, Athena and Quicksight. In this talk we will discuss the different technologies available on AWS and its application.
  • Vexata's VX 100F Scalable Data System Encryption Demo
    Vexata's VX 100F Scalable Data System Encryption Demo Vexata Recorded: Sep 21 2017 4 mins
    The VX-100 Scalable System is a high availability, 6U hot pluggable storage platform that utilizes best in breed, commercially available hardware to deliver unmatched performance and availability across a broad range of use cases. Here, Vexata provides a demo of VX-100's encryption capabilities. http://www.vexata.com/product/
  • Vexata: All Your Data. Now.
    Vexata: All Your Data. Now. Rick Walsworth, VP of Products and Solutions Recorded: Sep 21 2017 3 mins
    Rick Walsworth, VP of Products and Solutions at Vexata, gives a rundown of the analytics and benchmarks needed for today's business. Optimize your business with All your data. Now. https://www.vexata.com/
  • Amplifying Retail with Big Data and The Cloud
    Amplifying Retail with Big Data and The Cloud Carter Bradford, Senior Vice President, Precocity Recorded: Sep 21 2017 29 mins
    Once considered the "black magic" of digitally-born retailers like Amazon, personalizing the customer experience has now become table stakes for any retailer interested in surviving in the era of digital transformation. the techniques, tools and scalable platforms necessary to optimize customer interactions are now available and accessible for use by companies of any shape or size. We'll discuss how the use of big data technology in the cloud eases the implementation of common retail use cases as well as how it helps to avoid typical pitfalls.
  • Active Data: Vexata OS
    Active Data: Vexata OS Ashish Gupta, CMO of Vexata Recorded: Sep 21 2017 3 mins
    Ashish Gupta, CMO of Vexata, explains Vexata OS (VxOS), an enterprise storage OS for lowest latency, parallel solid state media I/O. https://www.vexata.com/products/
  • [Panel] Protecting Data in the Age of Ransomware
    [Panel] Protecting Data in the Age of Ransomware Josh Downs, BrightTALK; David Cook, Eversheds Sutherland; Jonathan Wright, Commvault & Jason Kent, AsTech Consulting Sep 27 2017 12:00 pm UTC 60 mins
    - Protecting Data in the Age of Ransomware -

    2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

    With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

    This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

    Topics for discussion:

    - Why ransomware should still be top of your list of concerns in 2018

    - Methods to protect your organisation's sensitive data

    - Steps to take if your organisation does suffer a damaging breach
  • Power-up Your Cloud with Insanely Fast Storage
    Power-up Your Cloud with Insanely Fast Storage Boyan Ivanov, CEO, StorPool Storage Sep 27 2017 3:00 pm UTC 45 mins
    Building or running a cloud?
    Attend this webinar to explore the great impact which an outstanding storage solution can have on your entire public or private cloud. Intel and StorPool have created a production tested solution, which you can use to build faster, safer and more efficient clouds.

    Join us to learn how:
    •an outstanding storage solution can improve your entire cloud;
    •reduce costs and eliminate vendor lock-in by using software-defined infrastructure on standard hardware;
    •solve IOPS or latency issues of your applications;
    •get a storage solution capable of delivering 450,000+ IOPS and 0.25 ms latency at less than $40,000;
    •boost your business' margins and agility.
  • Are you Ready for DFARS?
    Are you Ready for DFARS? Eric Avigdor, Director of Product Management at Gemalto Sep 27 2017 3:00 pm UTC 60 mins
    With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
    Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
    Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
    •Overview of DFARS mandate
    •Use cases – our experience from the field
    •Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
    •Mapping solutions to the needs of your department
  • Protect Your Data Privacy with Data-Centric Security
    Protect Your Data Privacy with Data-Centric Security Stuart McIrvine Vice President, Mainframe Security Product Management Sep 27 2017 5:00 pm UTC 60 mins
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Sep 28 2017 2:00 pm UTC 60 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • How To: Configuration Management for Macs in the Enterprise
    How To: Configuration Management for Macs in the Enterprise Nick Thompson, Product Manager, Jamf Sep 28 2017 3:00 pm UTC 30 mins
    Configuring PCs for employees has been a pillar of enterprise IT for years. But, with Mac growing in popularity due to user demand, IT needs a streamlined method to manage Mac as efficiently as PC.
    In our webinar, How To: Configuration Management for Macs in the Enterprise, we’ll explain how organizations can best prepare Macs for employees while aligning with PC security requirements.

    You’ll learn:

    •New ways to deploy Macs
    •What configurations are available for macOS
    •How to meet security standards for Mac

    Presenter Info:
    Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Sep 28 2017 4:00 pm UTC 60 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • Fibre Optic Cleaning Can Prevent SAN Downtime
    Fibre Optic Cleaning Can Prevent SAN Downtime John Ford & Scott Ramsay Sep 28 2017 4:00 pm UTC 60 mins
    Both Dell EMC and our customers consume considerable time and effort to replace optics/SFPs in our switches, directors and storage arrays. This expense in time, effort and product is frequently unnecessary. The Fibre Cable Cleaning initiative creates an opportunity to identify and to simplify these situations, avoiding Service Request creation and reducing remediation time through customer education and self-service.
  • Azure, AWS move toward the edge: have they gone far enough?
    Azure, AWS move toward the edge: have they gone far enough? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Sep 28 2017 5:00 pm UTC 60 mins
    While Amazon and other cloud vendors shouldn't predicate their businesses on huge data centers in the middle of nowhere, most IoT applications that require instantaneous response and user interactivity shouldn't be in the cloud, either. With AWS' recent announcement of Greengrass, and Microsoft allowing customers to run its Azure cloud technology directly on their own infrastructure, more organizations are making a move to the edge. So, what does this mean for your business? During this webinar, we'll discuss the future of the edge and how your organization can best leverage it.
  • Risk-Cloud-Crypto
    Risk-Cloud-Crypto Donald Parker, CISSP, CCSK, ITIL, MCSE Sep 28 2017 5:00 pm UTC 60 mins
    The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together.

    Donald Parker, CISSP, CCSK, ITIL, MCSE

    As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the Information Technology industry with a special focus on Information Security. Mr. Parker has taught CISSP and other cybersecurity classes all over the United States and abroad, including Holland, Germany, and Guam. He holds a US patent for a physical computer security device that he believes will provide the greatest defense to one of the greatest threats on the Internet, Bot Networks. He has also developed a mechanical cryptographic cipher. Donald has authored a book on passing the CISSP exam and has published an audio version of the book online with over a million downloads. He has helped federal agencies and fortune 100 corporations comply with the ever-evolving cybersecurity landscape. As an independent consultant and small business owner for the past 10 years, he successfully completed more than a dozen short to midterm contracts. The knowledge gained from more than 25 different public and private sector environments has afforded him a birds-eye view of this exciting new field. Many of Mr. Parker’s customers and students refer to him as a one-man band in the since that; he can identify the laws, regulations, requirements and policies that an organization must comply with and actually implement the security controls necessary to demonstrate compliance. Donald has developed a STEM program to teach kids and young adults cyber security basics and prepare them for capture the flag competitions.
  • Everything You Wanted to Know About Storage - Cyan: Storage Management
    Everything You Wanted to Know About Storage - Cyan: Storage Management Richelle Ahlvers, Broadcom, Mark Rogov, Dell EMC, Alex McDonald, NetApp, J Metz, Cisco Sep 28 2017 5:00 pm UTC 75 mins
    Storage can be something of a “black box,” a monolithic entity that is at once mysterious and scary. That’s why we created “The Everything You Wanted To Know About Storage But Were Too Proud to Ask” webcast series. So far, we’ve explored various and sundry aspects of storage, focusing on “the naming of the parts.” Our goal has been to break down some of the components of storage and explain how they fit into the greater whole.

    This time, however, we’re going to open up Pandora’s Box and peer inside the world of storage management, uncovering some of the key technologies that are used to manage devices, storage traffic, and storage architectures. In particular, we’ll be discussing:

    •Storage networking management protocols
    •SMI-S – The bread-and-butter of vendor-neutral storage management
    •SNIA Swordfish – The new storage management solution gaining widespread momentum
    •Software-Defined Storage – the catch-all term for storage that includes architectures and management

    There’s so much to say on each of these subjects we could do a full webcast on any one of them, but for a quick overview of many of the technologies that affect storage in one place, we think you will find your time has been well spent.

    Join us on September 28th, 2017, for our continuation of the “Too Proud To Ask” series with Cyan, the Storage Management Pod.
  • Kubernetes Networking on Microsoft Azure
    Kubernetes Networking on Microsoft Azure Josh Wood, CoreOS Sep 28 2017 5:00 pm UTC 60 mins
    Kubernetes eases application deployment and management on many platforms, in the cloud and on bare metal. For each platform, clusters are constructed and connected using the provider's networking primitives and APIs. Microsoft Azure has an array of networking services and features. How should these be most effectively marshalled by Kubernetes deployments? This webinar will examine the Azure network primitives from Virtual Network to load balancing, detailing how each component is used by a Kubernetes cluster, and examine common deployment customizations, reviewing best practices for each.
  • Automating Critical Security Controls for Threat Remediation and Compliance
    Automating Critical Security Controls for Threat Remediation and Compliance John Pescatore and Tim White Sep 28 2017 5:00 pm UTC 60 mins
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.
  • Standing in the Gap: Ransomware and the Role of the MSP
    Standing in the Gap: Ransomware and the Role of the MSP Garrett Gross, Director of Field Enablement, AlienVault Sep 28 2017 5:00 pm UTC 60 mins
    Ransomware continues to be one of the most intrusive and pervasive threats today. With organizations of every size and vertical being a potential target, the opportunity exists for traditional MSPs to offer security-as-a-service to help customers protect, detect and respond to such threats.

    But, just how bad is the ransomware threat? It's worse than you may think and organizations are not doing enough to combat it.

    Hear from industry expert Nick Cavalancia and Garrett Gross, Director of Field Enablement, from AlienVault as they discuss:

    - The current state of the ransomware threat
    - Common ransomware scenarios, responses, and outcomes
    - The opportunity that exists for MSPs to stand in the gap
  • 2017 Cloud Market Overview: An Exclusive Briefing with 451 Research
    2017 Cloud Market Overview: An Exclusive Briefing with 451 Research Melanie Posey - 451 Research Sep 28 2017 6:00 pm UTC 75 mins
    Companies are re-thinking their cloud adoption strategy. How does your organization compare? In a dynamic cloud marketplace, having access to the very latest data and expert insights not only can save considerable time and effort in planning cloud migrations, but also create the opportunity for competitive advantage.

    TierPoint is pleased to present an exclusive briefing with 451 Research. Melanie Posey, Research Vice President will share the results of newly commissioned research, providing valuable perspective for organizations planning and designing workload migrations to the cloud. Available only to webinar attendees, this vendor agnostic presentation will answer the following key questions:
    •What are your peers spending on cloud services?
    •What workloads are your peers porting, when, and how?
    •What are some of the challenges and inhibitors for various cloud strategies?
    •What ROI are your peers are seeing?

    About Melanie:
    Melanie Posey is the Research Vice President for 451 Research’s Voice of the Enterprise: Cloud Transformation offering. She focuses on tracking, analyzing and anticipating the pace and nature of enterprise cloud adoption.

    Prior to joining 451 Research, Melanie spent more than 15 years at IDC in a variety of roles, providing analysis, forecasting and insight for the cloud, hosting, datacenter, managed services and telecommunications markets. At IDC, Melanie received numerous awards for research, collaboration, sales support and client service, including being named runner-up for the prestigious James Peacock Memorial Award.

    During her more than 20-year career in the technology research and consulting arena, Melanie has been quoted extensively in the business and technology trade press, and is a frequent speaker at industry and client events.
  • Increase your Application Security Efficacy across Networks
    Increase your Application Security Efficacy across Networks Kurt Roemer, Chief Security Strategist, Citrix & Asha Kalyur, Director, Product Marketing, Citrix NetScaler Sep 28 2017 6:00 pm UTC 60 mins
    Cybersecurity is all about managing and reducing your business risks. Increasing your application and network security efficacy mitigates these business risks. In the new world of hybrid cloud and SaaS apps, the security perimeter no longer exists.

    How do you protect your hybrid cloud deployments against cybersecurity attacks? Join our live webinar and learn:

    • Strategies to increase your security efficacy
    • If you are adopting hybrid cloud, how do you maintain your security efficacy?
    • How do you get started today?
  • Tips on Addressing Security Awareness and Ransomware Protection
    Tips on Addressing Security Awareness and Ransomware Protection Dr. Al Hartmann (Chief Scientist, Ziften), Mike Levin (CEO & Founder, Center for Information Security Awareness) Sep 28 2017 7:00 pm UTC 60 mins
    Ransomware has gone from “on the radar” to a Code 5 level threat with the rise of “ransomworms” snaking through global networks in hundreds of countries. Your employees are the front line of defense, and IT and security teams are tasked with protection, detection and response. But nobody knows how the next ransomware strain will take shape and teams are rarely, if ever, properly coordinated.

    In this webinar, you will learn:
    • Tips to help end users recognize and avoid ransomware.
    • Tips to help IT / systems administrators minimize vulnerabilities and risks to protect against ransomware.
    • Tips to help security teams detect and respond to ransomware attacks.

    About our presenters:
    Dr. Al Hartmann is the Chief Scientist at Ziften since 2009, focused on data analysis of user and endpoint behavior to drive critical situational awareness of enterprise cyber activity for security and operations management. Prior to co-founding Ziften, Dr. Hartmann was a senior researcher with Symantec's Research Labs and Technology Scouting Group, performing research in system cybersecurity and application quality of service.

    Michael Levin is the founder and CEO of the Center for Information Security Awareness. Prior to founding CFISA, Levin had a distinguished 30-year career in at the United States Department of Homeland Security. Levin served as the Deputy Director of the National Cyber Security Division, as well as the served as the Branch Chief of the U.S. Secret Service Electronic Crimes Task Force program in Washington DC. He was a member of the Secret Service Electronic Crimes Special Agent program and worked around computer forensics and cybercrime investigations for over 15 years.
  • Is SD-WAN the Killer Application for vCPE?
    Is SD-WAN the Killer Application for vCPE? Tim Verrall, Principal Engineering, Intel and Steve Yates, ADI Engineering Sep 29 2017 3:00 pm UTC 60 mins
    vCPE and SD-WAN are hot new technologies in networking and are forecasted to drive explosive growth over the next several years. To help understand the opportunity and challenges these technologies represent, Intel is hosting a series of webinars to explore vCPE and SD-WAN in detail. In our first webinar, we will review the technologies, the potential disruption they represent, the deployment strategies and highlight some of the key issues and challenges being addressed. We are also inviting ADI Engineering, an Intel Network Builder partner, to review some of their new vCPE product reference designs, including a discussion on features, performance, market drivers and differentiation.

    For next steps, I’ll send out a few meeting invites to review progress on the content development over the next couple of weeks. In addition, Renee Hunsaker, our host and coordinator for the webinar will send out a separate invite for a dry run and to work through logistics.
  • [APAC] Best Practices to Manage Security Across a Software Defined Network
    [APAC] Best Practices to Manage Security Across a Software Defined Network Edy Almer, VP Product at AlgoSec Oct 2 2017 5:00 pm UTC 60 mins
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [US/UK] Best Practices to Manage Security Across a Software Defined Network
    [US/UK] Best Practices to Manage Security Across a Software Defined Network Edy Almer, VP Product at AlgoSec Oct 3 2017 2:00 pm UTC 60 mins
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • Delivering Microservices with an HAProxy-Powered Service Mesh 
    Delivering Microservices with an HAProxy-Powered Service Mesh  Nenad Merdanović Product Manager, HAProxy Technologies & Tim Hinds Product Marketing Director | Co-Founder, HAProxy Oct 3 2017 3:00 pm UTC 60 mins
    Microservices architectures require highly dynamic application delivery controllers to deliver a multitude of services reliably and with bulletproof security. HAProxy is at the core of application delivery for some of the largest and most complex microservices architectures in the world. HAProxy's proven stability and performance can be used to drive your microservices environment using new features including hitless reloads/upgrades, server-templates, Runtime API, DNS service discovery and more.
     
    In this webinar presented by HAProxy Technologies, you will learn:
    •How How HAProxy succeeds in the new microservices architectures
    •Which HAProxy features are most helpful in delivering microservices
    •What new features are on the HAProxy roadmap that support microservices delivery
    •How to create a performant and resilient service mesh with HAProxy
    •How leading companies like Yelp and Yammer run huge service meshes backed by HAProxy
  • VMware vSphere 6.5 Series: Why Upgrade?
    VMware vSphere 6.5 Series: Why Upgrade? Jeremy Lemmon, Senior Systems Engineer, VMware Oct 3 2017 4:00 pm UTC 60 mins
    Find out how VMware customers benefited from upgrading to vSphere 6.5. During this webcast, VMware technical experts will review common business challenges and benefits of upgrading including:

    - Simplified user experience
    - Comprehensive built-in security
    - Universal applications support (any app anywhere)
    - Proactive Data Center Management
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Carlos Nieves, Director of Marketing, DataCore Software Oct 3 2017 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity
    The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity Ben Bolles, VP of Product, Pivot3 Oct 4 2017 5:00 pm UTC 45 mins
    The hyperconverged infrastructure space is exploding! It can be hard to keep up with the leading technologies in this incredibly fast growing market. Hear how Pivot3’s unique architecture tackles the data center complexity problem and simplifies IT deployment, performance & datacenter management. We’ll discuss how Pivot3’s newest product, Acuity, delivers 6X the performance and is capable of supporting 2X – 3X more VMs than conventional HCI solutions.