The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
In this webinar, produced in conjunction with Commvault EMEA Platinum Partner of the Year COOLSPIRiT, learn how Commvault's scalable, powerful and simple solutions ensure Application Availability and Robust Data Protection across your entire infrastructure.
Presented by Marc Lucas, Commvault Systems Engineer, find out how to:
* Simplify the move to the Cloud
* Utilise award-winning BaaS, DraaS and SaaS Data Protection
* Obtain greater insight with software defined storage
* Ensure data availability for business-critical applications
* Minimize system downtime with an innovative and scalable solution
COOLSPIRiT provides in-depth knowledge and expertise across the solutions portfolio. Their highly-skilled accredited experts can analyse and review your existing IT infrastructure to recommend and deliver the best value for your business. With proven best practice and multiple use cases, COOLSPIRiT Solutions Architects can help to design, configure and implement a robust IT strategy for data availability, compliance and disaster recovery.
Machine learning and machine intelligence have moved into the corporate datacenter. Along with seeing live demos of machine learning in action, attendees will learn how advanced algorithms can rapidly analyze large data sets to find relevant patterns, and employ inferential learning to make real-time adjustments to datacenter processes.
IT environments are becoming larger and more complex through organic growth as well as acquisition. Accompanying initiatives—like datacenter migrations, for example—are expensive. Done well, these moves cost $1,200 to $6,000 per server. But when things go wrong? A poorly optimized load balancer could mean downtime for critical application servers – a price that could skyrocket to more than $25,000 per server.
What if IT teams could be guided through the process? What if they had a way to map the plan and troubleshoot issues before they became outages?
In this webinar, we'll share a story from an ExtraHop customer who underwent a large datacenter migration after it acquired a new business. Not only did their IT team undergo a successful migration, they also decreased troubleshooting time and cost to the company by 85 percent – freeing them to move beyond reactive firefighting to proactive solution building for the business.
Infrastructure can make or break a VDI project. Successful Citrix XenDesktop and XenApp deployments require efficient, high performance and scalable IT infrastructure to deliver a great user experience. Hear from actual VDI project owners about what it takes to make Citrix VDI successful, and get a sneak peek into where Citrix + Nutanix integration is headed next.
Oracle apps and databases power an organization’s most critical workloads. There is a time to be conservative, but not when it means sacrificing the performance, availability and economics of your Oracle infrastructure. Come listen to veteran enterprise IT managers running Oracle on Nutanix, and loving it. Go home with details about architecting an efficient environment for Oracle eBusiness Suite, deploying test/dev environments and running core Oracle databases in production, and at scale.
Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability of metadata searching operations. Join Caringo VP of Product Tony Barbagallo and Caringo Engineer Jamshid Afshar as they take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage.
Network engineers and system administrators can spend a great deal of time responding to user complaints and troubleshooting slow performance issues that are difficult to diagnose or replicate. Resolving those issues can be especially problematic if those applications are provided by a third-party vendor or hosted by third parties, such as SaaS EMR applications, claims processing applications, and practice management applications. Often, IT teams do not have enough visibility to determine root causes or to counter claims from third-party vendors and managed service providers that host applications. With real-time insight into end-user experience for these hosted applications, including application-level transaction details, IT teams can hold vendors accountable and identify root causes faster.
Learn how ExtraHop helps you identify the root cause of your IT problems, avoiding unnecessary friction among your IT teams and ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
Which cloud—private or public—will provide the right profile of application performance, availability and cost for your business? What about security, workload lifespan and scaling? These are some of the pressing questions facing IT leaders. This in-depth strategy session, headlined by IDC analyst Eric Sheppard, will explore the breadth of business and technical considerations for choosing the right cloud environment. Get a proven methodology to plan public, private and hybrid cloud architectures.
The competitive advantage of MTDC and hosting providers will be determined by their ability to become a provider of services - not just iron. As space and power have been commoditized, being able to differentiate with new business and financial models and new products will mean the difference between success and failure. To succeed in this market, these companies need to provide the right prod-ucts and services to their customers. To compete effectively in today’s hyper-competitive market, they must offer customers new and innovative network connections and connectivity services. To support this strategy the infrastructure management team and network operations managers need to emphasize on standardized infrastructures, efficient change processes and secure maintenance and operation
In today’s digital economy, a modern infrastructure can help IT keep up with rapid changes, making it possible to deliver apps and services more reliably, provision without hassle, and scale quickly. You’ll learn about the limitations of traditional architectures, the characteristics of a modern infrastructure, the VMware approach, and customer success stories.
Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
Join us for this live webinar to discover:
oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
oThe pitfalls and limits of vertically scaling your ADC
oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
oExamples of organizations who have accomplished this with HAProxy
IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.
In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:
•The market and technology trends that influence workload, data center and cloud strategy
•How to evaluate the characteristics of various workloads and execution venues
•How to manage workloads across on-premises and off-premises ecosystems
Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
Supermicro has released a comprehensive line of new X11 generation server and storage solutions featuring the new Intel® Xeon® Scalable processor family with the strongest support for NVMe storage and 100G/25G Ethernet in the industry.
Supermicro’s new X11 generation solutions are engineered to unleash the full performance and rich feature sets on the new Intel® Xeon® Scalable processor family, supporting more cores and higher TDP envelopes of 205 watts and higher, increased to six memory channels with higher bandwidth, and more PCI-E 3.0 lanes with up to 100G/40G/25G/10G Ethernet, 100G EDR InfiniBand and integrated Intel® Omni-Path Architecture networking fabrics. The elevated compute performance, density, I/O capacity, and efficiency are coupled with industry’s most comprehensive support for NVMe NAND Flash to deliver up to 16 million IOPS for unprecedented application responsiveness and agility. Customers can select the Server, Storage, Blade, Network, or Workstation systems optimized for their applications, as well as the performance, memory, storage, and I/O profiles that are optimally matched to their workloads, at attractive price points.
Register for this webinar to hear about Supermicro’s latest and broadest portfolio of new Ultra, BigTwinTM, SuperBlade®, and SuperStorage products optimized for today’s latest technology innovations. We will also be sharing critical insights on how Supermicro workload optimized server solutions deliver the highest performance, efficiency, and scalability in demanding customer environments from cloud to big data and hyper-converged solutions, and efficiently power mission-critical Enterprise workloads.
Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.
Topics covered will include:
Summary of the standards developing organization (SDO) activities:
- Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
Securing the Cloud Supply Chain:
- Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
Emerging & Related Technologies:
- Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.
In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.
The presentation will cover:
> Challenges surrounding increased migration to public clouds
> Using automation for secure DevOps
> How to ensure effective and efficient operations
This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
Today’s storage area networks (SANs) face tremendous pressure from the phenomenal growth of digital information and the need to access it quickly and efficiently. It’s little wonder that storage administrators rank SAN congestion (Slow Drain) issues as their number-one concern. If not addressed in a timely fashion, these can have a domino effect, even degrading the performance of totally unrelated applications. Find out how the Dell EMC Connectrix MDS products have simplified the detection, troubleshooting and automatic recovery from SAN congestion.
Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
Join this discussion with expert panel Paul Scott-Murphy of WANdisco, Jean-Pierre Dijcks from Oracle, and Nick Collins of Accenture, to learn how to:
- Deploy Oracle Big Data Appliance (BDA) and Big Data Cloud Service (BDCS) in environments running any mix of HCFS compatible distributions with a path for full cluster migration with no downtime and no data loss.
- Meet enterprise SLAs with Oracle Maximum Availability Architecture.
- Replicate selected data among multiple big data systems and verify that they remain consistent regardless of where they are ingested or changed.
- Replicate data at any geographic distance with signficantly low RPO and RTO.
- Complete data transfer in approximately half the time of DistCp rgardless of the load imposed on the cluster.
- Overcome the limitations of traditional approaches that leverage DistCp or dual-ingest methods.
About the Presenters:
Paul Scott-Murphy VP of Product Management at WANdisco. Paul Scott-Murphy has overall responsibility for the definition and management of WANdisco's product strategy, the delivery of product to market and its success. This includes direction of the product management team, product strategy, requirements definitions, feature management and prioritization, roadmaps, coordination of product releases with customer and partner requirements, user testing and feedback.
Jean-Pierre Dijcks, Master Product Manager at Oracle. Highly experienced product manager with 15 years of experience in enterprise software and enterprise data. Currently responsible for all product management aspects (technology, GTM, Enablement etc.) of Oracle BDA and BDCS.
Nick Collins, Principal Applications Systems Analyst at Accenture. Nicholas Collins is a Principal Applications Systems Analyst at MD Anderson Cancer Center, where he serves as the chair over architecture for the Department of Clinical Analytics and Informatics. He has worked with Oracle technologies for over ten years and is a Master Level CDMP.
Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
“When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”
Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
•Overview of CJIS-SP mandate
Network vulnerabilities and how Ethernet encryption can help secure data in motion
•Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
•Mapping solutions to the needs of your organization
For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091
“In our current state of cyber security, security breaches are inevitable.” -- Kevin Mandia, CEO, FireEye
In 2016 there were 1,093 publicized cyber security breaches. That’s a 40% increase from 2015. Given this era’s up surge in breach activity, it’s no longer about whether you’ll be breached. It’s how you’ll respond when you are breached. Organizations with a well-designed response capability are better off.
Join Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant, for our webinar on July 20. They will cover several topics including:
•Six primary areas of focus for an effective response plan
•Best practices for each of those areas
•Examples of how deficiencies in any area reduce an organization’s ability to effectively detect and respond to a cyber security incident, whether targeted or opportunistic
To be competitive in today’s increasingly digital economy requires creating seamless, frictionless customer experiences and changing the way organizations serve and interact with their end users. But when and where to start?
Join us and discover, based on an ESG survey, why IT transformation is key to unlocking opportunities by helping organizations gain better control of the costs and complexities of operating IT resources. You will understand where our organization stand on the ESG IT Transformation Maturity Index we have created and Discover the 3-phases transformation process of your IT.
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World in May. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.
Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.
This webinar will:
* Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
* Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
* Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
In this session, we will discuss – and debunk – common misconceptions that you may encounter when planning to modernize your infrastructure. We’ll examine whether ‘build-it-yourself’ modernization deliver the same results as integrated solutions, if a modern infrastructure impacts the role of IT admins, how it effects the ROI of your existing infrastructure, the readiness of a simple, modern infrastructure for enterprise workloads, and whether or not infrastructure modernization leads to vendor lock-in.
It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation. We’re excited about this trend and are continuously enhancing Google Cloud Platform (GCP) to make it a great place to run containers. Join us to learn more about how to get started with GCP and why it is the “container-optimized” cloud.
A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.
Join this webcast to learn:
•The latest trends in DDoS attacks.
•Commonly overlooked costs due to DDoS attacks.
•And best practices in DDoS attack defense.
Apache Spark has established itself as a powerful distributed compute framework. Capable of performing SQL, machine learning, streaming analytics and batch processing all via a unified API. At the same time Kubernetes is gaining traction as an efficient way to manage and orchestrate containers for stand alone applications and more complicated distributed applications like Apache Spark.
In this webinar we'll go through spinning up an Apache Spark cluster on Kubernetes and analyzing various patterns to interact with the Apache Spark cluster. We'll also discuss work that is happening in the open source community to make Apache Spark on Kubernetes a first class citizen.
Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
In today’s complicated security landscape, perimeter firewalls don’t provide adequate protection for agile applications, diverse environments, and rapidly multiplying users. To defend against sophisticated and costly attacks, IT needs to take a transformative approach to security. Micro-segmentation enabled by network virtualization provides the persistence, ubiquity, and extensibility needed to build a strong defense.
In the webcast, we’ll discuss:
- The top security challenges IT is facing today
- Why a secure application infrastructure is an absolute must
- The definition of micro-segmentation
- How micro-segmentation keeps apps and users safe
Lenovo XClarityTM Energy Manager helps you reduce the cost of powering your data center. XClarity Energy Manager is an easy to use application that analyzes and controls power consumption and temperature for groups of servers. By analyzing power and temperature data, XClarity Energy Manager helps data center administrators establish policy-based control over data center energy optimization goals which can improve business continuity and energy efficiency. Join us to see how this this application improves operation processes by:
•Monitoring energy consumption, estimating the power demand, and reallocating power to servers as needed.
•Monitoring the temperature and cooling capacity of servers and datacenter spaces.
•Sending notifications when certain events occur or when thresholds are exceeded.
•Limiting the amount of energy that an endpoint or a group consumes using policies.
•Optimizing energy efficiency by monitoring real-time inlet temperatures, identifying low-usage servers based on out-of-band power data, measuring power ranges for different server models, and evaluating how servers accommodate new workloads based on the availability of resources.
•Reducing the power consumption to a minimum level to prolong service time during an emergency power event (such as a data-center power failure).
General Manager, Intel Data Center Solutions
Product Manager, Lenovo Data Center Group
Senior Application Engineer, Intel Data Center Solutions
Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.
•What SNIA is doing to advance persistent memory
•What the ecosystem enablement efforts are around persistent memory solutions
•How NVDIMMs are paving the way for plug-n-play adoption into containers environments
Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
Chances are you’re spending way too much time managing your virtualization stack, and paying far too much for what you’re getting. In the cloud era, the hypervisor should be invisible, built-in and license free.
Come learn from Nutanix engineers proven AHV strategies for running nearly any virtual workload, see live demonstrations and take full advantage of advanced AHV capabilities, such as VM mobility, resource scheduling and native networking features.
Learn how to incorporate consumer-grade design principles to radically simplify datacenter operations and management—saving IT administrators time, reducing overall TCO and increasing end-to-end infrastructure efficiency.
- Tarak Parekh, Principal Product Manager, Nutanix
- Melina McLarty, Staff Designer, Nutanix,
- Sree Pentela, Director, IT Architecture & Engineering, Valeant/Bausch and Lomb Pharmaceuticals
- Christian Pedersen, CEO, Zentura
Fact #1: The majority of Nutanix deployments are running multiple different workloads. Fact #2: More than 50% of new workloads deployed on Nutanix Enterprise Cloud are enterprise applications, including business-critical Oracle and SQL Server databases, SAP applications servers, big data apps including MongoDB, and tier one applications. Learn from technology and product experts why Nutanix is the smart choice for running all of your workloads in a single environment.
· SACHIN CHHEDA, SR. DIRECTOR, MARKETING NUTANIX
· PRIYADARSHI PRASAD, PRINCIPAL PRODUCT MANAGER NUTANIX
· ROBERT EDWARDS, DIRECTOR, TECHNICAL INFRASTRUCTURE CARDINAL INNOVATIONS HEALTHCARE
· ALTON LEVESQUE, IT STRATEGIC DIRECTOR, ENTERPRISE PLATFORM ENGINEERING LABORATORY CORPORATION OF AMERICA
Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.
¿Es posible optimizar recursos y operaciones en entornos dinámicos?
En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.
In this, the seventh entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into the mysticism and magic of what happens when you send your data off into the wilderness. Once you click “save,” for example, where does it actually go?
When we start to dig deeper beyond the application layer, we often don’t understand what happens behind the scenes. It’s important to understand multiple aspects of the type of storage our data goes to along with their associated benefits and drawbacks as well as some of the protocols used to transport it.
In this webcast we will show you more about the following:
•Volatile v Non-Volatile v Persistent Memory
•NVDIMM v RAM v DRAM v SLC v MLC v TLC v NAND v 3D NAND v Flash v SSDs v NVMe
•NVMe (the protocol)
Many people get nervous when they see that many acronyms, but all too often they come up in conversation, and you’re expected to know all of them? Worse, you’re expected to know the differences between them, and the consequences of using them? Even worse, you’re expected to know what happens when you use the wrong one?
We’re here to help.
It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.
Please join us on August 1st for another edition of the “Too Proud To Ask” series, as we work towards making you feel more comfortable in the strange, mystical world of storage.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
Learn how users are deploying their modern infrastructure and the best projects to target for your modernization project. We’ll discuss best practices for modernizing your infrastructure and results from real-world deployments. We’ll also give you the top uses cases for a modernized infrastructure, including hybrid cloud, enhancing existing applications and enabling new apps, edge computing for disaster recovery and remote offices/branch offices, and for IaaS deployments.
The industry is experiencing success in deploying NFV technologies to improve the efficiency and agility of their networks. But the rate of deployments is often held back by the complexities of profiling, sizing testing and configuring workloads and even the basic system infrastructure to run them. This session will provide an introductions to a new Intel Network Builders initiative to help resolve some of these complexities and enable a more stable foundation for ramping NFV deployments. Learn about the offerings available through the program and how to participate
As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.
As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.
Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.
- Discussion on the increased dependence on HTTP and HTTPS
- The limitations of Firewalls in the web and cloud world
The increasing critical need for web gateways, both on premise and in the cloud, for achieving:
- Access governance for users and devices
- Verifiable protection against advanced attack methods
- Agile risk management and measurable return on investment.
Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Cybercrime is growing fast—and traditional security solutions aren’t up to the task of slowing it down. Organizations are pouring huge amounts of time and money into perimeter-centric security, but that’s not adequate on its own anymore. It’s time for a new solution—one that starts with network virtualization and extends to enabling micro-segmentation for data center protection that can handle modern threats.
In the webcast, you’ll learn:
- Just how fast cybercrime is growing
- Why a secure application infrastructure is the answer to today’s security challenges
- What micro-segmentation is, and how it enables new levels of security
- How micro-segmentation reduces costs, enables business agility, and supports simplicity
Join our Cybereason, Carbonite joint webinar to learn the current and future state of ransomware as well as tactics and technologies for advanced cyber threat detection and prevention.
In this webinar you will learn:
- Why ransomware is so pervasive and prevalent.
- How you can futureproof your cyber threat prevention approach.
About the presenters:
Jessica Stanford, Director of Product Marketing at Cybereason, will be discussing the evolving methods cyber criminals are using along with advanced methods for detection.
Tom Powers, Director of Product Management at Carbonite, will be looking at a real-world ransomware recovery scenario, examining lessons learned, and exposing vulnerabilities in the strategies and backup/recovery technologies used.
This session builds on foundational understanding of high-level vSAN architecture such as disk groups, fault domains, and cache and capacity tiers. We will begin with some examples of how vSAN distributes data in the cluster to preserve data integrity and availability and how rules in a storage policy affect data component placement. Infrastructure lifecycle management commonly requires hardware maintenance, firmware upgrades, and software patches. A hyper-converged infrastructure (HCI) powered by vSAN is no exception.
This session will provide technical details on how to verify the health of a vSAN cluster and remediate configuration issues. We will cover the use maintenance mode options to help ensure virtual machines remain online during planned host downtime. The session will conclude with discussion on how vSAN effectively handles the availability of data when a disk or host goes offline temporarily or permanently with little or no warning.