The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
Using the public cloud for temporary or elastic workloads enables flexibility and agility to address today’s enterprise compute needs. Implemented correctly, a hybrid architecture assures cloud-like responsiveness that pleases end users while maintaining the procedures that any well-run organization needs. However, implemented poorly or left to individuals, it becomes a budgetary and security exposure, frustrating the user and putting the company at risk.
Join Nutanix and Aviatrix and learn how Calm and Aviatrix’ Cloud Networking solution will simplify and automate the placement of applications and temporary workloads in to the Public Cloud (Amazon Web Services, Google Cloud Platform, and Azure). With Aviatrix and Nutanix the cloud becomes a seamless extension of your datacenter allowing you to use the cloud when it is needed and bring workloads back on premises where it makes sense. Learn how Nutanix and Aviatrix are making the cloud, and networking to it, as invisible as Nutanix has made virtualization and storage in your data center.
Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.
Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
No organization wants to lose data or waste precious time searching for it when it is needed. And, we all know the costly ramifications of failing to comply with governmental regulations: HIPAA/HITECH, PCI, Freedom of Information Act, GDPR, and many more. Join Jacques Sauvé, IGP of NetGovern, a leader in Information Governance software, and Ben Canter of Caringo, secure scale-out storage, to learn how compliance with current, large rapidly scaling data sets requires tighter integration between information governance and underlying storage infrastructure.
Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.
The foundation of a successful security architecture in this model requires:
- Rich, trustworthy data covering all aspects of the environment
- Consolidated data sources and analytics processes
- Automated investigation and response capabilities
- Integration between tools and services for total coverage of every critical asset and data set.
In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.
Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.
Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.
Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
Dell EMC Unity has been designed and engineered from the ground-up to be radically simple, flexible and unified. Come hear and see what's new. This session will look at how Dell EMC Unity delivers both advanced features (such as, built-in encryption, inline data reduction, forever snapshots, storage analytics – CloudIQ, cloud tiering...) and high performance in just 2U.
The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.
Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:
- What is GDPR and who is affected?
- How will GDPR impact organizations outside the EU?
- What is meant by personal data in the context of GDPR?
- What are some of the steps and effective tools you need to comply?
- What should your incident response plan look like in the event of a breach?
- What happens to companies that fail to comply?
We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.
Principal Product Marketing Manager, AlienVault
Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
What are the top use cases in AI? Or should we say, what will be the top use cases in the next 5-10 years? How are companies using the disciplines of Machine Learning, Deep Learning and HPC? What is needed to enable faster adoption? What technology changes are expected or required? Evaluator Group and Tractica, leading analyst firms on the topic of Artificial Intelligence come together to discuss these topics of market adoption and technology requirements.
This is an INTERACTIVE session. We will start with short presentations then open up the Fireside chat. The audience is invited to submit their questions and participate in what will be a lively discussion.
Join Holger Kaercher and Chris Priest on for a 1:1 interview on:
- Unexpected challenges of managing data in the cloud
- Managing and controlling your data, your way
- Optimising wherever your data is stored
Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.
For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.
Following the MSI highlights, we'll cover the following topics:
Join Chris Priest and Horst Thieme for a 1:1 interview on:
- How to get files from existing infrastructures into the public cloud
- The importance of bringing AI Analytics workloads closer to the public cloud
- Lower costs and greater efficiencies
Digital transformation is the journey all organizations must go through to compete and win in today’s economy. It includes fundamental changes across the business and information technology. The hallmark of digital transformation is that software differentiates in ways it never has before, and technology is no longer about running the business-instead it creates competitive advantage.
To attain digital leadership requires embracing a new generation of technology that encompasses real-time decision platforms, cognitive systems, and the Internet of Things, as well as new processes and cultural perspectives. Digital leaders move fast and embrace disruption both internally and externally. No wonder 90% of CEOs are changing the way they use technology to be successful, according to IDC Research.
Join this spotlight overview and hosted panel discussion to hear insights from top executives.
Whether you’re grappling with brownfield environments that aren’t under management, infrastructure inherited from various acquisitions or shadow IT, one of the earliest and most significant challenges to achieving pervasive automation is not knowing what you have. Simply put, you can’t automate what you don’t know exists. This is why discovery of your infrastructure resources is step zero in bringing automation to any organization.
Puppet Discovery solves this problem by giving you an accurate, real-time picture of your IT inventory so you always know what’s running, and can prioritize what to automate.
Join Carl Caum, Engineering Product Manager for Puppet Discovery, and John Tonello, Sr. Technical Marketing Manager, for a closer look at Puppet Discovery’s capabilities:
- See everything you have running on your servers, VMs and containers in an intuitive dashboard, so you know what’s under management, and what’s not.
- Unlike clunky CMDB tools and static spreadsheets, Puppet Discovery maintains a dynamic and actionable inventory, making it easy to see exactly what software, services and operating systems are running.
- More than just a resource inventory, Puppet Discovery provides deep insights about infrastructure, bridging the gap between resource discovery and automation.
- Unlike any other solution, Puppet Discovery allows you to take action on what you find, including restarting and stopping services and installing the Puppet agent
Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability with metadata, enabling you to search billions of files ad hoc with "Google-like" search capabilities, without the rigid structure of relational databases and file systems. Caringo Senior Consultant John Bell and Caringo Engineer Jamshid Afshar take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage in this webinar.
To learn more about the realities of DevSecOps today and the real degree to which security is or is not being included in enterprise continuous integration/continuous delivery workflows, we surveyed 350 decision-makers at large enterprises across a variety of industries.
What we found is that only about half of enterprise CI/CD workflows include any security elements at all, highlighting ample room for improvement. Enterprises did seem to show an awareness of the importance of adding security elements into DevOps releases, but they are not necessarily injecting security early in the process -- ideally at code commit and in pre-implementation. This webinar will cover these and other results of our survey, and offer guidance on how enterprise organizations can effectively integrate security tools, thinking and people into their CI/CD workflows to reduce rework and risk without sacrificing velocity.
Are you a control freak? Have you ever wondered what was the difference between a storage controller, a RAID controller, a PCIe Controller, or a metadata controller? What about an NVMe controller? Aren’t they all the same thing?
In part Aqua of the “Everything You Wanted To Know About Storage But Were Too Proud To Ask” webcast series, we’re going to be taking an unusual step of focusing on a term that is used constantly, but often has different meanings. When you have a controller that manages hardware, there are very different requirements than a controller that manages an entire system-wide control plane. From the outside looking in, it may be easy to get confused. You can even have controllers managing other controllers!
Here we’ll be revisiting some of the pieces we talked about in Part Chartreuse [https://www.brighttalk.com/webcast/663/215131], but with a bit more focus on the variety we have to play with:
•What do we mean when we say “controller?”
•How are the systems being managed different?
•How are controllers used in various storage entities: drives, SSDs, storage networks, software-defined
•How do controller systems work, and what are the trade-offs?
•How do storage controllers protect against Spectre and Meltdown?
Join us to learn more about the workhorse behind your favorite storage systems.
This webinar will discuss how high performance networking software combined with commercial-off-the-shelf (COTS) edge servers and open management can offer real alternatives to expensive networking equipment.
The webinar will cover:
• How white box server solutions based on Intel Architecture scale from Customer Edge to Provider Edge
• Physical constraints at the Edge and why location is so important
• How to successfully replace Brocade Vyatta vRouters with 6WIND Turbo Router software appliances
Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.
Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.
Key topics include:
• How to securely discover, map and migrate application connectivity to the SDN
• Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
• Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
• Best practices for managing security policies across Cisco ACI and VMware NSX
• Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
XtremIO’s metadata-centric architecture is the base for delivering always-on inline data services and consistent performance. XtremIO X2 builds on that architecture delivering more performance, capacity, data services and simplicity. This session will provide deeper dives into many XtremIO X2-specific architectural innovations like Write Boost, multi-dimensional scaling, flexibility of using larger drives, enhanced management simplicity, serviceability and replication.
The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.
GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.
Join Jill Reber and Kevin Moos of Primitive Logic to learn:
- How to work with third parties who process personal data on your behalf
- How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."
This webinar covers:
- An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
- How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
- How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
- Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
Using Flash to substitute memory in databases can substantially increase density, reduce costs and improve durability. However, most databases access Flash through traditional storage and file system layers, utilizing only a fraction of Flash’s potential speed. As a result, companies keep using in-memory databases with expensive memory and limited data capacity and resiliency. Ori Modai will explain how to build real-time intelligent apps which run across large data sets and reach in-memory database performance with Intel’s NVMe Flash. He will describe the challenges posed by traditional database and storage architectures and will present a new database design which maximizes the value of flash, reaching 20x lower costs and 100x higher density. The session will include a technical deep dive followed by real-world customer use-cases in the fields of IoT edge and online AI applications.
If your information infrastructure is not robust and flexible, then business agility is reduced, managing applications is time consuming, and total cost of ownership is higher than necessary. Learn how Dell EMC’s storage and data protection solutions help organizations like yours by leveraging an information infrastructure that is designed for change and delivers both high performance and high availability.
What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:
- Continually improve security effectiveness through machine learning and AI
- Better understand risky behavior
- Automate policies
- Dramatically reduce the quantity of alerts
- Streamline and accelerate investigation of those alerts
GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Pierre-Francois Guglielmi, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.
Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.
Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:
• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
This webinar is part of BrightTALK's Ask the Expert Series.
Join David Cuthbertson, CEO of Square Mile Systems, as he takes a deep dive into cloud management. Many senior decision makers have negative feelings regarding the issues of technical teams and don't want to bring them to light - data security, change control, lock in to a supplier who overcharges, proper outage stats, etc.
Just as there is more awareness of outsourcing contract nightmares, many of the same issues apply to cloud providers. Managing change in cloud-based systems is still a relatively new issue as most technical teams don't think about how cloud systems are managed and the potential risks posed by many suppliers without a viable business model.
Audience members are encouraged to send questions to the expert which will be answered during the live session.
See the future of cloud-based storage management & analytics in this demo-filled webinar. Manage storage from anywhere and detect performance anomalies and measure overall health of Dell EMC storage systems through intelligent, comprehensive and predictive analytics. Harness the power of using CloudIQ across your storage platforms including Unity, SC, and more coming soon.
The healthcare industry is facing increased pressure to comply with strict regulatory requirements that focus on managing, controlling, and monitoring privileged access to sensitive data. Yet, data breaches remain at an all-time high, while compliance and security measures seem to be on hold. In fact, 2018 has already imposed over $3.6 million dollars* in fines, due to HIPAA compliance violations.
Take control of your environment, your privileged users, and get compliant. Join CA hosts – Cullen Lemley, Cybersecurity Consultant and Alexandra Beswerchij, Product Marketing Manager – as they reveal necessary steps to HIPAA compliance and Privileged Access Management best practices to defend against cybersecurity risks.
Machine learning and Deep learning architectures are driving efficiencies and automation across enterprise systems and creating challenges for infrastructure architects in order to deliver the desired outcomes. These issues are manifested through infrastructure I/O bottlenecks that result poor ingest throughput performance that slow cognitive system training times due to excessive latencies. In this webinar, Toshiba and Vexata join forces to provide actionable information about the latest generation of NVMe based solid state drive (SSD) media and how to architect systems to deliver the low latency, high bandwidth I/O services to these advanced neural nets and cognitive systems.
Join this webinar and learn about the latest technologies, architectures and best practices purpose built for these AI ecosystems.
In this webinar
1. Latest generation of SSD technologies that deliver low latency performance
2. Advances in storage architectures that maximize the SSD media
3. Use cases and customer examples that have deployed these architectures for machine learning environments.
The world’s most expansive data privacy regulation -- the General Data Protection Regulation (GDPR) -- takes effect on May 25, 2018, and organizations of all sizes must be prepared to respond.
This session will provide powerful insights from recent Veritas research regarding consumer sentiment toward data privacy and the implications for accelerating your compliance journey. Additionally, we will cover a brief overview of the regulation’s most important tenants and key technology areas that can reinforce your compliance posture, including a helpful new framework for evaluating GDPR Readiness.
Even though the GDPR enforcement date is here, it’s never too late to get on board and start assessing your data processes to begin aligning with the requirements.
And even if your company is already prepared, May 25 is not a finish line.
Not only will the regulation itself continue to be clarified through interpretation, but certain triggers in your organization down the road will require a re-evaluation of your compliance status.
Join Jill Reber and Kevin Moos of Primitive Logic to learn:
- How to assess your GDPR readiness and identify gaps that need to be filled
- Why GDPR compliance is not a one-and-done endeavor
- The internal and external triggers that may demand a re-evaluation of your GDPR compliance
- How to build GDPR checks into your ongoing data management strategy
The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.
It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
•How to show that you are processing data in accordance to the GDPR
•How to ensure (and document) the security, confidentiality and availability of data
•How to support the Right to be Forgotten
You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.
Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.
This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.
With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.
This webinar will provide you with:
- A refresh of the GDPR requirements and risks associated with the failure to comply.
- An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
- A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
IDC estimates by 2021 at least 50% of global GDP will be digitized. Data Capital is about helping customers to maximize the value of the insights and information in their data centers today to reach new audiences and revenue potential.
In this webinar, we’ll be discussing the role data plays and why an emphasis on unlocking the power of your Data Capital will drive success for organizations. We’ll also cover real world examples that show the value of digital transformation, and how you can start your journey.
In this webcast you will learn:
Why Data Capital is so important to your organization
How to unlock your Data Capital and overcome common challenges
Telco operators are looking for open source solutions to reduce vendor lock-in and to meet growing customer demand in transformation. In this session, we provide a glimpse of common NFVI inquiries from telco customers, and propose a modularized NFVI OpenStack Platform with flexible, reliable, and high-performance infrastructure:
○ OpenStack architecture design and network planning for NFVI. We will present how to plan a NFVI OpenStack environment from scratch.
○ Enhanced Platform Awareness (EPA) adoption and performance evaluation. We will introduce the network stack and provide detailed performance evaluation results.
○ Ansible based auto-deployment tool to accelerate the overall deployment process. We will present you how our streamlined auto-deployment tool saves your effort to build a well-integrated OpenStack
More about our presenters:
Marco Huang – Open Infrastructure Engineering Team Leader. QCT
Amy Chang - Open Infrastructure Business Development Team Leader, QCT
Wei Yeang Toh - Marketing Development Director, Network Platform Datacenter Group, Intel Corporation