Hi [[ session.user.profile.firstName ]]

Data Center Management

  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Recorded: Jan 18 2018 46 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process


    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
  • Reducing Risk in the Data Center with DCIM
    Reducing Risk in the Data Center with DCIM Rhonda Ascierto, Research Director at 451 Research and Mark Gaydos, Chief Marketing Officer at Nlyte Software Recorded: Jan 18 2018 40 mins
    The management of change has been a recognized and necessary discipline in enterprise IT for decades. But the management of change – and indeed critical events – in datacenter facilities has not received so much attention, despite the dangers and significant costs associated with even partial failure.

    Increasingly, datacenter owners and operators are reducing risks associated with change and unplanned events by using purpose-built datacenter infrastructure management (DCIM) software. DCIM has become an essential element of modern datacenter risk management, from monitoring and alerting to traceable (auditable) workflows, asset tracking, predictive analytics and end-to-end risk analysis.

    In this webinar, you will learn how DCIM is being leveraged to understand, manage and lower risk, while at the same time delivering efficiency, agility and cost benefits.
  • From Where You Are to Where You Want to be with 3DS 2.0
    From Where You Are to Where You Want to be with 3DS 2.0 Hannah Preston, Solution Strategist, Payment Security, CA Technologies Recorded: Jan 18 2018 23 mins
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • An Introduction to MaxParallel & SQL Server Parallelism
    An Introduction to MaxParallel & SQL Server Parallelism Rosario Perri, Dir. Channel & Alliances EMEA, DataCore | Mike Prince, Senior SQL Server Consult., Ultima Business Solutions Recorded: Jan 17 2018 44 mins
    Join our webinar and learn new ways to optimise SQL Server leveraging idle cores to improve the responsiveness of highly concurrent, I/O-intensive OLTP workloads. It’s surprisingly simple.

    We also have a special guest, Mike Prince, Senior SQL Server Consultant from Ultima Business Solutions, who will share his experiences testing MaxParallel in SQL environments.
  • Fix Spark Failures and Bottlenecks Faster and Easier
    Fix Spark Failures and Bottlenecks Faster and Easier Vinod Nair Recorded: Jan 17 2018 49 mins
    Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar discusses the results of analyzing many Spark jobs on many multi-tenant production clusters, the common issues seen, the symptoms of those issues, and how developers can address them. Pepperdata has gathered trillions of performance data points on production clusters running Spark, covering a variety of industries, applications, and workload types.

    Presenter Vinod Nair will talks about key performance insights — best and worst practices, gotchas, and tuning recommendations — based on analyzing the behavior and performance of millions of Spark applications. In addition, Vinod will describe how we are turning these learnings into heuristics leveraged from the open source Dr. Elephant project.

    This webinar is followed by a live Q & A. A replay of this webinar will be available within 24 hours at https://www.pepperdata.com/resources/webinars/.
  • Quay Enterprise 101: Overview and Demo
    Quay Enterprise 101: Overview and Demo Joseph Schorr, Software Engineer Recorded: Jan 17 2018 43 mins
    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • The Evolution and Future of NVMe
    The Evolution and Future of NVMe David Allen, NVM Express Board Member and Dr. J Metz, NVM Express Board Member Recorded: Jan 17 2018 60 mins
    The momentum around NVMe technology has surpassed expectations and there’s no lull in sight. Developers and other industry enthusiasts are excited about the potential for NVMe in the client/mobile space, as well as in the data center and enterprise. Join us for this NVM Express, Inc.-hosted webcast to learn about the evolution of the NVMe storage protocol and what’s in store for its future, in 2018 and beyond.

    In this webcast, you will find out more about today’s market adoption, various applications and use cases, as well as the NVMe specifications roadmap, including projected timelines and key enhancements for the NVMe Management Interface 1.1 Specification, the NVM-oF 1.1 Specification and NVMe 1.4 Specification.
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Recorded: Jan 16 2018 53 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology
    Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology Boaz Avigad, Director of Technical Marketing Recorded: Jan 16 2018 37 mins
    With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.

    In this webinar we will learn about:

    i. Why SSL visibility is important
    ii. What new challenges are we facing in SSL
    iii. The importance of performance
    iv. SSL in the age of virtualization
    v. The impact of the evolving datacenter landscape on SSL requirements
  • Application visibility and control in the cloud
    Application visibility and control in the cloud George McGregor, Senior Director, Product Marketing, Citrix & Kenneth Ross, Director of Product Management, Citrix Recorded: Jan 12 2018 57 mins
    Are you concerned about loss of control and visibility as you move applications and workloads to the cloud?
     
    NetScaler Management and Analytics (NetScaler MAS) provides application level visibility, management and automation of your application delivery environment across multiple clouds. NetScaler MAS is available as a Citrix cloud service or can be deployed as software in your data center.
     
    Join this webinar and learn how to:
     
    • Harness and use data about users, apps, and traffic from any NetScaler or HAproxy
    • Automate and manage your entire application delivery infrastructure from one console
    • Deploy and map applications to infrastructure using stylebooks so that you can easily manage your app’s lifecycle
    • Ensure policies are consistently applied by automating provisioning, configuration and SSL certificate management across your environment
    • And more!
  • SQL Server Parallelism: Putting all those Cores to Work
    SQL Server Parallelism: Putting all those Cores to Work Augie Gonzalez, Director of Product Marketing, DataCore Software Recorded: Jan 12 2018 36 mins
    Learn new ways SQL Server can leverage idle cores to improve the responsiveness of highly concurrent, I/O-intensive OLTP workloads.

    It’s surprisingly simple.
  • Dell EMC Presents: Quest Platform Management
    Dell EMC Presents: Quest Platform Management Alistair Holmes, Quest Software Recorded: Jan 12 2018 30 mins
    Managing and securing Microsoft platforms – such as Active Directory, Exchange, Skype for Business, Azure AD and Office 365 – can be expensive and time-consuming. In fact, organizations typically spend 75 percent of their budget maintaining legacy infrastructure.

    It’s time to optimize your environment and secure your Microsoft infrastructure to prepare for what’s next. Our award-winning solutions help you migrate, manage and secure your data across on-premises, cloud-based and hybrid platforms. Stop worrying about maintaining systems, and start focusing on innovation. See for yourself why our tools have been used to migrate, secure and manage more than 180 million users.
  • Part 4: Breach Detection and Notification for the GDPR
    Part 4: Breach Detection and Notification for the GDPR Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva Recorded: Jan 11 2018 39 mins
    The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    • What the General Data Protection Regulation is
    • What the GDPR breach notification requirements are
    • How Imperva CounterBreach can help detect potential data breaches
  • Prometheus 101: Overview and Demo
    Prometheus 101: Overview and Demo Chris Ricci, Solutions Engineer Recorded: Jan 11 2018 37 mins
    Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.

    In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
  • The Business Benefits of GDPR Readiness
    The Business Benefits of GDPR Readiness Nigel Tozer, Director of Solutions Marketing Recorded: Jan 11 2018 33 mins
    As you alter your business practices and processes to account for the General Data Protection Regulation (GDPR), which goes into effect May 25, 2018, it’s likely that your organization will be thinking of the risk of fines and the cost of compliance. However, the very same tools that can help to manage the data challenges of GDPR can also help you to gain insight and real business value from your data. In addition, putting the focus on better managing your data means you have the opportunity to reduce costs and improve efficiency, while also boosting productivity.
  • Vault OCS - Secret to a Secure Jenkins on Tectonic
    Vault OCS - Secret to a Secure Jenkins on Tectonic Praveen Rajagopalan, Solutions Engineer Recorded: Jan 10 2018 20 mins
    Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.

    CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
  • TechTalk: Effective Micro-Segmentation for the Multi-Cloud
    TechTalk: Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Recorded: Jan 10 2018 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
    Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jan 9 2018 37 mins
    As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.

    Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.

    You'll learn:

    What the AlienVault Labs security research team has learned about these threats
    How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
    How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
    How the incident response capabilities in USM Anywhere can help you mitigate attacks

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Network Security Policy Management - Automation for Transformation
    Network Security Policy Management - Automation for Transformation Yonatan Klein - Director of Product Management Recorded: Jan 9 2018 41 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • [APAC] Network Security Policy Management - Automation for Transformation
    [APAC] Network Security Policy Management - Automation for Transformation Yonatan Klein - Director of Product Management Recorded: Jan 9 2018 37 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • Tech CEO: It's Not the Cloud, It's How We Use It
    Tech CEO: It's Not the Cloud, It's How We Use It BizCast HQ Recorded: Jan 8 2018 4 mins
    Karl Zimmerman, Founder and President of Steadfast, explains that technology isn't changing nearly as fast as the way we use it. Data security has always been an issue, and recent headlines have brought it to the forefront. From security audits to application development, Steadfast provides technology services to mid-size businesses in Chicago and beyond.

    BizCast HQ interview source: https://youtu.be/ohLNklt15bY
  • Orbit Media - A Steadfast Case Study
    Orbit Media - A Steadfast Case Study Various Recorded: Jan 8 2018 2 mins
    Orbit Media is an award-winning web design company in Chicago that has hosted with Steadfast for several years. This brief video case study profiles Orbit Media's experience with Steadfast and how partnering with Steadfast has helped them achieve greater success in their business.
  • Automating detection & response to security threats - Tim Roddy
    Automating detection & response to security threats - Tim Roddy IT Chronicles Media Recorded: Jan 5 2018 11 mins
    Minimizing the time taken to identify a security breach enables a company to mitigate the problem and limit the potential damage to its data and reputation.
    Deploying an automated detection and response tool gives security practitioners the insight they need to respond to cyber-security attacks.
  • Artificial Intelligence & Machine Learning where is it going? - Marcel Shaw
    Artificial Intelligence & Machine Learning where is it going? - Marcel Shaw IT Chronicles Media Recorded: Jan 5 2018 15 mins
    While still in its infancy, Artificial Intelligence and Machine learning technologies have the ability to recognize trends in data patterns, analyse and learn from them.The advances promise to bring huge value to business that can leverage this information.
  • Achieving "World class ITSM" Kevin J. Smith
    Achieving "World class ITSM" Kevin J. Smith IT Chronicles Media Recorded: Jan 5 2018 15 mins
    Kevin talks about his book "World Class ITSM" which focuses on the journey of the Helpdesk to Service Management, where it has been proven to work and what is aspirational for the future of ITSM to do things better.
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 3:00 am UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • 5 avantages d'une architecture évolutive pour la protection des données
    5 avantages d'une architecture évolutive pour la protection des données Christophe Multeau Jan 23 2018 8:30 am UTC 45 mins
    Vous en avez assez des mises à jours compliquées de votre infrastructure de sauvegarde et de vos Appliances de déduplication ? Avez-vous l’impression d’êtes pris dans un cycle sans fin d’achats de logiciels et de matériels àchaque fois que vous devez ajouter de la capacité ou augmenter les performances de votre système de protection des données ?

    Vous devriez utiliser une infrastructure robuste et évolutive pour sauvegarder et restaurer vos données !

    Participez au webinaire Commvault sur les 5 avantages de la protection des données avec une architecture évolutive « Scale-Out », et découvrez comment Commvault avec ses offres HyperScale Software et HyperScale Appliance vous permettra de répondre à vos exigences de protection des données et d’évolutivité pour votre organisation.

    Ce Webinaire vous présentera comment une architecture de sauvegarde « Scale-Out » peut :
    -Eliminer la complexité des évolutions de la plateforme ;
    -Proposer une flexibilité de type cloud ;
    -Augmenter la disponibilité et la robustesse de la solution ;
    -Limiter les tâches d’administration par automatisation et libre-service ;
    -Optimiser les investissements avec une architecture basée sur des serveurs standardisés et du stockage cloud.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Jan 23 2018 10:00 am UTC 45 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Scale Out, Not Up: Modernise and Simplify your Data Management Infrastructure
    Scale Out, Not Up: Modernise and Simplify your Data Management Infrastructure Marc Lucas, Commvault and Alex Raben, COOLSPIRiT Jan 23 2018 10:00 am UTC 30 mins
    Is your data protection infrastructure slowing you down? Staff and time are a limited resource. But all too often, addressing tactical matters supporting your systems consumes most, or all, of both.

    Eliminate the slowdown and consolidate the point solutions and appliances that consume your time.

    In this webinar we will introduce you to an appliance that gives you a turnkey data protection solution that’s designed, tested, built and supported entirely by Commvault. With it, you’ll save time across:

    Acquisition: you won’t have to research components and compatibilities, or manage complicated orders

    Installation and Integration: no need for your team to assemble, test, and monitor multiple components

    Administration: with a simple, intuitive graphical user interface, an IT generalist can monitor performance, set policies, and enable self-service capabilities

    Patching: a single update puts you on the latest software version, eliminating the need to track compatibility across vendors

    Support: one call is all you’ll need to resolve any issue across the entire hardware and software stack

    You can choose to scale out the appliance, or choose Commvault HyperScale™ Software with your preferred hardware vendor.

    Join us to learn more about this game-changing solution.
  • Impacts for Workspace Management and Transformation Providers
    Impacts for Workspace Management and Transformation Providers Dr. Andreas Stiehler, Principal Analyst, PAC & Michael Collins, ASG Jan 23 2018 2:00 pm UTC 60 mins
    Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.

    In this webinar you will learn how:

    - To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry

    - To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service

    - A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies

    - We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
  • What’s New in Cloud Management?
    What’s New in Cloud Management? Rory Choudhuri, EMEA Solutions Product Marketing Director Jan 23 2018 2:00 pm UTC 60 mins
    A slew of updates to the vRealize Suite of Management products have been announced and will be available for download shortly. This webinar will provide you with an overview of what’s new, as well as a recap of the value you can derive from the various products covered, which include:

    • vRealize Suite (Automation, Operations, Business)
    • Log Insight
    • vRealize Network Insight
    • vRealize CodeStream
    • vRealize Orchestrator"
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 4:00 pm UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy
    The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Eric Avigdor, DIrector of Product Management at Gemalto Jan 23 2018 4:00 pm UTC 60 mins
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • How to Put Your Business on the Fast Path to Azure
    How to Put Your Business on the Fast Path to Azure John Mutchek, Cloud Architect at Microsoft, Tim Laplante Director, Product Management at Carbonite Jan 23 2018 5:00 pm UTC 30 mins
    Every business is trying to stay ahead of the technology curve by putting their data in the cloud. Identifying the best cloud platform to trust with your data, and finding a single provider capable of creating cloud solutions designed for you and your business needs, are the keys to a successful transition.

    Join our exclusive webcast for a technology overview that shows why Microsoft Azure is the most trusted cloud for business data. You’ll also learn about Carbonite’s solutions for quick Azure on-boarding and protection of your cloud data.

    Sign up today for this joint 30-minute webcast by Microsoft and Carbonite and learn how your business can accelerate its movement to the Azure cloud.
  • What Makes a Visionary? Qumulo in the Gartner Magic Quadrant
    What Makes a Visionary? Qumulo in the Gartner Magic Quadrant Nate Odell - Senior Director of Marketing Jan 23 2018 6:00 pm UTC 30 mins
    In our first year in Gartner’s Magic Quadrant, we were named a visionary for distributed file-systems and object storage. Find out what sets us apart from the rest of the storage market in this live webinar.

    During the webinar, we’ll cover:
    - How Gartner makes their Magic Quadrant selections
    - What the distributed file-system and object storage market looks like today
    - An overview of Qumulo technology and why we were named as a visionary in the category
    - Why QF2 is one of the highest Gartner Peer Insights review ratings

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • Apple IT Trends for 2018
    Apple IT Trends for 2018 Nick Thompson, Product Manager, Jamf Jan 23 2018 7:00 pm UTC 60 mins
    It’s been a busy year for Apple. From unveiling new products and operating systems to forming new enterprise relationships, Apple continues to evolve its capabilities and best practices for managing Mac, iPad, iPhone and Apple TV devices. Before you finalize your IT plans for next year, join us for a look back at major Apple milestones and enjoy a glimpse at where Apple may be headed in the future. 

    In our webinar, Apple IT Trends for 2018, we’ll examine the strategic moves made by Apple and explain what they mean for you in the new year.
    We'll cover:
    •Apple IT accomplishments in 2017
    •Predictions for Apple IT trends in 2018
    •IT initiatives to consider and provide examples of organizations already implementing them
  • How Does Object Storage Fit into Your IT infrastructure?
    How Does Object Storage Fit into Your IT infrastructure? John Bell, Senior Consultant & Tony Barbagallo, VP of Product Jan 23 2018 7:00 pm UTC 60 mins
    If you’ve been wanting to benefit from object storage but are not quite sure how it fits into your infrastructure, this webinar is designed for you. VP of Product Tony Barbagallo and Sr. Consultant John Bell will review reference architectures for a variety of use cases based on hundreds of object storage installations, ranging from government and research to medical and M&E.
  • Desire & Reality: What is needed for the Workplace of the future?
    Desire & Reality: What is needed for the Workplace of the future? Manfred Bremmer, Senior Editor IoT & Mobile, COMPUTERWOCHE & Michael Collins, Global Vice President, Workspaces Practice, ASG Jan 24 2018 2:00 pm UTC 60 mins
    Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.

    But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.

    Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.

    Michael Collins from ASG Technologies will address details like:

    - How to close the gap between the needs of the enterprise and personalization
    - Why it is important to include employees in the planning of their workplace at an early stage;
    - How to implement the right mix of standardization and individualization and:
    - Why more flexibility & agility for employees leads to higher productivity.

    In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
  • VMware Cloud Foundation: An Essential Building Block to Modernize Infrastructure
    VMware Cloud Foundation: An Essential Building Block to Modernize Infrastructure Clive Wenman, Staff Systems Engineer, Cloud Foundation Jan 24 2018 2:00 pm UTC 60 mins
    To respond to the ever-increasing demand for faster innovation, organizations are looking to shift to a more agile, service-oriented IT model that leverages the hybrid cloud. Customers are looking for a modern infrastructure that is based on a software-defined platform, delivers enterprise capabilities, and establishes a common operational model across public and private.

    Attend this session to learn how VMware Cloud Foundation provides a unified software-defined data center platform for the hybrid cloud. As an integrated stack that can be deployed on-premises or run as a service from the public cloud, VMware Cloud Foundation establishes a consistent operational model across clouds.
  • Vertica Demo: Exploring S3 and HDFS Data Lakes
    Vertica Demo: Exploring S3 and HDFS Data Lakes Satish Sathiyavageswaran, Tim Donar and Jawahar Annaldasula, Vertica team Jan 24 2018 4:00 pm UTC 60 mins
    Looking for a way to get the most of your data stored in Hadoop? During this 45mins demo you will learn how you can use Vertica to analyze your data in place on HDFS or S3 storage and avoid moving and reloading. Vertica SQL on Hadoop is platform agnostic and will integrate with any distribution of Hadoop. In addition, a comprehensive set of in-database Machine Learning functions built-in to Vertica allow analysis in place without sampling or movement of large datasets. Join us to see it in action!
  • NetApp and Commvault Working Together to Protect the Next Generation Data Center
    NetApp and Commvault Working Together to Protect the Next Generation Data Center Erik Kemp - Technical Marketing Engineer, NetApp; Charlie Patterson - Alliance Architect, CommVault, Jan 24 2018 4:00 pm UTC 60 mins
    This webinar will highlight:
    •How NetApp and Commvault’s innovative data management capabilities allow you to get the most out of your Next Generation Data Center while ensuring your data is protected
    •Commvault IntelliSnap integration with NetApp SolidFire and NetApp HCI (Element OS) along with the NetApp product portfolio
    •Seamless Application Integration

    Speakers will be Erik Kemp, Technical Marketing Engineer, NetApp and Charlie Patterson, Alliance Architect, CommVault.
  • Self-Hosted Kubernetes: How and Why
    Self-Hosted Kubernetes: How and Why Diego Pontoriero, Software Engineer Jan 24 2018 6:00 pm UTC 60 mins
    How Kubernetes is deployed and managed has changed since the first release of the project. From configuration management systems and unit files to deploying Kubernetes using Kubernetes, a lot has changed.

    Self-hosted Kubernetes has many benefits as a deployment option, and this webinar will highlight those benefits, as well as explain the history and nuances of making self-hosted Kubernetes possible.This webinar will describe what self-hosted Kubernetes means, why it exists, how it came into existence, and what you need to know if you're running a self-hosted cluster. Many tools now deploy self-hosted clusters including bootkube and kubeadm, so knowledge of how this works can be very important for anybody running a Kubernetes cluster.

    What are the benefits of self-hosting? How does it work? What do I need to know if I'm administering a self-hosted cluster?

    All those questions and more will be discussed in detail in this webinar. In addition, I will discuss how various projects and products take advantage of the many benefits of self-hosting, such as Tectonic.
  • Optimizing SQL Server Instances You Don’t Control
    Optimizing SQL Server Instances You Don’t Control Rodrigo Medeiros, Sr. Solutions Architect, Databases, DataCore Software Jan 24 2018 7:00 pm UTC 60 mins
    When you’re responsible for the care and feeding of packaged business applications, it can be quite challenging if not impossible to make meaningful changes that improve responsiveness, especially when the underlying database is struggling to keep up.

    Watch this webinar to learn:
    - What could be the root of the problems you are experiencing
    - Ways to identify your problems
    - Simple solutions you can implement without anyone else’s help
  • New Product Release: LTO-8 Tape Drives
    New Product Release: LTO-8 Tape Drives Kieran Maloney, Solutions Product Manager; Terry Grulke, Principal Technical Advisor Jan 24 2018 8:00 pm UTC 45 mins
    Learn about the features of the latest linear tape-open data storage technology release - details about changes to the technology, specific cost of ownership comparisons versus proprietary tape, and the future road map for development.

    The latest release brings enhancement to capacity, performance, error rate, material, cost of ownership, and diversification. LTO advancements complement Quantum’s Scalar® libraries, offering an excellent solution to address today’s big data challenges and replace end-of-life proprietary tape systems.
  • Automate IT: The Key to IT Agility
    Automate IT: The Key to IT Agility Matt Steiner, Product Management, Evangelist, Strategist Jan 25 2018 11:00 am UTC 60 mins
    The digital economy is driving the need to dramatically speed up application development and delivery. Fundamental to faster delivery of applications, is automating the delivery of associated IT resources, including networking and security services. Early adopters are achieving impressive results by automating IT processes that were once manual, time-consuming, and error-prone.

    Automation enables a high level of agility to meet business demand. Fully automating the IT service lifecycle is enabled with VMware vRealize® Suite and VMware NSX®. The native integration of these technologies provides the ability to automate the full lifecycle of compute, storage, network, and application services across private and public clouds. It enables you to offer self-service provisioning of infrastructure and full application stacks to reliably and securely accelerate application development and delivery.

    Join us for this webcast and learn about:
    • Automation: The Key to IT Agility
    • Delivering Applications Faster
    • Practical Use Cases"
  • Data Management in the Era of GDPR and Digital Transformation
    Data Management in the Era of GDPR and Digital Transformation Nigel Williams, Commvault Jan 25 2018 2:00 pm UTC 30 mins
    Nigel Williams presents a data management perspective driven both by GDPR together with the shift to digital business. In it, we propose an approach that takes the requirements of GDPR as a catalyst for change and seek a wider set of benefits from the investment made to meet the new privacy requirements - including deriving business value and protecting data more effectively.
  • Transforming the Data Center: Delivering Any Application on Any Platform
    Transforming the Data Center: Delivering Any Application on Any Platform Rory Choudhuri, EMEA Solutions Product Marketing Director Jan 25 2018 2:00 pm UTC 60 mins
    Your data center needs to evolve. The age of digital transformation has pushed the role of the data center beyond headquarters and out to the cloud.

    Today’s competitive climate is placing increased pressure on organizations to emphasize innovation over operations. It’s no longer about running and maintaining traditional infrastructures; it’s about transforming to deliver business agility.

    In this session, you’ll hear from customers that are using VMware’s innovative, software-defined data center architecture to modernize infrastructure, automate IT, and deploy modern cloud native applications and microservices. We’ll feature the latest demos and discuss products and solutions including vSAN, VMware Cloud Foundation, vRealize Suite and Developer Ready Infrastructure that have already been tested at scale in hyperscale cloud providers and are helping enterprises future-proof the data center and deliver better business
  • Using Object Storage to Solve Unstructured Data Problems
    Using Object Storage to Solve Unstructured Data Problems Steven Hill 451 Research, Stefaan Vervaet WD, Molly Presley Quantum Jan 25 2018 4:00 pm UTC 60 mins
    Business is experiencing an increased dependence on unstructured data, such as complex business documents, work products and large media files. This presents a new and growing set of challenges for IT when it comes to preserving, protecting, monitoring and managing unstructured data at scale; and it’s a problem that affects enterprises and service providers alike. We believe that object storage’s massive scalability and rich metadata capabilities supports the collection of the extended information about the data itself—in the form of metadata—to provide customizable and specific reference points for identifying the contents and automating the management of unstructured data at storage-level throughout its entire lifecycle. To document these challenges, 451 Research – in cooperation with Western Digital’s HGST division – has developed and fielded an annual survey that reaches out to a vetted group of 100 enterprise and 100 service provider customers to evaluate the current nature of the unstructured data problem. This program looks to better establish market perceptions about modern object storage, explore current use cases, and outline customer expectations based on responses to our 2017 poll.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0
    Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman Jan 25 2018 4:00 pm UTC 60 mins
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • Building a Big Data Stack on Kubernetes
    Building a Big Data Stack on Kubernetes Pepperdata Founder and CTO, Sean Suchter Jan 25 2018 7:00 pm UTC 60 mins
    There is growing interest in running Apache Spark natively on Kubernetes (see https://github.com/apache-spark-on-k8s/spark).

    Intended for software engineers, developers, architects and technical leads who develop Spark applications, this session will discuss how to build a big data stack on Kubernetes. In particular, it will show how Spark scheduler can still provide HDFS data locality on Kubernetes by discovering the mapping of Kubernetes containers to physical nodes to HDFS datanode daemons. You’ll also learn how you can provide Spark with the high availability of the critical HDFS namenode service when running HDFS in Kubernetes.