Data Center Management

Community information
The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
  • This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
    Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
    This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
    Key takeaways:
    -What is a software vulnerability
    -How a software vulnerability becomes a threat
    -A glimpse of how threats multiply
    -How closing vulnerabilities impacts risk reduction
  • In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant? Are you really sure they are not inadvertently creating holes in your network and exposing your organization to cyber criminals? The Target breach – and many others like it – should at least make you double check your practices.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will cover best practices for managing external connectivity lifecycle to and from your network, including:

    • Defining the right infrastructure, network segmentation, security controls and additional security protections
    • Managing changes to connectivity for third party applications or data feeds
    • Routing partner traffic through your network
    • Auditing and compliance challenges for both you and your partner
    • Technical considerations for managing the business and ownership aspects of third party connectivity
  • This year’s Storage Developer Conference (SDC) is expected to draw over 400 storage developers and professionals. Get a sneak preview of key cloud topics that will be covered at SDC in this live Webcast where an expert panel will discuss:

    · Mobile and Secure - Cloud Encrypted Objects using CDMI
    · Object Drives: A new Architectural Partitioning
    · Unistore: A Unified Storage Architecture for Cloud Computing
    · Using CDMI to Manage Swift, S3, and Ceph Object Repositories

    You’ll learn how encrypted objects can be stored, retrieved, and transferred between clouds, how Object Drives allow storage to scale up and down by single drive increments, end-user and vendor use cases of the Cloud Data Management Interface (CDMI), and we’ll introduce Unistore - an innovative unified storage architecture that efficiently integrates heterogeneous HDD and SCM devices for Cloud storage systems.
    This Webcast is live so please bring your questions for our esteemed panel of experts.
  • Anuta NCX is a leading Network Services Orchestration solution (MANO) provider for NFV. In this webinar, Anuta CTO Srini Beereddy will share details about world-wide Service Provider customer deployments and NCX product architecture. The demonstrations include NFV use-cases such as Virtual CPE, Virtual MPLS backbone and Virtual Data Center using OpenStack as Virtual Infrastructure Manager (VIM). The demonstrations include multi-vendor VNFs such as Brocade Vyatta 5600 vRouter (with Intel DPDK support), Cisco CSR1000v router, F5 LTM VE, Juniper vSRX and Riverbed Virtual Steelhead. In addition, Srini will share how NCX orchestrates hybrid networks consisting of legacy PNFs and VNFs to further accelerate NFV adoption.
  • The critical applications and services your end-users rely on every day can be deployed on-premise, hosted in the cloud, or even SaaS applications provided by a 3rd party that never cross your infrastructure. Your users don’t care where the app is running; they just need it to be available…and fast. And when there is a problem, they expect IT to resolve it!

    Join us on this webinar and see how to get visibility to all your applications so you can quickly and proactively identify where the problem is and resolve it quickly. Then, it really won’t matter where the applications are deployed!

    And the best news is that you can combine this application visibility with analysis from your OptiView XG. During the webinar you will learn:

    •The challenges of today’s Borderless Enterprise (aka – the network is outside of your 4 walls!)
    •How to monitor all your applications
    •How to use this visibility to extend your OptiView XG

    BONUS: There is a Special Promotion for OptiView XG owners!
  • Find out how you can accelerate application performance, lower IT costs, and maximize uptime by using Tegile Intelligent Flash.

    In this demo, you can:
    •See how easy Tegile arrays are to provision, monitor and manage
    •Check out how all-flash and hybrid arrays can be managed using the same tools
    •Find out how our IntelliFlash architecture boosts data performance and cuts costs
  • This webinar is a webinar focused on a strategic view of risk mitigation:
    Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
    Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
    In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
    Key takeaways:
    -Fresh data related to software vulnerabilities
    -The challenge of prioritizing mitigation
    -How the use of vulnerability intelligence can help support consistent risk reduction
  • SAP environments continue to increase in both size and complexity, spanning multi-platforms and cross-enterprise processes. To efficiently manage workloads within those environments, you need to remove the constraints that impact performance and business results. Success requires a smooth way to analyze your system environment and gather operational data from your application environments.

    Reduce workload pressure. Join Roy Illsley, Principal Analyst Infrastructure Solutions at Ovum and Karthik Mahadevan, Sr. Principal Product Manager from CA Technologies as they examine how SAP Administrators can take advantage of automation tools. Find out how you can easily manage and monitor job scheduling for both SAP and non-SAP processes.
  • Chris Tsilipounidakis gives you an overview of the Tegile IntelliFlash dashboard and user interface. Explore the various widgets, learn how to gain additional insight into storage performance and capacity, and see how you can simplify storage administration with a Tegile Intelligent Flash Storage Array.
  • Ravindra Swamy, Chief Technologist and Ankur Gupta, VP –Client Services will present Aptus Data Labs’ data to decision (D2D) framework, Big Data / Hadoop Services & best practices.

    Paul Scott-Murphy, Vice President of Field Technical Services for WANdisco will introduce WANdisco Fusion, the only active-active solution for total data protection and availability across Hadoop distributions and storage and the advantages of implementing this in your business.
  • The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • The enterprise WAN is adapting to address the pervasive availability of broadband Internet, the shift of applications to the cloud and the increasing demands for real-time, online and critical applications in the branch office. At the same time enterprises have made significant investments in their existing WAN architecture infrastructure network equipment and WAN services. Many enterprises are evaluating an SD-WAN solution as a way to address the changing enterprise landscape without decommissioning their existing WAN any time soon.

    VeloCloud will guide you through various flexible architectures and transition steps for SD-WAN that target maximum return while minimizing disruption and risk. Examples of how a cloud-delivered SD-WAN enables flexible transition and deployment in both hybrid and Internet only branches will be shared.
  • Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • In this presentation you will learn how Mobile Edge Computing (MEC) can enhance functionality, drive additional revenue and enhance cell performance. The solution provides enhanced Video, Voice, and Data services and while providing metadata on the activities at the edge. In this virtualized world with smart phones and tablets becoming the key tools of any business, we will discuss how to make these tools more effective and efficient. We will present business cases and discuss why MEC is the next step to beating the competition. As part of our MEC Smart Perimeter offering we have included a Mobile Edge Manager to simplify and speed up implementation of MEC into any work environment.
  • Does Your Organisation Really Know it's True or Total IT Cost and do they properly allocate to the Business?

    IT spend has become one of the largest budget line items in companies today. IT organizations worldwide spent over $4 trillion dollars in 2013 alone. Despite the growth in IT spend, many IT organizations do not have the capability to clearly and easily articulate where that spend is going, how it correlates to the services they are delivering or what value the business is realizing from the services.

    In order to stay competitive, businesses are seeking ways to optimize and align future IT investment decisions with the strategic direction of the company. By making all of the costs of running IT transparent, IT can change the way business units consume IT resources, drive down total enterprise IT costs and focus on IT spending that delivers real business value.

    Join Jerry Wertelecky as he discusses:

    • Facilitate collaboration between IT and Finance to increase visibility into the costs, utilization and operations of all IT Services

    • Leverage a deep understanding of what drives IT costs and performance to improve scenario planning capabilities and make better IT decisions

    • Provide IT cost and consumption data to business owners in the form of a “Bill of IT” to more effectively communicate the value of IT to the business.
  • Running Enterprise IT is probably more complicated now than it has ever been. Many organisations are embarking on transformation projects to take advantage of the modern hybrid world. But with all that complexity how do you make sure your transformation is a success? Join HP to take a look at some of the areas you need to be considering when transforming your environment to achieve the better service levels and efficiencies you are striving for. We’ll talk about everything from discovering interdependencies through automation and changing the way you manage your new environment.
  • The CIO is faced with reconciling the, apparently, irreconcilable. How does he build a cost effective technology platform that provides business agility, and manages risk?

    In this session, Steve O’Donnell explains the critical success factors in achieving that desired outcome, the considered compromises, the strategies and tactical approaches that the CIO will need to adopt to deliver business benefits and keep his stakeholders onside. He will look at the different types of application and how they need to be managed and hosted. Where do we build, where do we buy and where is configuration the right answer? How do we choose between in-house infrastructure, managed cloud services and engineered systems?

    Join Stephen for a structured approach to providing a cohesive strategy for IT investment that makes sense, and optimises business outcomes whilst being simple enough to gain business stakeholder buy in and approval.
  • How long can you afford to be without data?

    45% of businesses surveyed said that they had experienced a data loss in 2014. Downtime can come from any direction, in any form, at any time. Astonishingly, three-quarters of IT professionals say that they have never calculated the hourly cost of downtime.

    Join Mark Scanlon as he explores how you can reduce the impact of downtime on your business to near zero, whilst making it easier for you to manage your systems.
  • Leaping to Software Defined Storage? Make Sure You Can Answer These Questions:

    1. Is Software Defined Storage Right For You?
    2. What are the Hardware Requirements For Software Defined Storage?
    3. How do you Transition To Software Defined Storage?

    Join George Crump, Lead Analyst at Storage Switzerland and Gavin Mclaughlin, VP of Strategy and Communication with X-IO for this instructive webinar. In this webinar, you will learn the answers to the three key questions, you should ask when considering a software-defined storage strategy.

    All Attendees to this webinar will receive an advanced copy of Storage Switzerland's Latest White Paper, "The Hardware Requirements of Software Defined Storage".
  • Implementing Hadoop can be complex, costly, and time-consuming. It can take months to get up and running, and each new user group typically requires their own infrastructure.

    This webinar will explain how to tame the complexity of on-premises Big Data infrastructure. Tony Baer, Big Data analyst at Ovum, and BlueData will provide an in-depth look at Hadoop multi-tenancy and other key challenges.

    Join us to learn:

    - The pitfalls to avoid when deploying Big Data infrastructure
    - Real-world examples of multi-tenant Hadoop implementations
    - How to achieve the simplicity and agility of Hadoop-as-a-Service – but on-premises

    Gain insights and best practices for your Big Data deployment. Find out why data locality is no longer required for Hadoop; discover the benefits of scaling compute and storage independently. And more.