The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
This session will open with a discussion on the current market trends in analytics to showcase where companies are investing. We will then cover how to get started on the road of analytics and showcase some transformative effects of analytics to IT operations.
1.Discovery – Find all of the data sources that you have.
2.Insights – Take a multi-variable approach to analytics
3.Actions & Outcomes – Identify 1 initiative at a minimum to get started with analytics
4.The Big Picture – How BI and analytics fit into digital transformation
You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.
Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:
• What psychological authentication involves
• How attackers prey on recipients’ imagination and emotions
• How impersonation attacks are evolving
• What is in the future for impersonation
• How threat intelligence and the speed of email security impact cyber risk
Jevons paradox states that when a resource is used more efficiently, the consumption of that resource actually rises due to the lower prices and/or increased availability of the product. Nowhere in the data center is that more true than when you look at server performance. Storage has always been a bottleneck in compute systems because of the vast performance difference between the storage subsystem and CPU and memory. Together Lenovo, Intel and VMware address the bottleneck of storage performance in Hyperconverged systems with the introduction of Intel Optane technology to Lenovo vSAN ReadyNodes. Join us to hear how these new ReadyNodes from Lenovo will help you to increase the performance of your applications, increase VM density and still improve end-user response times.
In this webinar, which includes a demo, you will learn how to discover unused storage capacity, identify your server and storage array response times, generate an “attached hosts” list with detailed host data for easier troubleshooting, learn how to provision a new host using only a “host name” and improve Oracle’s performance with PowerMax I/O tagging Machine Learning.
The evolution of data science – including machine learning, deep learning, and other forms of artificial intelligence – has had a significant impact on the data analytics landscape in recent years, and looks set to drive considerable change in the market in the coming years.
In response, 451 Research’s new Data Management and Analytics Market Map 2018 includes a complete re-categorization of our Analytics Market Map to reflect the realities of analytics users and use cases today, dividing the analytics market into four key sectors:
•Data science tools
•Data science platforms
During this webinar, 451 Research’s Research Director, Data Platforms and Analytics, Matt Aslett, will explain the rationale and definitions behind the new categorization, as well as identifying the key challenges and innovations that will shape the analytics and data science market, and also revenue and growth expectations.
The webinar will also touch on other aspects of note delivered with the Data Management and Analytics Market Map 2018, including:
•The ongoing evolution of Corporate Performance Management
•The addition of Data science Management to the Data Management Market Map
Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.
AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.
Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:
- What the shared responsibility model means for the security of your cloud assets
- Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
- How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
- Benefits of an all-in-one security solution for threat detection, incident response and compliance management
Group Product Marketing Manager
Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.
Sr. Technical Manager, Sales Enablement for North America
Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
Attendees will learn how you can:
•Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
•Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
•Minimise Total Cost of Ownership and increase ROI by an average of 153%
Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
This webinar covers how Qubole extended Apache AIRflow to manage the operational inefficiencies that arise managing data pipelines in a multi-tenant environment. Qubole also shares how to make data pipelines robust by adding data quality checks using CheckOperators.
- Overview of major types of data pipelines
- How Qubole manages deployments and upgrades of data pipelines in a multi-tenant environment
- The Data quality issues that arise during data ingestion or transformation.
- The approach that Qubole has adopted using Apache Airflow Check operators
- The best practices in using Apache Airflow for data quality checks.
The journey to the cloud had just had a major breakthrough.
With VMware software now available on the global AWS Cloud, there is now a single, consistent, pervasive connectivity and a secure platform for apps and data. Whether that is in the Datacenter or in the AWS Cloud. This gives you the power to move existing applications seamlessly to the cloud and back as needed.
You’ll understand how you can quickly get workloads on the cloud without having to re-engineer your applications. Keep applying the skills you've developed on the VMware platform, backed by the large array of services in the AWS platform. This allows you to be agile, reduce capital costs and increase availability for innovations.
In this webinar, we will show you:
- How, as a VMware customer, you can go into the cloud without retraining, reconfiguring your apps, refactoring and more
- What it will mean to have immediate access to the AWS platform and services and how it'll accelerate innovation
- Immediate value Business Cases related to increased agility, disaster recovery, and stretch networking for high availability.
Scott Mathewson, Data Center Practice Lead, North America, Softchoice
As Practice Lead for Softchoice North America, Scott has over 25 years of Datacenter experience with EMC, VMWare and Cisco, he is responsible for defining Softchoice assessments and services offerings for VM ware and SDN. Scott works with customers to develop solid solutions as it relates to SDS, SDN, Cloud, management and automation solutions.
Pepperdata Application Spotlight analyzes all Hadoop and Spark jobs running on the cluster and provides developers with technical insights on how each job performed. Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar demonstrates how Application Spotlight helps developers quickly improve application performance, reduce resource usage, and understand application failures.
Learn how developers can:
– Maximize performance, improve productivity, guarantee reliability, and improve ROI
– Generate application-specific recommendations to improve application performance
– Highlight applications that need attention
– Automatically identify bottlenecks, and alert on duration, failure conditions, and resource usage
– Search for any applications running on the cluster, compare current and previous runs
– Visualize Spark applications and its stages for easy root cause failure analysis and performance tuning
Presenter Bio: Field Engineer, Kirk Lewis
Kirk Lewis joined the Pepperdata team in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
As enterprises continue the steady migration towards the cloud, a new data architecture is gaining popularity that takes advantage of the natural separation of compute and storage the cloud provides. By separating the query engine from the data layer, companies are able to elastically scale each independently and optimize for the lowest cost and highest performance.
The open source Presto project was purpose-built for this and is being used by leading companies like Facebook, Airbnb, Uber, Netflix, and LinkedIn to empower analysts and data scientists to run SQL queries on data no matter where it resides, whether that's Hadoop, S3, or a traditional RDBMS.
Join this webcast to learn why companies are changing the very definition of what a "database" is and using Presto to query anything, anywhere.
BI and Big Data veterans Matt Aslett, Research Director at 451 Research and Justin Borgman, CEO at Starburst will deliver this session covering current industry trends, real use case scenarios and answering questions from the audience.
In this webinar you will learn:
- The pros and cons of separating query from storage
- An overview of the open source Presto project
- How to apply the principles of this cloud architecture in both public and private clouds
Leverage Threat Intelligence where it matters most.
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.
This month's theme: Insider and Privilege Misuse
Our Verizon Threat Research Advisory Center presenters will be:
• John Rudolph, Principal Consultant, Identity and Access Management
• Steve Atnip, Senior Analyst, Threat Intelligence
• David Kennedy, Managing Principal, Open Source Intelligence
• Laurance Dine, Managing Principal, Investigative Response – EMEA
For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:
It’s Time to Embrace Hybrid Cloud VDI with Nutanix InstantON for Citrix Cloud
Nutanix and Citrix have partnered to create a tightly integrated hybrid cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.
In this webinar, you will learn how Nutanix and Citrix allow you to:
· Take advantage of enterprise-class VDI benefits without any complexity
· Simplify desktop management and operations while increasing security and compliance
· Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
· Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.
In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
When it comes to High-Performance Computing (HPC), the volume of data that comprises data sets can easily over-burden primary storage. When that happens, performance and speed are compromised and research and business objectives are at risk. As data sets continue to grow, more and more HPC organizations are turning to object storage technology to build active archives. Learn how adding cost-effective object storage into your storage infrastructure can reduce storage TCO, provide continuous data protection, and give you the power of metadata so you can quickly retrieve data when you need it.
If you’re working in a technology role in the healthcare field, whether you’re in a hospital or clinic, working in a company producing the latest breakthrough treatment or working in an organization helping patients on the financial side of their health, you know that you have unique technology needs that many other companies may not. You also know that you need technology that enables rather than hinders you, and you may be wondering how some leading-edge healthcare organizations are making this happen right now.
ActualTech Media is partnering with some of today’s leading enterprise IT vendors to bring you a very special EcoCast focused exclusively on healthcare IT. Audience members that have an affiliation with any area of healthcare, medical, life sciences, or similar areas will be treated to very special healthcare-specific presentations from data center technology providers Nutanix, Zerto and DataCore.
During this event, you will hear how the solutions offered by these vendors can help your organization improve critical metrics, whether those metrics are financial or whether they’re around saving and improving lives and healthcare outcomes.
Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.
In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.
Register for the August edition of the White-Hat Files here: https://www.brighttalk.com/webcast/16347/330367
In this webinar we will discuss the architectural design considerations that went into the development of VxRack AS, which provides an unparalleled platform for Azure Stack deployment and sustainability.
As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.
Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.
This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
In this age of extreme data growth and variety, ever more stringent regulations, complicated hybrid environments including physical, virtual and cloud, and reducing IT budgets, Micro Focus has released version 10 of its Data Protector platform, part of the Micro Focus Data Protection Suite. In this webcast attendees will learn how they can better protect their applications across legacy and modern platforms, use analytics to track and manage SLAs and improve the security of their backup to mitigate the risk of cyberattacks when they upgrade to Data Protector 10. A live demo of the new features will be shown should time permit.
Secondary data operations such as backup, file & object storage, copy management and DR have become cumbersome, expensive and ultimately risky due to complex infrastructure that hasn't seen true innovation in decades.
Watch this on-demand webinar to see how Cohesity is bringing Google-like design principles such as web-scale, hyperconvergence and native cloud integration to a new platform that's been specifically designed to address the needs of secondary data and apps.
Discover the latest from Dell EMC Data Domain, the industry’s #1 protection storage. Hear what's new, expansions to the ecosystem, and the introduction of the DD3300 for small, midsized & ROBO environments. Plus, hear how Data Domain Virtual Edition saved the day for a customer when Hurricane Irma blew into town. Keep your mission critical data safe with Data Domain.
Earlier this month, FireEye revealed an extensive cyber espionage carried out by China-linked TEMP.Periscope which targeted Cambodia’s political system. The effort—which was covered by Bloomberg, Time, Associated Press and others—compromised multiple ministries, diplomats and opposition members. It was carried out by China’s second most active cyber espionage groups, which has previously targeted US-, Europe- and Asia-based organizations.
Join Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst for the webinar to learn more about TEMP.Periscope’s mission, and its attacker tactics, techniques and procedures.
Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.
Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :
* Augmenter la disponibilité du réseau tout en simplifiant la connectivité des outils grâce à une solution de module bypass
* Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés tout en réduisant la complexité de leur exploitation
* Diminuer les coûts OPEX et CAPEX via un ROI très court-termisme
Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
DevOps methodologies have become extremely popular to enable agile application development and delivery.
Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.
In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.
Attend this webinar to learn how to:
•Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
•Avoid external out-of-band network connectivity problems that require separate and manual handling
•Ensure continuous compliance and auditability throughout the application delivery process
•Get clearly documented application connectivity requirements which help prevent disruptions to the business
•Bridge the gap between application developers and network security throughout the entire application lifecycle
One of the defining characteristics of the IT and Digital Transformations is the tremendous drive to put that data to work. The need for insights from data is reshaping IT, from the data center to the cloud. At the heart of the matter, so to speak: how that data is stored, accessed and managed. Tune in to this webcast to hear the latest from IDC’s Eric Burgener and Dell EMC’s Caitlin Gordon. You’ll get insights on the storage market; how storage is transforming, and a dive into Dell EMC’s PowerMax technology powered by Intel® Xeon® processors.
Gone are the days that IT was focused on configuring, managing or troubleshooting infrastructure. The lines between "Clouds" are continuing to become blurred more and more. IT now demands simplicity; the business demands that all applications run fast and perform reliably. In this session, our experts will discuss the evolution of the datacenter focuses on a few core tenants: Simple. Scalable. Reliable. Secure.
This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
IT deployment has evolved rapidly over the years, driven by its growing influence as it shifts from being a competitive differentiator to a core strategic asset. In a world where digital transformation and digital disruptors are redefining the status quo across large swaths of industry verticals, IT upgrades are now closely watched by the C-Suite.
Despite this, many organizations continue to cling to a rigid 3~5 year refresh cycle across their estate, primarily driven by an OEM’s EoL timetable.
In this 45-minute webinar, Curvature subject matter experts will discuss:
•Common myths associated with aging HW and access to SW updates
•When is third party maintenance a good fit? (hint: much earlier than EoL)
•How to apply a “Fit for Purpose” life cycle to challenge the OEM’s EoL Life cycle
As the global leader in independent IT support, products and services, Curvature is transforming how companies manage, maintain and upgrade equipment and support for multi-vendor, multinational networks and data centers. At a time of competing IT priorities and digital transformations, companies need to be nimble, efficient and smart in how they invest in IT and business innovation. A strategic partner with more than 15,000 organizations globally, Curvature specializes in delivering 24x7 global technical support, advanced hardware replacement, and complete lifecycle management of networking and data center equipment under one global contract from locations in the Americas, Europe and Asia. For more information, visit us at www.curvature.com
Whether for private clouds, public clouds or a multi-user environment, IT operators require an infrastructure solution that can instantly spin-up data-intensive workloads and that can scale to support multiple big data workloads or tenants. Attala Systems and Intel have partnered to create a solution that delivers composable storage with local NVMe performance for big data workloads like Apache Hadoop and Spark. The performance available to direct-attached PCIe flash is welcome, but cloud total cost of ownership (TCO) is better when storage is shared to many hosts while offering the elasticity to meet dynamic tenant demands. The maturing of the NVMe over Fabrics (NVMe-oF) specification enables local NVMe performance over a network. With remote direct memory access (RDMA), NVMe actions and data can be transported over a fabric such as Ethernet. This brief illustrates how a complex big data analytics workload is well served by Attala Composable Storage with Intel® 3D NAND SSDs. This workload—which once struggled to scale to support concurrent customers when serviced by an iSCSI appliance or enterprise storage area network (SAN), is shown to match local NVMe performance and scale independently for two customers with no degradation in application runtime when using the NVMe-oF target.
How do you ensure your staffing plan meets your business's performance and risk requirements? Do you have an appropriate training program to drive a culture of continuous improvement? How can you evaluate and enhance your training program to ensure continuity of expertise, and retain key employees?
Product managers often have challenges getting all necessary quantifiable metrics to make informed product decisions. How do you know if you are looking at the right information (and is it all of the information you need)? And now what do you do with this data to ensure that the users experience is the best possible?
Join our webinar with Luma Health, an innovator in the Patient Experience space, to learn how they’ve gained full visibility into their user journey and how each product contributes to the company’s overall revenue metrics, ensuring they are fulfilling their customer’s expectations (and innovating new ways to support them).
In this webinar, you will learn:
- When it is time to turn to advanced analytics
- Tying together disparate product data sources
- How product metrics can help serve different customer needs
- Lessons learned along the way
Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.
Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.
Die Teilnehmer lernen, wie man:
* Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
* Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
* Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert
Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
Cyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Attacks not only places a financial strain on organizations, but can also hinder their ability to conduct normal business operations, which affects sales transactions and market reputations.
Join Jon Horner, Senior Consultant, Mandiant, a FireEye company and featured speaker, Katherine Keefe, Head of Beazley Breach Response Services, Beazley Group as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item. After this session, you’ll be able to educate your leaders on:
• Common costs of a breach, which involve number of records affected, remediation efforts, revenue loss and reputational backlash
• Processes to estimate each type of cost
• Risk mitigation activities to help reduce future costs
451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.
During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.
The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.
With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.
Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:
- Why Managed Security
- Types of Managed Security Services
- Benefits of Outsourcing Security
- How to Select the right MSSP
VP of Global Channels
Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
Cloud service models have become the new norm for enterprise deployments in almost every category — and big data is no exception. As the volume, variety, and velocity of data increase exponentially, the cloud offers a more efficient and cost-effective option for managing the unpredictable and bursty workloads associated with big data compared to traditional on-premises data centers.
Organizations looking to scale their big data projects and implement a data-driven business culture can do so with greater ease on the cloud. However, adopting a cloud deployment model requires a cloud-first re-architecture and a platform approach rather than a simple lift and shift of data applications and pipelines.
A cloud-native data platform like Qubole helps organizations save on average 50 percent in total cost of ownership. Intelligent automation of cluster management tasks allows data teams to focus on business outcomes, thereby greatly improving SLAs and the end-user experience.
Join experts from Qubole as they discuss how to activate your big data and get the most out of open source technologies on the cloud. In this webinar, you'll learn:
- How big data projects benefit from a cloud-native data platform
- How intelligent cluster management can help you save in total cost of ownership
- About companies that successfully transitioned their big data to the cloud
- How to evaluate cloud data platforms for your big data needs
This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
-How to migrate services from standard SCSI based to NVMe-oF based
solutions using FC
-Detailed architectural analysis and benefits achieved by deploying NVMe-
oF via GbE.
-Tradeoffs and decision to utilize mixed mode FC and GbE deployments.
In addition to the presentation, there will be a brief demo of the Vexata
NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
Welcome to Enterprise Cloud 101! This session will provide an introduction to Nutanix software, architecture, and complete feature set. Nutanix experts will show how Nutanix combines HCI storage, virtualization, software defined networking and compute services into the Enterprise Cloud OS that can run on off-the-shelf x86 servers. See how the Enterprise Cloud OS goes beyond legacy datacenter architectures and prepares your business for the hybrid cloud future.
In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing.
Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
Automation is turning manual or repetitive IT tasks into a thing of the past—including in the data center. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you’ll explore Nutanix APIs—from provisioning to other Day 0, Day 1 operations.
Join this webinar to learn how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, and even backup/DR. We’ll review available APIs and conduct live demonstrations of integrations and the automating common IT tasks.
Tarek Parekh - Principal Product Manager, Nutanix
Zankhana Pathak - Member of Technical Staff, Nutanix
Mukesh Baphna - Director, Engineering, Nutanix
David Hess, Principal Infrastructure Architect Cyxtera
As security threats become more sophisticated, infrastructure design and policy need to be able to respond.
Learn the common use cases for securing applications and users via VM microsegmentation. Nutanix engineers will walk through design considerations for creating microsegmentation policy, and demonstrate how Nutanix Flow provides the application visibility and policy controls to quickly and easily deploy microsegmentation in your environment.
Multitenancy in cloud is nothing new. Providers and organizations have long leveraged this model to manage costs and complexity as well as enable access to the latest releases and technology. Within a multitenant environment, resources are shared with all the other users of the cloud which leads to concerns about control and confidentiality of data and workloads. In a recent study, over two thirds of IT professionals say security is their most significant concern in adopting an enterprise cloud computing strategy.
In this live webinar, TierPoint Vice President of Architecture and Engineering, David Hines will address some key considerations for tackling security concerns in a multitenant environment including:
• Ensuring each layer of the environment is designed with strong isolation properties
• Leveraging encryption to create logical isolation from other tenants and data protection
• Understanding how the environment is protected from outages or high-volume usage
Businesses today are seeking to adopt hybrid cloud architecture and boost cloud flexibility to improve their responsiveness, and enable more rapid innovation. However, lack of public cloud consumption visibility and security concerns lead to uncontrolled spend and security vulnerabilities.
Learn about Nutanix cloud management capabilities that enable organizations to provision and maintain applications across multi-cloud environments, optimize cloud consumption and centralize governance and security compliance. We will discuss some of the most pressing customer challenges such as public cloud cost visibility, compliance, and application vulnerability management.
Driving automation and self-service across private and public clouds is the strategic goal for many CIOs. While many of the fundamental building blocks have long been available, they have been missing a unified, full-stack, orchestration layer that works across multiple cloud environments.
In this session, we’ll explain and demonstrate Nutanix Calm, which provides cloud operators with a one-click self-service capability to automate application provisioning and lifecycle management across multiple environments, making the entire IT infrastructure more agile and application-centric.