The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.
Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.
- How to build a secure EA roadmap grounded in your business priorities
- How microservices let you move quickly in keeping up with customer expectations
- How MDM helps you deliver the insights businesses need to make data-driven decisions
We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.
In this webinar we will present how to:
•Protect against application-based DDoS attacks such as HTTP request flooding
•Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
•Implement an advanced threat response policy with Antibot and Google reCAPTCHA
•Implement cluster wide threat protection with a Stick Table Aggregator
•Enhance bot threat protection with WAF and Fingerprint modules
•Dynamically maintain cluster wide whitelists and blacklists
•Monitor threat protection status
Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.
Topics in this panel discussion will include:
- How to drive business value through technology
- Enterprise architecture from a UX perspective
- Cloud transformation and automation, including Robotic Process Automation
- Services and API strategy
- How technologies like Blockchain are changing the enterprise
And much more!
Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
There are already a lot of challenges with IT. But, the explosive growth of data and need to ensure protection has made managing and scaling associated data storage more challenging than ever. Security, compliance and privacy needs as well as public cloud integration add further complexities.
How do you address these challenges cost-effectively while also ensuring you meet service level, application and other requirements?
Join this webinar with experts from Nutanix and Cloudian. Learn how to:
• Deploy a single, petabyte-scale object storage architecture across one or more locations
• Create simple, bucket-level policy-based storage management
• Obtain a unified view of your data across locations
• Ensure compliance, privacy and security
• Take advantage of flexible data protection options
• Leverage multiple compatible data backup and recovery options
SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)
Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.
Speaker: Amr Fahmy
Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.
What you can expect to take away from this session:
•Basic information on how API’s works and the difference between them
•How to integrate third party applications with OpsBridge using API
•Basic Bash Scripts or Python Script depending on the Operation system we will use
Speaker: Bobby Allen
Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.
Attendees will learn the following:
•Elements that must be part of Total cost of ownership (TCO) analysis
•How to analyze public vs. private execution venues
•How to quickly revisit decisions when inputs or market factors change
As data volumes increase, you look for managing your backup footprints efficiently and cost-effectively within your data centers. There is a move to use public cloud services to take advantage of affordable and flexible data storage, but for many reasons, you may want to keep data on-site. HPE Cloud Bank Storage lowers long-term data retention costs by leveraging cloud-based or on-premises object storage. Come and learn how HPE data protection solutions can protect your data wherever it resides: from on-premises private cloud such as Microsoft Azure Stack to public cloud such as Microsoft Azure.
Sustainable Safety Instrumented Systems (SSIS) are a natural evolution of conventional SIS, which allow the key decision makers to optimize their plant’s safety performance without compromising productivity, revenue, and cost. Sustainable SIS incorporates a holistic assessment of operational safety to mitigate and manage risks throughout the lifetime of a plant. It equips all stakeholders to protect businesses from excessive hazard-related downtime. Future growth opportunities will ensure that safety systems in the plant do not become obsolete and help operations run smoothly.
Frost & Sullivan's Industrial Practice expert, Muthuraman Ramasamy, invites you to join us for the webinar: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety. Hear about future growth opportunities, followed by a live question-and-answer session.
Learn how SSIS can benefit your company
Understand the challenges using conventional safety instrumented systems
Identify the need for sustainable safety instrumented systems
Create lasting value to ensure safety systems are manageable
This webinar will outline how successful Digital Transformation requires an evolution of traditional Enterprise Architecture and Security practices.
This will include a brief history of today's rapid paradigm shifts, drivers, benefits and challenges.
Key considerations among several related areas:
- FOSS, mobile
- Cloud architecture & deployment models
- Agile DevOps vs. traditional governance
- Traditional app architecture vs. CloudNative Microservices & FaaS/Serverless
- The rapidly changing data landscape (OLTP/OLAP -- BigData & Streaming Analytics)
Todd Jobson will explore the impact in several of these areas related to successful Digital Transformation, Enterprise Cloud Architecture, as well as considerations related to security. While not intended to be a comprehensive nor prescriptive webinar, it will include several strategic recommendations along with inter-related tactical considerations that most enterprises will encounter along the complex path of Digital Transformation.
About the Speaker:
Todd Jobson is the CTO & Co-Founder of TechThought.org and has 25 years of experience as both a strategic & tactical thought leader across some of the most demanding business & technically complex mission critical environments. His background has included SW Engineer/Manager developing Nuclear Reactor Control & RealTime access control systems for NYPA, directing application architecture & global Integration (as far as Moscow, Russia) as Chief Technologist for SAI, leading a decade of Enterprise (Fortune 50) client architecture & delivery engagements for Sun Microsystems Professional Services, to conducting Enterprise-wide Digital Transformation Workshops/ Assessments & Future State Cloud Architecture enablement for dozens of Oracle's largest customers.
With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.
Join this webinar to learn more about:
- The challenges of detecting data breaches
- Why early breach detection is a more practical goal
- Introducing the data breach kill chain
- Protecting data in your databases – the importance of defense in depth
DUE TO BRIGHTTALK TECHNICAL PROBLEM EARLIER TODAY, WE WERE NOT ABLE TO SHOW THE PRESENTATION THAT GOES WITH THIS WEBINAR AND HAD THEREFORE HAD TO CANCEL IT.
MANY APOLOGIES FOR THIS PROBLEM TOTALLY OUTSIDE OF OUR CONTROL. WE WILL RESCHEDULE AS SOON AS THE BRIGHTTALK ISSUE IS SOLVED.
THANKS FOR YOUR UNDERSTANDING
Security plays a major role in SD-WAN deployments due to the direct internet connectivity inherent to SD-WAN. Any SD-WAN solution and architecture must be considered at both the networking/WAN level AND the security level.
This session will focus on the alternative architectures for deploying SD-WAN and security in view of Gartner’s suggested architectures and NSS Labs SD-WAN test report – the 1st independent SD-WAN group test report.
Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace. Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise.
Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what is best for your organization.
Many companies have focused investments on systems of record such as CRM that manage internal processes and transactions — but they're realizing these tools don't actually help reps sell. Complementary Sales Engagement technologies are "in the room" with sellers and provide insight and guidance with every buyer interaction — so the right message is used for the right prospect, across formats and channels. This webinar will provide an overview of how to utilize Systems of Engagement to improve win rates, including:
· The differences between systems of record and systems of engagement
· Best practices to move beyond activity tracking to measure actual buying signals
· How to use intelligent automation to improve data relevancy contained in CRM or SFA
Start the fall with fresh insight about how to improve sales efficiency and impact using the latest developments in Sales Engagement. Register now!
Enterprise technology has gone through a major shift, and understanding that shift is a prerequisite for a winning game plan. To fully appreciate the new approach, companies must ask some basic questions.
- How is today’s IT different from an organizational perspective?
- Which driving factors are contributing to the flood of new technology trends?
- What are the behaviors that stem from this fundamental IT change?
- What steps should a company take to move forward?
This webinar relies on research across a variety of topics and conversations with IT professionals to provide a description of the way technology is integrated into modern business.
Seth Robinson is the senior director of technology analysis for CompTIA, the leading trade association for the IT industry. In this role, he analyzes technology trends in the IT industry and provides insight into trend drivers and future direction.
An objective of enterprise IT is to architect and deliver a multi-purpose database infrastructure that serves various organization workload demands. In today’s data-driven environment, database systems must be designed to scale from low-end, tactical applications to high-end, strategic workloads and seamlessly accommodate organization data capacity growth. To maximize total value and ROI, longevity of the platform is critical. In this webinar, you will see how Lenovo solutions for SQL Server help you migrate, consolidate and modernize existing SQL Server database environments, and integrate end-to-end data flow/data management practices. This webinar will highlight deployment options for OLTP and Data Warehouse, based on enterprise needs and objectives. Performance benchmarks and Customer case studies summarizing business problems and solution benefits will also be shared.
Modern applications are constructed using open source components. Most organizations understand they’re using open source. What they likely underestimate is its prevalence in their homegrown applications and the potential security and license compliance risks they assume if they’re not continuously monitoring those libraries. When companies merge or are acquired, that unknown risk is transferred, potentially to organizations with greater regulatory exposure. Join Daniel Kennedy, Research Director, Information Security, and Phil Odence, GM, Black Duck On-Demand, for a discussion of these risks and how to address them.
For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.
John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:
Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.
It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.
This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.
About the presenter:
David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.
In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.
David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
Join this live conversation between two senior IT staff of a fictitious company charged with the successful execution of an outsourced arrangement that has just passed its two-year anniversary. Gain insight into the difficulties they are experiencing, their search for the root causes and their development of a plan to deliver targeted improvement.
The conversation includes how they hope to convince the business that they are fully committed to service its needs. How will they tackle the business perception that IT is defending poor support at high prices? How can they motivate the supplier to provide the services needed whilst making a fair return?
About the presenters:
Finsbury Sourcing provides specialist IT and Telecommunications outsourcing project management and consultancy services with a focus on practical implementation. Many of our assignments involve fixing problems in under-performing outsource agreements and the interaction between the parties.
Brendan Mulreany is a director of Finsbury. He has been involved in delivering services for more than 30 years, during which he has worked on some of the largest and most challenging multi-national services in UK, Europe, US and Australia. He has degrees in law and science.
William Hooper is a director of Finsbury. He too has worked on some of the world’s largest IT services, recovering and restoring performance. He is a practitioner and acts as an Expert Witness in legal disputes. He holds an MBA and a bachelor’s degree in engineering.
Both have many years’ experience delivering services as supplier and working client-side.
IT Organizations continue to face challenges due to silo'ed approach to hybrid cloud. Current on-prem data centers have completely different style of networking and governance processes compared to networking in public cloud. With silo'ed teams managing these disparate environments, there are greater complexity and constraints in application deployment, higher costs, and longer deployment cycles.
Big Switch Networks has pioneered a Cloud-First approach which completely re-imagines hybrid cloud networking to enable consistency and control across on-prem and any public cloud (AWS, Azure or GCP). It brings public cloud’s virtual private cloud (VPC) based logical networking construct for on-prem networking (enterprise cloud networking) to deliver network automation and visibility for enterprise workloads. In addition, by extending control, governance and visibility to public cloud VPCs, IT organizations can finally bring their hybrid cloud vision into reality.
In this webinar we will discuss:
1)How Big Cloud Fabric implements VPC construct for network automation and visibility in on-prem (enterprise) cloud.
2)How Big Monitoring Fabric achieves end-to-end visibility and security for applications deployed both on-prem and in public cloud VPCs.
3)How Multi-Cloud Director enables unified hybrid cloud management across on-prem and multiple public clouds.
TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.
Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.
Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:
- Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
- Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
- Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks
Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
Today’s workforce expects an engaging and automated experience when submitting IT help desk requests, yet most companies are still using outdated manual service desks.
Join us for this entertaining live demo of Service Management Automation X (SMAX) and see how machine learning, analytics, and codeless configuration come together to deliver a true digital IT service management experience for business users and IT.
Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
- Virtualization and cloud adoption trends, usage and business drivers
Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
- How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
- Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.
Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
Get behind-the-scenes’ insight into how to migrate data from SAN, NAS or tape to an Object-Based Storage solution. John Bell, Sr. Consultant, and Eric Dey, Director of Product Management, will share their experience from hundreds of successful object storage implementations. They will explain the ins and outs of the data migration process and share best practices to help you move from a limited traditional storage approach to the new, cost-effective, limitless storage paradigm of object storage.
Since nearly all cyberattacks must cross the network it’s an essential source of truth for threat hunters and incident responders, yet many organizations today have limited network traffic analysis capabilities.
Why? The root of the problem lies in common sources of network data, which are difficult to analyze at scale. Security operators often find themselves stuck between the unwieldy firehose of full traffic capture and the frustrating information desert of network logs like Netflow that offer only a minimal amount of detail. Simply put, it’s either too much, or too little network data.
A goldilocks alternative exists, however, in the Bro Network Security Monitor. This open source framework transforms network traffic into high-fidelity logs that summarize activity on the wire at less than 1% the size of full traffic capture and can automate traffic analysis tasks via Bro’s unique scripting language. Thousands of organizations rely on Bro to achieve comprehensive, scalable network traffic analysis and Corelight makes Bro easy and ready to deploy at enterprise scale. In this webinar, Eric Ogren, Senior Analyst at 451 Research, and Brian Dye, CPO at Corelight, will demonstrate how Bro can help organizations achieve comprehensive, scalable network traffic analysis and accelerate their threat hunting and incident response workflows.
Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.
Offsite data replication combined with advanced site recovery methods should top your list.
In this webcast and live demo, you’ll learn about:
• Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
• Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
• Techniques that help you test and fine tune recovery measures without disrupting production workloads
• Transferring responsibilities to the remote site
• Rapid restoration of normal operations at the primary facilities when conditions permit
Attend live for a chance to win a $200 Amazon gift card!*
*Gift card will be sent within 10 days of the webinar date. Void where prohibited.
Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?
Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.
In this webinar we will cover the following:
- Intro to Crossvale, Inc.
- Intro to OpenShift CloudBalancer
- Cost Savings
- Technology behind CloudBalancer
- Live Demo
- 2 Use Cases
AMAZON EC2 SPOT INSTANCES AND SPOT FLEET HELP CUSTOMERS MANAGE CAPACITY AND COSTS.
“With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”
JOE GARDNER, PRINCIPAL CLOUD ARCHITECT, NATIONAL INSTRUMENTS
“We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
With just a few weeks to the must-attend IT event of the year for CIOs, IT Managers and Directors, Security specialists, Technical experts, we've gathered some of the elite speakers who will be taking the stage to debate the hottest solutions, trends and the biggest opportunities and challenges for businesses to successfully embrace digital change.
Topics to be covered include:
- Cyber Security
- AI Analytics
- Internet of Things
What will they be talking about at ExCeL London, on the 3-4 of October 2018, what do they want to hear about, what are they looking forward to?
Simon Bitton, Director of Marketing, Europe, Park Place Technologies
Sean McAvan, Managing Director, Navisite Europe
How do you ensure your data center staffing plan meets your business's performance and risk requirements? And at the same time, how do you keep growing and challenging your employees to retain key staff? Are you creating a successful culture of continuous improvement as well as a place your employees want to be?
Data is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patData is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patterns and structure in this data and its transformation into actionable insights is driven by Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) workloads.
IDC predicts that in the next three years over half the businesses will use AI, ML, and DL workloads. This has given rise to the NVIDIA DGX-1 GPU-based supercomputer to accelerate these workloads. Vexata supports the DGX-1 and delivers ultra-low latency, massive ingest bandwidth, and heavy mixed random and sequential read/write I/O operations. Using direct attached storage (DAS) or all-flash arrays (AFAs) limits the usefulness of the DGX-1 by restraining performance and requiring complex data provisioning, mobility, and growth. Vexata addresses these issues with VelocityAI, which combines the NVIDIA DGX-1 and the Vexata VX-100FS Scalable NVMe File Array.
Learn about VelocityAI and how we built it to overcome these machine learning challenges. This webinar is targeted to those that want to leverage GPU for data analytics. Our expert will cover:
- Dealing with large training and inferencing data-sets by leveraging NVMe media
- Using the VelocityAI to eliminate movement between data pipeline stages
- Dealing with data security, protection, and efficiency concerns
Learn how you can leverage VelocityAI to deliver transformative performance with breakthrough economics at scale for your AI, ML, and DL applications.
Join Steve Brumer, Partner at 151 Advisors and Mark Young, CTO at Climate Corporation for a 45-minute informative discussion on monetizing IoT in Smart Agriculture.
This webinar will focus on the Smart Ag landscape, uses cases, opportunities and how vendors & partners can monetize with IoT. Exploring all the business aspects, connectivity, sensors, big data, platforms, and system integration.
Key takeaways will focus on where should you focus your time, energy and efforts within this space and drive revenue.
-Steve Brumer, Partner at 151 Advisors
-Mark Young, CTO & Interim Product Lead at Climate Corporation
The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.
In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.
• Understand the types of encryption and their characteristics
• Understand the critical role of best-in-class key management
• Learn how to go beyond the encryption basics
Developers are faced with specific challenges to big data success, including poor performance, unpredictable runtimes, and bottlenecks. This webinar will focus on answering questions you need answers to, like “Why is my job running so slow? and “How do I guarantee SLAs of my app?” Our expert will answer these questions and more, with insight from real-world deployments. Learn how to achieve:
– Improved application performance and efficiency.
– Reduced troubleshooting time.
– Improved resource utilization.
– Insight on cluster events impacting applications.
– And more.
Alex joined Pepperdata in 2014. Previously, he worked as a senior solution architect at WanDisco. Before that, he was the senior solution architect at Red Hat. Alex has a strong background in system administration and big data.
Transform your data protection strategy with the Dell EMC DP4400. Learn how Dell EMC Data Protection enables you have backups that are simple to manage, powerful no matter the data, along with tools that can provide lower storage consumption and a peace of mind to your data protection environment.
What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We'll answer all of these questions on our live webinar roundtable discussion LIVE from Hitachi NEXT2018. Join us as we talk about solutions that can answer questions like:
•What are the largest cost drivers in my data center?
•How can IT accelerate my time to market?
•How do I optimize costs like power and cooling?
•How can I proactively identify inherent threats and issues?
Companies are facing increasingly complex IT landscapes, and testing needs to occur quickly and with consistency. Resource-intensive tasks, such as SAP system copy, clone, and refresh, can be complex and time-consuming – some customers report spending 3-5 days for one system copy. In this webinar, learn about a copy automation tool for SAP applications that incorporates more than 75% of all pre, copy and post functionality – and automates it. Whether for traditional SAP or SAP HANA, Pure Storage’s Copy Automation Tool (CAT) for SAP applications drives digital transformation with huge gains in productivity and cost savings, and is included with every Pure Storage FlashArray. In this webinar, you will learn:
- How some companies have saved up to 80 percent of time and budget when performing SAP landscape copy, clone, and refresh tasks, freeing up time to focus on increasing innovation
- How to simplify SAP copy functionality and gain flexibility through additional integration or customization, to speed SAP migrations, upgrades, and testing
- How to reduce risks by automating the refresh process, and reduce complexity through the use of this embedded tool
In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.
Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
- Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
- How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
- How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
Join us for an exciting and informative look at the latest release of Data Protector.
Data Protector 10.10 introduces two new editions: Data Protector Express for virtual environments and Data Protector Premium for physical, virtual, and multi-cloud workloads. With these editions we are simplifying pricing and packaging for Data Protector.
Data Protector now offers integrated reporting capabilities making it a complete solution which includes built-in monitoring and reporting that can be managed within its web-based user interface. We’ll discuss the benefits of migrating your current Data Protector installation to these new editions.
Data Protector 10.10 also includes installation and upgrade improvements including new prerequisite checks and automation. See a live demo of all the new features.
Nor-Tech will show you how to make a better ROI on your investments in Simulation & Modeling software. Software license costs are 75% or more of your TCO investment in most Simulation & Modeling solutions. Nor-Tech’s Intel HPC Technology makes smarter use of your license investments for your software dollars. Nor-Tech 20 years in HPC Technology and their built-in adds called NT-EZ for your HPC Technology solution make them easy to use, and lower cost in many cases than using Workstations or the Cloud.
If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.
Join this webcast to see how the USM platform makes it easy to:
- Automate log collection, analysis and event correlation in a single console
- Continuously scan for new assets and vulnerabilities
- Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
- Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.
Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Data-driven integration between Phishing Sims and game-based information security awareness training.
In this webinar you will learn:
•Why Phishing Sims didn’t turn out to be the silver bullet to bring down the Human Factor problem in Information Security.
•Root cause analysis: Why people fail, and how cognitive neuroscience of learning can affect much-needed behavior change.
•The behavior modification cycle: The process, and why accurate skills assessment is essential.
You will also see a quick demo of the integrated solution: “Keepnet Labs” and "Info-Sentinel" training mini-games. Q/A Session to follow.
Mr. Aytun is a 30-year veteran of building technology-based solutions, including B2B product development for the TV broadcast industry, TV and video production, software product development, and in the last decade, game development for training and education. He has been serving the corporate and government training space as the CEO of MAVI Interactive since 2008. MAVI's key contribution to the training industry is making immersive skill development products accessible by all, removing the prohibitive cost barriers.
MAVI's approach is to develop award winning immersive training systems with modular data structures that can reliably deliver engaging skill development scenarios as well as data-driven performance evaluation. All their solutions are based on Natural Learning Principles, designed to “train the brain” and affect behavior change.
MAVI's latest integration between Phishing Simulations (Keepnet Labs) and information security behavior modification mini games (multiple-award-winning "Info-Sentinel" series) completes the behavior modification cycle, essential for reducing the Human Factor issues with information security.”
Dynamic Kubernetes environments are disrupting the accuracy of Security Information and Event Management (SIEM) tools. Learn how implementing the right network security and compliance solution can deliver total visibility into Kubernetes constructs and increase the accuracy of your SIEM tool.