Data Center Management

Community information
The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.

Webinars and videos

  • How many logs files do you have?
    • Ever use them?
    • Wonder what they might contain?
    • Are they lying around unexploited, cropped or deleted to save space?
    • Do you ever try to exploit all the log data your systems produce?
    • Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?

    HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.

    In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • This webinar will discuss some of the latest deployments, trends, pricing and advances in the CDN market for commercial CDNs and telco/carrier CDN buildouts.

    Why you should Attend:
    - Learn the latest data on the size of the content delivery market for video.
    - Find out growth forecasts for both revenue and traffic volumes.
    - Hear about the market drivers and trends that will determine the future of the CDN market.
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Deploy your own cloud based business fully supported by the industry leaders - Dell, OnApp and Peer1
  • As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.

    Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.

    Attend this webinar to learn about:

    • The various types of POS malware threats and the implications of experiencing an attack

    • The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks

    • Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
  • Today, data drives discovery. And discoveries create are key to creating sustained advantages. The better your critical workflows are able to create and access data – the better you’ll be able to discover new, innovative solutions to important problems, or to create entirely new products. More than ever before, data intensive applications need the sustained performance and virtually unlimited scalability that only parallel storage software delivers.

    Designed for maximum performance and scale, storage solutions powered by Lustre software deliver the performance at scale to meet today’s storage requirements. As the most widely used parallel storage system for HPC, Lustre-powered storage is the ideal storage foundation.

    But scalable performance storage by itself only solves half the problem. Today’s users expect storage solutions that deliver sustained performance, scale upward to near limitless capacities, and are simple to install and manage. Intel(r) Enterprise Edition for Lustre* software combines the straight line speed and scale of Lustre with the bottom line need for lowered management complexity and cost.

    As the recognized leaders in the development and support of the Lustre file system, Intel has the expertise to make storage solutions for data intensive applications faster, smarter and easier.
  • Businesses in the Financial Services sector are some of the most obvious targets for cyber-attacks. After all, “that’s where the money is.”

    And recent technological advances have brought about the dark side of innovation – the ability of criminals to stealthily attack users and businesses in new ways. Hence, financial institutions around the world are even more at risk to breaches and cyber-attacks than ever before. Are financial institutions in Asia Pacific ready for these threats? What are the areas that financial services should look into for continuous threat protection?

    Bryce Boland will touch on these issues in this webcast; bringing insights from his experience as a former Security CTO in the financial sector.

    Topics that will be covered are:

    1.The Dark Side of Innovation
    2.Recent FSI breaches
    3.Enterprise Threat Report on FSI
    4.FSI Supply Chain Risks
    5.Managing Advanced Threats
    6.Questions & Answers

    This webinar is for both business and IT professionals, interested to have a better understanding of the current state of cyber risks in the financial sector, and how to manage these risks.
  • Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware hardware presents a hatful of challenges that your infrastructure team might not have thought about.

    In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:

    (a) Introduction to scalability techniques: clouds from a hardware perspective.
    Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.

    (b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.

    Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.

    You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware hardware.
  • Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

    Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
  • This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • The performance of databases often slows as data and business grows, users find new and demanding ways to leverage applications, and those applications mature and expand in functionality. Whenever a key database slows down, SQL or NoSQL, the business damage can be widespread and it usually becomes a high priority effort to remediate.

    At Taneja Group we’ve noted 5 major ways that IT operations can improve database performance, including a couple of quick and ready ideas that impose little risk or cost. In this 30 minute webcast, we'll look at why IT operations often gets the responsibility for database performance, and the IT-centric options they can pursue.

    Mike Matchett brings to Taneja Group over 20 years experience in managing and marketing IT datacenter solutions particularly at the nexus of performance, capacity and virtualization. Currently he is focused on IT optimization for virtualization and convergence across servers, storage and networks, especially to handle the requirements of mission-critical applications, Big Data analysis, and the next generation data center. Mike has a deep understanding of systems management, IT operations, and solutions marketing to help drive architecture, messaging, and positioning initiatives.
  • High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.

    HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
  • See the big picture in Big Data. A customer service call can transform an internal process. Understanding Tweets and Likes can lead to improved product design. Previously unconnected data can reveal patterns and relationships so you can jump on more opportunities. The moment to tap the full potential of Big Data is now.

    HP HAVEn is a Big Data platform that analyzes 100% of the data relevant to your organization. HAVEn delivers the analytics services & engines to exploit data from any source, and the services and solutions to reshape your IT infrastructure to realize the value of your data.

    Attend this webinar to learn about HP’s Big Data platform and hear how HAVEn users are now able to know their customers better, to design better products, and to run their operations more efficiently.

    When you have 100% of your data informing every decision, anything else is just an educated guess.
  • Save time, money and trouble in your fiber optic networks

    In today’s competitive marketplace, where customer loyalty and retention is at risk, service providers need to maintain a high level of service and network reliability on a tighter budget.
    In addition to negotiating the best prices on fiber/cable, infrastructure, transmission and test equipment on a day-to-day basis, solving network weaknesses is yet another way to reduce operation costs.

    Join EXFO for a 40-minute webinar exploring the differences between a poor-quality network as compared to a solid and efficient network―and most importantly, how to optimize your own network efficiency.

    Check out the list below for a sampling of the topics that will be discussed during this webinar.

    • Fiber-optic Achilles’ heel: poor connections
    • A stressed network is not a good network: learn how to detect macrobends before they kill services
    • No plug and pray: qualify your fiber for high-speed upgradability
    • Fiber break—it happens, but how quickly can you react?
    • The quest for margin: optimize your OSNR for a few extra dBs that will make a difference
  • Today in order to remain competitive, there is a tremendous demand on lines of business to be able to analyze more aspects of business data and do this very quickly. There is a control shift to the business analyst so they can analyze what they need to, NOW!

    Big Data requirements are also emerging, even as everyone is being asked to accomplish more with less. Join us to learn how the combination of DB2 10.5 with BLU Acceleration and Cognos BI 10.2 can help bring sanity to satisfying these ever increasing demands.

    We will provide an overview and technical deep dive of DB2 10.5 with BLU Acceleration, Cognos BI 10.2 and Dynamic Cubes. Join experts from the DB2 and the Cognos BI teams who will also explain how these two offerings fit together and the benefits they have provided to clients already. See the value that DB2 with BLU Acceleration can bring to Cognos BI, and ask these experts your questions, so you can understand how this solution helps solve business challenges.
  • Join us for a 30 minute webcast on May 1st, 2014 and learn how EMC Isilon provides an efficient and scalable storage solution to help manage unstructured data growth. Isilon’s scale-out NAS platform, in conjunction with the OneFS OS, provides a highly reliable and efficient infrastructure that easily scales in both capacity and performance.

    In this free webinar, we'll show you how you can:
    - Provide access to data anytime, anywhere, and from any device
    - Use data analytics to gain new insight that can accelerate your business
    - Maximize cloud-based capabilities for greater efficiency and flexibility
    - Scale capacity and performance easily and as needed – with no change in an administrator's time or efforts as storage grows

    Don't miss out on this opportunity, we look forward to having you attend!
  • Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.

    1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
    2)Leverage McAfee ePO to automate DLP policies based on situational awareness
    3)See how McAfee DLP and ESM work together to provide real-time data protection
  • You may have heard that Dell has launched a new member of its disk based backup family, the DR6000 as well as a new version of the DR OS firmware v3.0.

    Join us on this webinar to learn more about this ground-breaking new solution that delivers a stunning 22TB per hour ingest performance, more than twice that of competitor solutions in this space.

    The DR6000 is a new high-performance, high-capacity deduplication appliance that enables source and target based inline deduplication and compression as well as WAN-optimized replication for fast disaster recovery.
    The DR OS 3.0 includes new functionality for Global Management and support for Bridgehead and Acronis backup software applications as well as adding support for AppAssure 5.x as an archive target.
    In addition, those of you with an eye on NetVault 10 or vRanger 7 (both due soon) will be please to hear that the DR6000 will enjoy tight integration with both. At 22Tb per hour and up to 512 RDA connections the combined solution of NetVault 10 and DR6000 will provide greater scale than ever before.

    What would the DR6000 deliver for your business?

    Performance:
    22TB/hour with source dedupe over NFS or CIFS

    Scalability:
    The DR6000 provides up to 180TB of usable storage capacity (240TB raw capacity). Utilising Dell’s industry leading deduplication and compression technologies, you will be reducing backup storage capacity by 15X on average providing a logical capacity in excess of 3PB.

    Value
    With all inclusive licensing, there are no hidden costs for premium features. The DR6000 includes a new set of plug-ins including Rapid NFS and Rapid CIFS – the industry’s first source side deduplication for NFS/CIFS backups. As the majority of businesses use CIFS or NFS for backup and recovery operations and currently none of our competitors have this feature, if you’d like to learn more, please join us!
  • This analyst briefing will give an industry outlook on TV-Everywhere in the Middle East.

    Why you should attend:
    ·Discover why the Middle East is optimal for growth of multi-screen video distribution
    ·Learn how consumers will turn to video-capable, Internet-connected devices by 2020
    ·Find out how content creators are seeking ways to distribute the content to multiple platforms
  • This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

    Gordon Beith, Director of Product Management at VSS Monitoring, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
    • Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
    • Metadata versus flow statistics versus full packet capture – considerations and use cases for each
    • Open versus proprietary formats for storage
    • Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
    • Addressing retrieval in an “open” forensics model
    • Leveraging a distributed computing framework for processing large-scale data stores