Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment

Dave Simpson, Analyst, The 451 Group; Mark Montagna, The Philadelphia Contributionship; Gil Levonai, VP of Products, Zerto
Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-level agreements (SLAs), and require robust, effective and automated failover and failback. Unfortunately, traditional business continuity/disaster recovery (BC/DR) approaches are complex, rigid and inflexible, and IT departments have struggled to protect these applications in a virtual environment.

Want to learn how to mitigate data loss, minimize RPOs and RTOs, and ensure a high degree of service continuity? Join this interactive webinar and discover how to protect your applications, not just your data.

•Leading 451 Group Analyst Dave Simpson will discuss the industry drivers for virtualized mission-critical applications, core challenges of traditional BC/DR approaches, and the key features needed to ensure a robust, yet flexible, BC/DR solution for a virtual environment.

•Gil Levonai, VP of products for Zerto, will quickly highlight a revolutionary technology, hypervisor-based replication, which simplifies enterprise-class BC/DR in a virtual environment.

•Your peer, Mark Montagna, IT Infrastructure Manager for The Philadelphia Contributionship, will share his experience including: previous BC/DR challenges, selection process, the Zerto implementation and resulting benefits.
Jun 13 2012
48 mins
Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment
Join us for this summit:
More from this community:

Data Center Management

Webinars and videos

  • Live and recorded (2245)
  • Upcoming (55)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • This webinar will discuss some of the latest deployments, trends, pricing and advances in the CDN market for commercial CDNs and telco/carrier CDN buildouts.

    Why you should Attend:
    - Learn the latest data on the size of the content delivery market for video.
    - Find out growth forecasts for both revenue and traffic volumes.
    - Hear about the market drivers and trends that will determine the future of the CDN market.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • How many logs files do you have?
    • Ever use them?
    • Wonder what they might contain?
    • Are they lying around unexploited, cropped or deleted to save space?
    • Do you ever try to exploit all the log data your systems produce?
    • Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?

    HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.

    In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Performance Benchmarking for Private and Hybrid Cloud Jun 11 2014 6:00 pm UTC 45 mins
    Learn why benchmarking your current network and server virtualization infrastructure is vital to your organizations long-term Cloud Infrastructure-as-a-Service (IaaS) success. Benchmarking will yield your IT organization the knowledge needed for solid planning, effective execution and post-migration performance validation.
  • Flash storage: A vendor-neutral way to analyze performance Jun 11 2014 6:00 pm UTC 45 mins
    Flash is the hottest technology in the storage industry today. But with all its touted advantages, there are some challenges – including how to effectively measure the performance benefits for your own environment.

    Although flash can be expensive, most of the flash-based storage arrays implement sophisticated compression, deduplication and pattern reduction processing to minimize the amount of data written to flash memory in order to lower the cost per GB and extend the life of flash memory.

    Effectively measuring the performance of flash arrays requires more than the basic freeware benchmarking tools and following the steps documented by the SNIA SSSI specification. It requires the need for specifying complex data patterns in these data reduction technologies. Measuring performance without taking these features into account could falsely overstate the performance of a flash array by a factor of 2 or more.

    Attend this presentation to learn how to best validate the performance of your potential flash storage arrays in order to optimize costs and mitigate risk.
  • How Cool is the Cloud? Exploring Your Data Center Cooling Options May 15 2014 6:00 pm UTC 45 mins
    All Data Centers, whether great or small, have one thing in common; they have a heat transfer (cooling) problem. Not even ten years ago, cooling problems were solved with the purchase and installation of another Computer Room Air Condition (CRAC). Today’s cooling methodologies are truly amazing, but can be very intrusive and expensive to implement. It seems that Data Center Managers ‘stuck’ with a ‘legacy’ data center have been given two options; either adopt the latest and greatest cooling methodologies or move your Information Technology (IT) to the cloud. In many cases today, the question may be “How do we keep the wheels on the donkey cart while we figure out how and when we go to the cloud?”

    Join Cask to understand issues such as:
    - Why your cooling solution may not be as pathetic as you think.
    - How Computational Fluid Dynamics (CFD) can help you understand how heat transfer works (or doesn’t work) in your data center.
    - What you can do to inexpensively update your cooling methodology.
  • Service Chaining and SDN: Delivering Secure and Accelerated Infrastructure May 15 2014 3:00 pm UTC 45 mins
    Legacy data center network architectures are typically static, inflexible and manually provisioned, making them unsuitable for the scale and agility required of a cloud business model. Emerging cloud delivery models incorporate automated service provisioning in a virtualized, multi-tenant environment to achieve scale and agility. Dynamic service chaining is a critical component in building an on-demand model for consumption of L4-L7 application network services. In this session we will cover how dynamic service chaining is integrated into the SDN and cloud orchestration platforms to deliver a highly available, secure and accelerated infrastructure.
  • Data Center Cooling: How to Measure & Improve Utilization May 14 2014 8:00 pm UTC 45 mins
    Study of data centers reveals the average computer room has cooling capacity that is nearly four times the IT heat load. When running cooling capacity is excessively over-implemented, then potentially large operating cost reductions are possible by turning off cooling units and/or reducing fan speeds for units with variable frequency drives (VFD). Using data from 45 sites reviewed by Upsite Technologies, this presentation will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
  • The Rise of The ServerSAN: Will converged storage kill off the disk array? May 14 2014 6:00 pm UTC 45 mins
    A new class of software defined storage ServerSAN solutions promise to bring to the staid world of storage the disruption, and efficiencies, that virtualization has brought to computing. ServerSANs, typified by VMware’s VSAN and hyperconvirged solutions from Simplivity and Nutanix use software, running under a hypervisor, to take SSDs and spinning disks into a common, high performance storage pool.

    Can ServerSANs replace the physical SANs and disk arrays the way virtual servers have replaced their physical counterparts or are ServerSANs a niche solution for remote offices and SMBs? Either way it’s clear this new technology should be in your storage solution bag of tricks.

    In this presentation we’ll explore the common elements ServerSAN solutions have and compare some of the leading solutions and their unique solutions to common problems like fault tolerance and data protection.
  • The Software-defined Datacenter in a Hyperconvergence World May 14 2014 4:00 pm UTC 45 mins
    In today's data centers, the need for flexibility and agility is undeniable. As businesses continue to grow and leverage technology to remain competitive, they require a new way of simplified IT. IT organizations can no longer deal with complex, cumbersome legacy infrastructure that can't keep at the pace of the business.

    In this webinar, discover:
    - What is hyper convergence
    - The benefits of converged infrastructure
    - Best practices and use cases for leveraging hyper converged architectures
  • Understanding the Promise of Software Defined Environments May 14 2014 2:00 pm UTC 45 mins
    The emergence of “the Cloud” has introduced unprecedented levels of automation and virtualization to the data center environment. The Cloud is now maturing to virtualize network functions along with the computing resources. Understanding orchestration is imperative for succeeding with Software Defined Networking and Network Function Virtualization

    Three Key Take-Aways:
    - What does the “Next Gen Datacenter” look like
    - Driving better service stability through DevOps
    - Leveraging Business Process Management to align with the business
  • Considerations for Ramping to a Big Data Network Monitoring Architecture, Part 2 May 7 2014 5:00 pm UTC 60 mins
    This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

    Gordon Beith, Director of Product Management at VSS Monitoring, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
    • Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
    • Metadata versus flow statistics versus full packet capture – considerations and use cases for each
    • Open versus proprietary formats for storage
    • Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
    • Addressing retrieval in an “open” forensics model
    • Leveraging a distributed computing framework for processing large-scale data stores
  • Hypervisor Convergence: What is it and can it save you money? May 1 2014 3:00 pm UTC 45 mins
    High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.

    HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
  • Leveraging a Big Data Model in the IT domain, Part 1 Apr 30 2014 5:00 pm UTC 60 mins
    This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • Top 5 Ways for IT to Improve Database Performance Apr 30 2014 5:00 pm UTC 30 mins
    The performance of databases often slows as data and business grows, users find new and demanding ways to leverage applications, and those applications mature and expand in functionality. Whenever a key database slows down, SQL or NoSQL, the business damage can be widespread and it usually becomes a high priority effort to remediate.

    At Taneja Group we’ve noted 5 major ways that IT operations can improve database performance, including a couple of quick and ready ideas that impose little risk or cost. In this 30 minute webcast, we'll look at why IT operations often gets the responsibility for database performance, and the IT-centric options they can pursue.

    Mike Matchett brings to Taneja Group over 20 years experience in managing and marketing IT datacenter solutions particularly at the nexus of performance, capacity and virtualization. Currently he is focused on IT optimization for virtualization and convergence across servers, storage and networks, especially to handle the requirements of mission-critical applications, Big Data analysis, and the next generation data center. Mike has a deep understanding of systems management, IT operations, and solutions marketing to help drive architecture, messaging, and positioning initiatives.
  • OpenStack & Optimized Hardware: Avoid Problems That Can Stop Deployment Apr 30 2014 4:00 pm UTC 60 mins
    Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware presents a hatful of challenges that your infrastructure team might not have thought about.

    In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:

    (a) Introduction to scalability techniques: clouds from a hardware perspective.
    Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.

    (b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.

    Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.

    You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware.
  • BYOD Challenges, Recommendations & Best Practices from Box Recorded: Apr 24 2014 40 mins
    85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • The New IT - How the World of Work is Changing and What IT Needs to Do to Adapt Recorded: Apr 23 2014 60 mins
    The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • How to accelerate your SaaS development using PaaS Recorded: Apr 23 2014 44 mins
    As more and more software product companies are looking to migrate their traditional on-premise software to a Software as a Service (SaaS) offering they are discovering it takes longer than first expected and comes with many challenges.

    Platform as a Service (PaaS) provides a great way to create highly scalable applications. PaaS accelerates application development, testing, deployment and maintenance of your SaaS application.

    Join Mark Eisenberg, a thought leader in cloud and mobile, and Motifworks’ Nitin Agarwal to learn how to accelerate your migration to SaaS using PaaS. This webinar will feature a review of the Windows Azure PaaS platform and Motifworks SaaS development framework to further reduce your time-to-market.

    Attendees will learn:
    * The benefits of Platform as a Service over Infrastructure as a Service (IaaS)
    * How PaaS accelerates development and delivery of SaaS
    * Azure Cloud Services (PaaS) overview
    * Best practices for great cloud application on Azure PaaS
  • The Open SDN Stack Recorded: Apr 17 2014 44 mins
    Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • OpenStack Icehouse Release Update Recorded: Apr 17 2014 44 mins
    Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • SDN, NFV, and the Cloud Disruption: The Next Generation ODIN Recorded: Apr 17 2014 41 mins
    The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • Make Your Storage Work for Your Big Data Project Recorded: Apr 16 2014 30 mins
    Big Data projects do not always require new storage. In fact, the best Big Data projects can leverage existing storage solutions. This presentation will look at how you can make your existing storage work for Big Data.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment
  • Live at: Jun 13 2012 7:00 pm
  • Presented by: Dave Simpson, Analyst, The 451 Group; Mark Montagna, The Philadelphia Contributionship; Gil Levonai, VP of Products, Zerto
  • From:
Your email has been sent.
or close
You must be logged in to email this