Hi [[ session.user.profile.firstName ]]

Data Center Management

  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Dec 18 2017 4:00 pm UTC 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Where Do We Go From Here?  A Fork in the Road for Multimode Fiber
    Where Do We Go From Here? A Fork in the Road for Multimode Fiber Robert Reid, Panduit Dec 19 2017 4:00 pm UTC 90 mins
    This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
    Attendees will earn 1 BICSI CEC.
  • Ensuring a Trusted Internet of Things
    Ensuring a Trusted Internet of Things Christian Renaud, Research Director at 451 Research & Josh Jabs, Vice President at Entrust Datacard Dec 19 2017 5:00 pm UTC 60 mins
    During this upcoming webinar we will discuss the current state of IoT adoption, security and trust challenges to deployment by key vertical markets. We will also dive into lessons learned, emerging standards for IoT security, and the necessary innovative technologies required for the Internet of Things to succeed. Please join Entrust Datacard and 451 Research for this informative upcoming webinar.
  • Rapidly Build and Operate Physical and Overlay Networks with Apstra AOS™
    Rapidly Build and Operate Physical and Overlay Networks with Apstra AOS™ Josh Saul Dec 19 2017 7:00 pm UTC 45 mins
    Imagine you have been asked to design and operationalize a new data center network in two weeks. Previously, such a project would have taken six months. With AOS, you can comfortably complete all phases of this project on time without human errors:

    • Design in minutes, using industry best-practice reference architecture
    • Build configs in minutes
    • Deploy configs in minutes
    • Validate network state continuously
    • Operate with closed-loop telemetry

    Come learn how AOS can assist you.
  • Object Storage for Digital Video
    Object Storage for Digital Video Adrian Herrera, VP of Marketing & John Bell, Senior Consultant Dec 19 2017 7:00 pm UTC 60 mins
    From security footage and training videos to films and user-generated content, digital video is now integral to every business. As resolutions and workflows rapidly evolve, so do storage, access and preservation requirements. In this webinar, we will discuss how to satisfy these rapidly evolving requirements focusing on:

    - Challenges of increasing resolutions, delivery and long-term preservation
    - The difference between NAS, cloud and object storage solutions
    RAID, replication and erasure coding pros and cons
    - How to integrate object storage into workflows (security, production and content delivery)
  • Kill your cloud bill and own your infrastructure, with Open Cloud Services
    Kill your cloud bill and own your infrastructure, with Open Cloud Services Rob Szumski, CoreOS Tectonic Product Manager Dec 20 2017 6:00 pm UTC 60 mins
    Explore Tectonic's new Open Cloud Services and learn how etcd, Prometheus and Vault can be effortlessly installed, operated, scaled and handle failover. Unlike proprietary cloud services, Open Cloud Services are first-class, fully automated Kubernetes resources running on the CoreOS Tectonic platform, leveraging the Operator pattern.

    Join this webinar to learn about these unique capabilities and a live demo of the Vault Open Cloud Service.
  • Kubernetes 1.9 AMA
    Kubernetes 1.9 AMA Dan Gillespie, Senior Software Engineer Jan 3 2018 6:00 pm UTC 60 mins
    What's new in Kubernetes 1.9? Explore the new capabilities and improvements introduced in the latest release of the container orchestrator.

    Bring your Kube questions - after a look at what's new we will dive into answering what the community wants to know most!
  • Part 3: Addressing Data Across Borders for the GDPR
    Part 3: Addressing Data Across Borders for the GDPR Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager Jan 4 2018 6:00 pm UTC 45 mins
    One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • [APAC] How Automation Can Transform the way you Manage your Security Policy
    [APAC] How Automation Can Transform the way you Manage your Security Policy Yonatan Klein - Director of Product Management Jan 9 2018 6:00 am UTC 45 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • How Automation Can Transform the way you Manage your Network Security Policy
    How Automation Can Transform the way you Manage your Network Security Policy Yonatan Klein - Director of Product Management Jan 9 2018 3:00 pm UTC 45 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 9 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • NVDIMM – Persistent Memory Applications are Here - 2018 Edition
    NVDIMM – Persistent Memory Applications are Here - 2018 Edition Jeff Chang, Co-Chair, SNIA NVDIMM Special interest Group Jan 9 2018 5:00 pm UTC 75 mins
    Join the SNIA NVDIMM Special Interest Group as we provide a 2018 view of the NVDIMM ecosystem and learn why Persistent Memory is here! Check out which Persistent Memory applications are now available via JEDEC standard NVDIMMs. We'll even highlight some of the "knobs" to turn to optimize use of NVDIMM in your applications to ease the way to simple, plug-n-play adoption!
  • Effective Micro-Segmentation for the Multi-Cloud
    Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Jan 10 2018 5:00 pm UTC 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • Vault OCS - Secrets to a Secure Jenkins on Tectonic
    Vault OCS - Secrets to a Secure Jenkins on Tectonic Praveen Rajagopalan, Solutions Engineer Jan 10 2018 6:00 pm UTC 60 mins
    Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.

    CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
  • The Business Benefits of GDPR Readiness
    The Business Benefits of GDPR Readiness Nigel Tozer, Director of Solutions Marketing Jan 11 2018 2:00 pm UTC 60 mins
    As you alter your business practices and processes to account for the General Data Protection Regulation (GDPR), which goes into effect May 25, 2018, it’s likely that your organization will be thinking of the risk of fines and the cost of compliance. However, the very same tools that can help to manage the data challenges of GDPR can also help you to gain insight and real business value from your data. In addition, putting the focus on better managing your data means you have the opportunity to reduce costs and improve efficiency, while also boosting productivity.
  • Prometheus 101: Overview and Demo
    Prometheus 101: Overview and Demo Chris Ricci, Solutions Engineer Jan 11 2018 6:00 pm UTC 60 mins
    Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.

    In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
  • Part 4: Breach Detection and Notification for the GDPR
    Part 4: Breach Detection and Notification for the GDPR Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva Jan 11 2018 7:00 pm UTC 45 mins
    The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    • What the General Data Protection Regulation is
    • What the GDPR breach notification requirements are
    • How Imperva CounterBreach can help detect potential data breaches
  • Dell|EMC Presents: Quest Microsoft platform management
    Dell|EMC Presents: Quest Microsoft platform management Mike Dowling, Quest Software Jan 12 2018 10:00 am UTC 30 mins
    Managing and securing Microsoft platforms – such as Active Directory, Exchange, Skype for Business, Azure AD and Office 365 – can be expensive and time-consuming. In fact, organizations typically spend 75 percent of their budget maintaining legacy infrastructure.

    It’s time to optimize your environment and secure your Microsoft infrastructure to prepare for what’s next. Our award-winning solutions help you migrate, manage and secure your data across on-premises, cloud-based and hybrid platforms. Stop worrying about maintaining systems, and start focusing on innovation. See for yourself why our tools have been used to migrate, secure and manage more than 180 million users.
  • Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology
    Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology Boaz Avigad, Director of Technical Marketing Jan 16 2018 4:00 pm UTC 45 mins
    With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.

    In this webinar we will learn about:

    i. Why SSL visibility is important
    ii. What new challenges are we facing in SSL
    iii. The importance of performance
    iv. SSL in the age of virtualization
    v. The impact of the evolving datacenter landscape on SSL requirements
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Jan 16 2018 7:00 pm UTC 60 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • The Evolution and Future of NVMe
    The Evolution and Future of NVMe David Allen, NVM Express Board Member and Dr. J Metz, NVM Express Board Member Jan 17 2018 5:00 pm UTC 60 mins
    The momentum around NVMe technology has surpassed expectations and there’s no lull in sight. Developers and other industry enthusiasts are excited about the potential for NVMe in the client/mobile space, as well as in the data center and enterprise. Join us for this NVM Express, Inc.-hosted webcast to learn about the evolution of the NVMe storage protocol and what’s in store for its future, in 2018 and beyond.

    In this webcast, you will find out more about today’s market adoption, various applications and use cases, as well as the NVMe specifications roadmap, including projected timelines and key enhancements for the NVMe Management Interface 1.1 Specification, the NVM-oF 1.1 Specification and NVMe 1.4 Specification.
  • Quay Enterprise 101: Overview and Demo
    Quay Enterprise 101: Overview and Demo Joseph Schorr, Software Engineer Jan 17 2018 6:00 pm UTC 45 mins
    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • From Where You Are to Where You Want to be with 3DS 2.0
    From Where You Are to Where You Want to be with 3DS 2.0 Hannah Preston, Solution Strategist, Payment Security, CA Technologies Jan 18 2018 4:00 pm UTC 60 mins
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • Reducing Risk in the Data Center with DCIM
    Reducing Risk in the Data Center with DCIM Rhonda Ascierto, Research Director at 451 Research and Mark Gaydos, Chief Marketing Officer at Nlyte Software Jan 18 2018 4:30 pm UTC 60 mins
    The management of change has been a recognized and necessary discipline in enterprise IT for decades. But the management of change – and indeed critical events – in datacenter facilities has not received so much attention, despite the dangers and significant costs associated with even partial failure.

    Increasingly, datacenter owners and operators are reducing risks associated with change and unplanned events by using purpose-built datacenter infrastructure management (DCIM) software. DCIM has become an essential element of modern datacenter risk management, from monitoring and alerting to traceable (auditable) workflows, asset tracking, predictive analytics and end-to-end risk analysis.

    In this webinar, you will learn how DCIM is being leveraged to understand, manage and lower risk, while at the same time delivering efficiency, agility and cost benefits.
  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Jan 18 2018 7:00 pm UTC 60 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process


    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.