Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • Simplifying Storage for Data Protection in Hyperconverged Environments
    Simplifying Storage for Data Protection in Hyperconverged Environments Grant Jacobson - Director of Technology Alliances at Cloudian | Rohit Goyal - Senior Product Marketing Manager at Nutanix Recorded: Sep 20 2018 54 mins
    There are already a lot of challenges with IT. But, the explosive growth of data and need to ensure protection has made managing and scaling associated data storage more challenging than ever. Security, compliance and privacy needs as well as public cloud integration add further complexities.

    How do you address these challenges cost-effectively while also ensuring you meet service level, application and other requirements?

    Join this webinar with experts from Nutanix and Cloudian. Learn how to:

    • Deploy a single, petabyte-scale object storage architecture across one or more locations
    • Create simple, bucket-level policy-based storage management
    • Obtain a unified view of your data across locations
    • Ensure compliance, privacy and security
    • Take advantage of flexible data protection options
    • Leverage multiple compatible data backup and recovery options
  • IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio
    IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio Amr Fahmy, Bobby Allen Recorded: Sep 20 2018 55 mins
    SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)

    Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.

    Speaker: Amr Fahmy
    Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use

    Speaker: Bobby Allen
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Data Protection Solution for Azure Stack
    Data Protection Solution for Azure Stack Parissa Mohamadi - Product Manager - HPE Storage Recorded: Sep 20 2018 21 mins
    As data volumes increase, you look for managing your backup footprints efficiently and cost-effectively within your data centers. There is a move to use public cloud services to take advantage of affordable and flexible data storage, but for many reasons, you may want to keep data on-site. HPE Cloud Bank Storage lowers long-term data retention costs by leveraging cloud-based or on-premises object storage. Come and learn how HPE data protection solutions can protect your data wherever it resides: from on-premises private cloud such as Microsoft Azure Stack to public cloud such as Microsoft Azure.
  • Securing Your Digital Transformation: Considerations for Enterprise Architecture
    Securing Your Digital Transformation: Considerations for Enterprise Architecture Todd Jobson, Co-founder & CTO, TechThought.org Recorded: Sep 20 2018 63 mins
    This webinar will outline how successful Digital Transformation requires an evolution of traditional Enterprise Architecture and Security practices.

    This will include a brief history of today's rapid paradigm shifts, drivers, benefits and challenges.

    Key considerations among several related areas:
    - FOSS, mobile
    - Cloud architecture & deployment models
    - Agile DevOps vs. traditional governance
    - Traditional app architecture vs. CloudNative Microservices & FaaS/Serverless
    - The rapidly changing data landscape (OLTP/OLAP -- BigData & Streaming Analytics)

    Todd Jobson will explore the impact in several of these areas related to successful Digital Transformation, Enterprise Cloud Architecture, as well as considerations related to security. While not intended to be a comprehensive nor prescriptive webinar, it will include several strategic recommendations along with inter-related tactical considerations that most enterprises will encounter along the complex path of Digital Transformation.

    About the Speaker:
    Todd Jobson is the CTO & Co-Founder of TechThought.org and has 25 years of experience as both a strategic & tactical thought leader across some of the most demanding business & technically complex mission critical environments. His background has included SW Engineer/Manager developing Nuclear Reactor Control & RealTime access control systems for NYPA, directing application architecture & global Integration (as far as Moscow, Russia) as Chief Technologist for SAI, leading a decade of Enterprise (Fortune 50) client architecture & delivery engagements for Sun Microsystems Professional Services, to conducting Enterprise-wide Digital Transformation Workshops/ Assessments & Future State Cloud Architecture enablement for dozens of Oracle's largest customers.
  • Data Breach: How to Identify the Early Signs
    Data Breach: How to Identify the Early Signs Shiri Margel - Machine Learning Research Manager at Imperva Recorded: Sep 20 2018 40 mins
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • Driving Growth of Sustainable Safety Instrumented Systems
    Driving Growth of Sustainable Safety Instrumented Systems Muthuraman Ramasamy, Industry Director, Frost & Sullivan, Mr. Ian Ramsay-Connell TUV Functional Expert (FSM&SIS) Yokogawa Recorded: Sep 20 2018 58 mins
    Title: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety

    Subtitle: Plant safety ensures compliance, revenue maximization, and operational cost reduction

    Sustainable Safety Instrumented Systems (SSIS) are a natural evolution of conventional SIS, which allow the key decision makers to optimize their plant’s safety performance without compromising productivity, revenue, and cost. Sustainable SIS incorporates a holistic assessment of operational safety to mitigate and manage risks throughout the lifetime of a plant. It equips all stakeholders to protect businesses from excessive hazard-related downtime. Future growth opportunities will ensure that safety systems in the plant do not become obsolete and help operations run smoothly.

    Frost & Sullivan's Industrial Practice expert, Muthuraman Ramasamy, invites you to join us for the webinar: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety. Hear about future growth opportunities, followed by a live question-and-answer session.

    Key Takeaways:

    Learn how SSIS can benefit your company
    Understand the challenges using conventional safety instrumented systems
    Identify the need for sustainable safety instrumented systems
    Create lasting value to ensure safety systems are manageable
  • Architectures for deploying SD-WAN and Security
    Architectures for deploying SD-WAN and Security Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Sep 20 2018 3 mins



    Security plays a major role in SD-WAN deployments due to the direct internet connectivity inherent to SD-WAN. Any SD-WAN solution and architecture must be considered at both the networking/WAN level AND the security level.

    This session will focus on the alternative architectures for deploying SD-WAN and security in view of Gartner’s suggested architectures and NSS Labs SD-WAN test report – the 1st independent SD-WAN group test report.
  • 網絡戰中的人工智能:入門
    網絡戰中的人工智能:入門 蕭松瀛, Nicholas Hsiao, FireEye 技術顧問 Recorded: Sep 20 2018 44 mins
    人工智能(AI)是一種變革性的雙用途技術,可以為組織提供更好的網絡防禦工具,並幫助對手改進攻擊方法。 更有效地了解人工智能的當前和未來潛力﹔將有助於用戶了解相關新興技術如何影響他們的業務。
    Nicholas Hsiao技術顧問將會分三個單元討論人工智能,在第一單元會講解以下議題:
  • (Replay) IT Convergence: A Perspective on CI & HCI
    (Replay) IT Convergence: A Perspective on CI & HCI Howard Marks, Chief Scientist, DeepStorage.Net; Vaughn Stewart, VP of Technology, Pure Storage Recorded: Sep 20 2018 20 mins
    Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace. Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise.

    Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what is best for your organization.
  • Transforming Business with Strategic IT
    Transforming Business with Strategic IT Seth Robinson, Senior Director, Technology Analysis, CompTIA Recorded: Sep 19 2018 55 mins
    Enterprise technology has gone through a major shift, and understanding that shift is a prerequisite for a winning game plan. To fully appreciate the new approach, companies must ask some basic questions.

    - How is today’s IT different from an organizational perspective?
    - Which driving factors are contributing to the flood of new technology trends?
    - What are the behaviors that stem from this fundamental IT change?
    - What steps should a company take to move forward?

    This webinar relies on research across a variety of topics and conversations with IT professionals to provide a description of the way technology is integrated into modern business.

    Seth Robinson is the senior director of technology analysis for CompTIA, the leading trade association for the IT industry. In this role, he analyzes technology trends in the IT industry and provides insight into trend drivers and future direction.
  • Bring Your Sales Process to Life with Sales Engagement
    Bring Your Sales Process to Life with Sales Engagement Sheryl Kingstone, 451 Research & Laila Kimiagar, ClearSlide Recorded: Sep 19 2018 50 mins
    Many companies have focused investments on systems of record such as CRM that manage internal processes and transactions — but they're realizing these tools don't actually help reps sell. Complementary Sales Engagement technologies are "in the room" with sellers and provide insight and guidance with every buyer interaction — so the right message is used for the right prospect, across formats and channels. This webinar will provide an overview of how to utilize Systems of Engagement to improve win rates, including:

    · The differences between systems of record and systems of engagement
    · Best practices to move beyond activity tracking to measure actual buying signals
    · How to use intelligent automation to improve data relevancy contained in CRM or SFA

    Start the fall with fresh insight about how to improve sales efficiency and impact using the latest developments in Sales Engagement. Register now!
  • Modernize & Consolidate Your SQL Server Data Platform – You Can’t Afford Not To!
    Modernize & Consolidate Your SQL Server Data Platform – You Can’t Afford Not To! Prasad Venkatachar, Sr. Solutions Product Mgr, Lenovo; Frederico Rezende, WW Product Marketing Mgr, Microsoft Recorded: Sep 19 2018 62 mins
    An objective of enterprise IT is to architect and deliver a multi-purpose database infrastructure that serves various organization workload demands. In today’s data-driven environment, database systems must be designed to scale from low-end, tactical applications to high-end, strategic workloads and seamlessly accommodate organization data capacity growth. To maximize total value and ROI, longevity of the platform is critical. In this webinar, you will see how Lenovo solutions for SQL Server help you migrate, consolidate and modernize existing SQL Server database environments, and integrate end-to-end data flow/data management practices. This webinar will highlight deployment options for OLTP and Data Warehouse, based on enterprise needs and objectives. Performance benchmarks and Customer case studies summarizing business problems and solution benefits will also be shared.
  • Don't Acquire Open Source Risks You're Not Aware Of
    Don't Acquire Open Source Risks You're Not Aware Of Daniel Kennedy, Research Director - Information Security, 451 Research; Phil Odence, GM – Black Duck On-Demand Recorded: Sep 19 2018 49 mins
    Modern applications are constructed using open source components. Most organizations understand they’re using open source. What they likely underestimate is its prevalence in their homegrown applications and the potential security and license compliance risks they assume if they’re not continuously monitoring those libraries. When companies merge or are acquired, that unknown risk is transferred, potentially to organizations with greater regulatory exposure. Join Daniel Kennedy, Research Director, Information Security, and Phil Odence, GM, Black Duck On-Demand, for a discussion of these risks and how to address them.
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:


    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Targeted Attacks: A Review of Current Trends and Future Developments
    Targeted Attacks: A Review of Current Trends and Future Developments David Emm, Principal Security Researcher, Kaspersky Lab (Global Research & Analysis Team) Recorded: Sep 19 2018 46 mins
    Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.

    It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.

    About the presenter:
    David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

    In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

    David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
  • Recovering a Failing Outsource IT Service
    Recovering a Failing Outsource IT Service Brendan Mulreany, Director, Finsbury and William Hooper, Director, Finsbury Recorded: Sep 19 2018 44 mins
    Join this live conversation between two senior IT staff of a fictitious company charged with the successful execution of an outsourced arrangement that has just passed its two-year anniversary. Gain insight into the difficulties they are experiencing, their search for the root causes and their development of a plan to deliver targeted improvement.

    The conversation includes how they hope to convince the business that they are fully committed to service its needs. How will they tackle the business perception that IT is defending poor support at high prices? How can they motivate the supplier to provide the services needed whilst making a fair return?

    About the presenters:
    Finsbury Sourcing provides specialist IT and Telecommunications outsourcing project management and consultancy services with a focus on practical implementation. Many of our assignments involve fixing problems in under-performing outsource agreements and the interaction between the parties.

    Brendan Mulreany is a director of Finsbury. He has been involved in delivering services for more than 30 years, during which he has worked on some of the largest and most challenging multi-national services in UK, Europe, US and Australia. He has degrees in law and science.

    William Hooper is a director of Finsbury. He too has worked on some of the world’s largest IT services, recovering and restoring performance. He is a practitioner and acts as an Expert Witness in legal disputes. He holds an MBA and a bachelor’s degree in engineering.

    Both have many years’ experience delivering services as supplier and working client-side.
  • Cloud-First Networking from Big Switch for the Hybrid Cloud Era
    Cloud-First Networking from Big Switch for the Hybrid Cloud Era [Big Switch] Prashant Gandhi, VP & Chief Product Officer & Bala Ramachandran, Director of Product Management Recorded: Sep 18 2018 58 mins
    IT Organizations continue to face challenges due to silo'ed approach to hybrid cloud. Current on-prem data centers have completely different style of networking and governance processes compared to networking in public cloud. With silo'ed teams managing these disparate environments, there are greater complexity and constraints in application deployment, higher costs, and longer deployment cycles.

    Big Switch Networks has pioneered a Cloud-First approach which completely re-imagines hybrid cloud networking to enable consistency and control across on-prem and any public cloud (AWS, Azure or GCP). It brings public cloud’s virtual private cloud (VPC) based logical networking construct for on-prem networking (enterprise cloud networking) to deliver network automation and visibility for enterprise workloads. In addition, by extending control, governance and visibility to public cloud VPCs, IT organizations can finally bring their hybrid cloud vision into reality.

    In this webinar we will discuss:

    1)How Big Cloud Fabric implements VPC construct for network automation and visibility in on-prem (enterprise) cloud.
    2)How Big Monitoring Fabric achieves end-to-end visibility and security for applications deployed both on-prem and in public cloud VPCs.
    3)How Multi-Cloud Director enables unified hybrid cloud management across on-prem and multiple public clouds.
  • Network Upgrades Giving You Security Headaches?
    Network Upgrades Giving You Security Headaches? Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Sep 18 2018 58 mins
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3
    Kubernetes Security Considerations for IDS/IPS in the age of TLS v1.3 Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Sep 18 2018 48 mins
    TLS v1.3 introduces several new security improvements over TLS 1.2 but some of these enhancements have an impact on network-based security solutions such as IDS/IPS. While the goal is to enhance the overall security at the application level, there are a few scenarios that are not easily solved when introducing the new technology, especially in Kubernetes environments. Watch this webinar to learn about security and compliance considerations for Kubernetes when implementing TLS v1.3.
  • Deliver a More Engaging IT Service Management User Experience with SMAX
    Deliver a More Engaging IT Service Management User Experience with SMAX Michael Pott, Sr Prod Marketing Mgr, Neville Ward, Sr Solution Consultant & Vesna Soraic, Sr Prod Marketing Mgr, Micro Focus Recorded: Sep 18 2018 36 mins
    Today’s workforce expects an engaging and automated experience when submitting IT help desk requests, yet most companies are still using outdated manual service desks.

    Join us for this entertaining live demo of Service Management Automation X (SMAX) and see how machine learning, analytics, and codeless configuration come together to deliver a true digital IT service management experience for business users and IT.
  • How DevOps, NetOps & Automation are Changing the IT Landscape
    How DevOps, NetOps & Automation are Changing the IT Landscape Haidee McMahon, Tarak Modi, Kingston Smiler, Joe Cantwell Recorded: Sep 18 2018 60 mins
    Business is becoming ever more digital, and both BizOps and DevOps teams have more technologies, vendors, and products on their roadmaps than ever before.

    Join this roundtable panel discussion for an in-depth look at agile IT and how DevOps, NetOps, automation, and technologies like CI/CD are evolving the IT and software development landscape.

    Moderator: Haidee McMahon, Senior Engineering Manager, WPEngine
    Panelists: Tarak Modi, CTO, TekNirvana and Kingston Smiler, Co-Founder, PALC Networks, Joe Cantwell, Senior Software Engineer at WP Engine
  • Leveraging the Power of the Cloud to Protect VMware Data
    Leveraging the Power of the Cloud to Protect VMware Data Steven Hill Senior Research Analyst, 451 Research Sep 24 2018 2:00 pm UTC 60 mins
    Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
    - Virtualization and cloud adoption trends, usage and business drivers
    Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
    - How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
    - Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
  • NVMe™ over Fabrics: Updates for 2018
    NVMe™ over Fabrics: Updates for 2018 Brandon Hoff, Distinguished Software Architect at Broadcom, NVM Express,Inc. Marketing Workgroup Member Sep 25 2018 4:00 pm UTC 60 mins
    NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.

    Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Sep 25 2018 6:00 pm UTC 45 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
  • Migrating Data from SAN, NAS or Tape to Object Storage
    Migrating Data from SAN, NAS or Tape to Object Storage John Bell, Sr. Consultant and Eric Dey, Director of Product Management Sep 25 2018 6:00 pm UTC 60 mins
    Get behind-the-scenes’ insight into how to migrate data from SAN, NAS or tape to an Object-Based Storage solution. John Bell, Sr. Consultant, and Eric Dey, Director of Product Management, will share their experience from hundreds of successful object storage implementations. They will explain the ins and outs of the data migration process and share best practices to help you move from a limited traditional storage approach to the new, cost-effective, limitless storage paradigm of object storage.
  • How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery Augie Gonzalez, Director of Product Marketing, DataCore Software Sep 25 2018 6:00 pm UTC 60 mins
    Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.

    Offsite data replication combined with advanced site recovery methods should top your list.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
    • Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
    • Techniques that help you test and fine tune recovery measures without disrupting production workloads
    • Transferring responsibilities to the remote site
    • Rapid restoration of normal operations at the primary facilities when conditions permit

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • Why It’s Time to Make Network Traffic Analysis A First-Class Citizen
    Why It’s Time to Make Network Traffic Analysis A First-Class Citizen Eric Ogren, 451 Research & Brian Dye, Corelight Sep 25 2018 6:00 pm UTC 60 mins
    Since nearly all cyberattacks must cross the network it’s an essential source of truth for threat hunters and incident responders, yet many organizations today have limited network traffic analysis capabilities.

    Why? The root of the problem lies in common sources of network data, which are difficult to analyze at scale. Security operators often find themselves stuck between the unwieldy firehose of full traffic capture and the frustrating information desert of network logs like Netflow that offer only a minimal amount of detail. Simply put, it’s either too much, or too little network data.

    A goldilocks alternative exists, however, in the Bro Network Security Monitor. This open source framework transforms network traffic into high-fidelity logs that summarize activity on the wire at less than 1% the size of full traffic capture and can automate traffic analysis tasks via Bro’s unique scripting language. Thousands of organizations rely on Bro to achieve comprehensive, scalable network traffic analysis and Corelight makes Bro easy and ready to deploy at enterprise scale. In this webinar, Eric Ogren, Senior Analyst at 451 Research, and Brian Dye, CPO at Corelight, will demonstrate how Bro can help organizations achieve comprehensive, scalable network traffic analysis and accelerate their threat hunting and incident response workflows.
  • Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018
    Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018 Simon Bitton, Sean McAvan Sep 26 2018 2:00 pm UTC 60 mins
    With just a few weeks to the must-attend IT event of the year for CIOs, IT Managers and Directors, Security specialists, Technical experts, we've gathered some of the elite speakers who will be taking the stage to debate the hottest solutions, trends and the biggest opportunities and challenges for businesses to successfully embrace digital change.

    Topics to be covered include:

    - Cyber Security
    - DevOPs
    - AI Analytics
    - Blockchain
    - Internet of Things

    What will they be talking about at ExCeL London, on the 3-4 of October 2018, what do they want to hear about, what are they looking forward to?

    Simon Bitton, Director of Marketing, Europe, Park Place Technologies
    Sean McAvan, Managing Director, Navisite Europe
  • Data Center Operational Excellence: Creating The Right Staffing Plan
    Data Center Operational Excellence: Creating The Right Staffing Plan Matt Stansberry, Vice President - North America and Rich Van Loo, Vice President Facilities Management Services Sep 26 2018 4:00 pm UTC 60 mins
    How do you ensure your data center staffing plan meets your business's performance and risk requirements? And at the same time, how do you keep growing and challenging your employees to retain key staff? Are you creating a successful culture of continuous improvement as well as a place your employees want to be?
  • Turbocharge Data Pipelines with VelocityAI
    Turbocharge Data Pipelines with VelocityAI Jason Blum, CTO at GPL Technologies and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Sep 26 2018 5:00 pm UTC 60 mins
    Data is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patData is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patterns and structure in this data and its transformation into actionable insights is driven by Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) workloads.

    IDC predicts that in the next three years over half the businesses will use AI, ML, and DL workloads. This has given rise to the NVIDIA DGX-1 GPU-based supercomputer to accelerate these workloads. Vexata supports the DGX-1 and delivers ultra-low latency, massive ingest bandwidth, and heavy mixed random and sequential read/write I/O operations. Using direct attached storage (DAS) or all-flash arrays (AFAs) limits the usefulness of the DGX-1 by restraining performance and requiring complex data provisioning, mobility, and growth. Vexata addresses these issues with VelocityAI, which combines the NVIDIA DGX-1 and the Vexata VX-100FS Scalable NVMe File Array.

    Learn about VelocityAI and how we built it to overcome these machine learning challenges. This webinar is targeted to those that want to leverage GPU for data analytics. Our expert will cover:

    - Dealing with large training and inferencing data-sets by leveraging NVMe media
    - Using the VelocityAI to eliminate movement between data pipeline stages
    - Dealing with data security, protection, and efficiency concerns

    Learn how you can leverage VelocityAI to deliver transformative performance with breakthrough economics at scale for your AI, ML, and DL applications.
  • Monetizing IoT in Smart Agriculture
    Monetizing IoT in Smart Agriculture Steve Brumer, Partner at 151 Advisors & Mark Young, CTO at Climate Corporation Sep 26 2018 5:30 pm UTC 45 mins
    Join Steve Brumer, Partner at 151 Advisors and Mark Young, CTO at Climate Corporation for a 45-minute informative discussion on monetizing IoT in Smart Agriculture.

    This webinar will focus on the Smart Ag landscape, uses cases, opportunities and how vendors & partners can monetize with IoT. Exploring all the business aspects, connectivity, sensors, big data, platforms, and system integration.

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and drive revenue.

    -Steve Brumer, Partner at 151 Advisors
    -Mark Young, CTO & Interim Product Lead at Climate Corporation
  • Nutanix and Thales, Hyerconverged & Hypersecure
    Nutanix and Thales, Hyerconverged & Hypersecure Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix Sep 26 2018 6:00 pm UTC 60 mins
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • Dell EMC Data Protection: Innovate without Compromise with the DP4400
    Dell EMC Data Protection: Innovate without Compromise with the DP4400 Adam Brittin, North American Product Line Manager, Data Protection Sep 26 2018 6:00 pm UTC 60 mins
    Transform your data protection strategy with the Dell EMC DP4400. Learn how Dell EMC Data Protection enables you have backups that are simple to manage, powerful no matter the data, along with tools that can provide lower storage consumption and a peace of mind to your data protection environment.
  • Developer Q and A – Improve Your Application Performance and Efficiency
    Developer Q and A – Improve Your Application Performance and Efficiency Alex Pierce, Field Engineer Sep 26 2018 6:00 pm UTC 60 mins
    Developers are faced with specific challenges to big data success, including poor performance, unpredictable runtimes, and bottlenecks. This webinar will focus on answering questions you need answers to, like “Why is my job running so slow? and “How do I guarantee SLAs of my app?” Our expert will answer these questions and more, with insight from real-world deployments. Learn how to achieve:

    – Improved application performance and efficiency.
    – Reduced troubleshooting time.
    – Improved resource utilization.
    – Insight on cluster events impacting applications.
    – And more.


    Alex joined Pepperdata in 2014. Previously, he worked as a senior solution architect at WanDisco. Before that, he was the senior solution architect at Red Hat. Alex has a strong background in system administration and big data.
  • The Future Data Center - Live from Hitachi Next!
    The Future Data Center - Live from Hitachi Next! Storage Switzerland and Hitachi Sep 26 2018 7:00 pm UTC 60 mins
    What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We'll answer all of these questions on our live webinar roundtable discussion LIVE from Hitachi NEXT2018. Join us as we talk about solutions that can answer questions like:

    •What are the largest cost drivers in my data center?
    •How can IT accelerate my time to market?
    •How do I optimize costs like power and cooling?
    •How can I proactively identify inherent threats and issues?
  • (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget
    (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget Samer Kamal, SAP Solutions Manager, Pure Storage Sep 26 2018 11:00 pm UTC 45 mins
    Companies are facing increasingly complex IT landscapes, and testing needs to occur quickly and with consistency. Resource-intensive tasks, such as SAP system copy, clone, and refresh, can be complex and time-consuming – some customers report spending 3-5 days for one system copy. In this webinar, learn about a copy automation tool for SAP applications that incorporates more than 75% of all pre, copy and post functionality – and automates it. Whether for traditional SAP or SAP HANA, Pure Storage’s Copy Automation Tool (CAT) for SAP applications drives digital transformation with huge gains in productivity and cost savings, and is included with every Pure Storage FlashArray. In this webinar, you will learn:

    - How some companies have saved up to 80 percent of time and budget when performing SAP landscape copy, clone, and refresh tasks, freeing up time to focus on increasing innovation

    - How to simplify SAP copy functionality and gain flexibility through additional integration or customization, to speed SAP migrations, upgrades, and testing

    - How to reduce risks by automating the refresh process, and reduce complexity through the use of this embedded tool
  • SOAR above your legacy Security Operations Center
    SOAR above your legacy Security Operations Center Shashwath Hegde, Solutions Architect, APAC, FireEye Sep 27 2018 3:00 am UTC 60 mins
    In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
  • Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data
    Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data Sarah Beaudoin, Product Marketing Manager, Druva Sep 27 2018 1:00 pm UTC 60 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • What’s New in Data Protector: Introducing Data Protector 10.10
    What’s New in Data Protector: Introducing Data Protector 10.10 Julita Kussmaul, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Sep 27 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector 10.10 introduces two new editions: Data Protector Express for virtual environments and Data Protector Premium for physical, virtual, and multi-cloud workloads. With these editions we are simplifying pricing and packaging for Data Protector.

    Data Protector now offers integrated reporting capabilities making it a complete solution which includes built-in monitoring and reporting that can be managed within its web-based user interface. We’ll discuss the benefits of migrating your current Data Protector installation to these new editions.

    Data Protector 10.10 also includes installation and upgrade improvements including new prerequisite checks and automation. See a live demo of all the new features.
  • Ransomware Attacks: Do You Have a Backup Plan?
    Ransomware Attacks: Do You Have a Backup Plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Sep 27 2018 4:00 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • How to Get Better ROI on your Simulation and Modeling Investments
    How to Get Better ROI on your Simulation and Modeling Investments Dom Daninger, VP Engineering, Nor-Tech; Bob Dreis, Senior HPC Acct Mgr; Brock Taylor, Director of HPC Engineering, Intel Sep 27 2018 4:00 pm UTC 60 mins
    Nor-Tech will show you how to make a better ROI on your investments in Simulation & Modeling software. Software license costs are 75% or more of your TCO investment in most Simulation & Modeling solutions. Nor-Tech’s Intel HPC Technology makes smarter use of your license investments for your software dollars. Nor-Tech 20 years in HPC Technology and their built-in adds called NT-EZ for your HPC Technology solution make them easy to use, and lower cost in many cases than using Workstations or the Cloud.
  • How to Solve your Top IT Security Reporting Challenges
    How to Solve your Top IT Security Reporting Challenges Sacha Dawes Principal Product Marketing Manager, AlienVault Sep 27 2018 4:00 pm UTC 56 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • Cracking the Human Factor problem: Sims, games & data
    Cracking the Human Factor problem: Sims, games & data Bora Aytun Co-founder, CEO, MAVI Interactive Sep 27 2018 5:00 pm UTC 105 mins
    Data-driven integration between Phishing Sims and game-based information security awareness training.

    In this webinar you will learn:
    •Why Phishing Sims didn’t turn out to be the silver bullet to bring down the Human Factor problem in Information Security.
    •Root cause analysis: Why people fail, and how cognitive neuroscience of learning can affect much-needed behavior change.
    •The behavior modification cycle: The process, and why accurate skills assessment is essential.

    You will also see a quick demo of the integrated solution: “Keepnet Labs” and "Info-Sentinel" training mini-games. Q/A Session to follow.

    Mr. Aytun is a 30-year veteran of building technology-based solutions, including B2B product development for the TV broadcast industry, TV and video production, software product development, and in the last decade, game development for training and education. He has been serving the corporate and government training space as the CEO of MAVI Interactive since 2008. MAVI's key contribution to the training industry is making immersive skill development products accessible by all, removing the prohibitive cost barriers.

    MAVI's approach is to develop award winning immersive training systems with modular data structures that can reliably deliver engaging skill development scenarios as well as data-driven performance evaluation. All their solutions are based on Natural Learning Principles, designed to “train the brain” and affect behavior change.

    MAVI's latest integration between Phishing Simulations (Keepnet Labs) and information security behavior modification mini games (multiple-award-winning "Info-Sentinel" series) completes the behavior modification cycle, essential for reducing the Human Factor issues with information security.”
  • Improving Customer Experience with Machine Learning and Sensor Data at Scale
    Improving Customer Experience with Machine Learning and Sensor Data at Scale Larry Lancaster, Zebrium Sep 27 2018 5:00 pm UTC 60 mins
    We live in an increasingly connected world – from cloud software and data center hardware to medical devices, industrial machines, and consumer wearables. Whatever can be connected, will be connected. Why? Because vendors (manufacturers) seek to tap the telemetry data from these connected products to improve their customer experience.

    Building a big data platform from scratch to capture this opportunity is difficult, since most of the data is unstructured and requires specialized domain knowledge and engineering skills to leverage. Join four-time Vertica customer, Larry Lancaster, on our latest Data Disruptors webcast as he explains how:

    • His latest venture, Zebrium, uses Machine Learning to structure product telemetry into a relational system of record to ingest data in-line, at wire speed
    • The Zebrium cloud service platform delivers specialized tools to improve the customer support experience
    • Vertica has enabled each of his former companies – Glassbeam, Data Domain, and Nimble Storage – to become data disruptors in their respective domains