Hi [[ session.user.profile.firstName ]]

Data Center Management

  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Live 60 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

    Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Live 75 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • Take your Incident Response plan to a whole new level!
    Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Recorded: Oct 17 2017 44 mins
    In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

    This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

    Shortening the breach identification and investigation phase provides several benefits:
    - Meet stringent data privacy compliance regulations, like GDPR
    - Focus efforts on effective forensic analysis and remediation
    - Limit breach exposure and the expenses related to handling breaches

    Up your incident response game!
  • Deliver agile data management with Commvault HyperScale™ Software
    Deliver agile data management with Commvault HyperScale™ Software Marc Lucas & Roger Lane, Commvault & Bob Pearson, HPE Pointnext Recorded: Oct 17 2017 53 mins
    The EU General Data Protection Regulation (GDPR) is the most important new regulation involving individuals’ information to emerge over the last few decades: it provides the foundation for how multi-national organisations and government agencies must protect sensitive customer information, and also how they can derive value from enterprise data.

    MAKE COMPLIANCE GOOD FOR YOUR BUSINESS

    In order to prepare for the May 2018 deadline, organisations must interpret the GDPR requirements, map processes and technology to them to ensure compliance, and quickly identify the correct information to be tightly managed and protected. Information insight is the key to solving these challenges of large volumes of data and high levels of complexity. The risks are high - lost customer confidence, security breaches, fines, sanctions, and potential lawsuits.

    DO YOU KNOW WHERE YOUR DATA AND STORAGE SHOULD BE?

    Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with unprecedented elasticity, scale, resiliency and availability, on a consumption based economic model. However, the choice between public cloud and on-premises infrastructure is not a binary one.

    Register to attend our webinar on Tuesday 17th October at 11:00 GMT to discover how HPE Pointnext GDPR Consulting services can provide the expertise and support to de-risk your journey to compliance. Plus learn how Commvault Hyperconverged Architecture can help you to overcome the complexities of GDPR through the consolidation of all roles performed by discrete servers in the traditional data protection architecture into a single software defined stack.
  • ExtraHop 7.0: Know the Shape of Your Enterprise - APAC
    ExtraHop 7.0: Know the Shape of Your Enterprise - APAC Isaac Roybal, Director of Product Marketing and Daniel Chu, Director of Systems Engineering Recorded: Oct 17 2017 55 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • What is Modern Service Management? with John Clark
    What is Modern Service Management? with John Clark IT Chronicles Media Recorded: Oct 16 2017 11 mins
    Modern Service Management is not another framework, or set of books or IP. It is designed to enable ITSM professionals to focus on business outcomes.
  • DevOps Automation - The real business value - Steve Brodie
    DevOps Automation - The real business value - Steve Brodie IT Chronicles Media Recorded: Oct 12 2017 12 mins
    Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
  • Meet the new Connectrix Top-of-Rack IP Switch for VxRail
    Meet the new Connectrix Top-of-Rack IP Switch for VxRail Deirdre Wassell, Don Pisinski, and Ray Balli Recorded: Oct 12 2017 12 mins
    Dell EMC Connectrix recently introduced a new Top-of-Rack IP Switch which will primarily be deployed for Vx-Rail, but, this new switch has some other features to address our customer’s requirements for Hyper-converged Infrastructure and IP Storage Networking.
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Recorded: Oct 12 2017 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.

    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?

    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.

    ¿Infraestructura en hospedaje?

    Obtenga información en tiempo real de consumos de energía, temperatura, flujos de aire así como la salud de los componentes de sus servidores para cumplir con los SLA de su organización.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Recorded: Oct 12 2017 43 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • How To Map Applications & Infrastructure for GDPR, Change control and Risk
    How To Map Applications & Infrastructure for GDPR, Change control and Risk David Cuthbertson Recorded: Oct 12 2017 46 mins
    David Cuthbertson will show you methods and techniques to help achieve a baseline map of your IT systems, supporting not just GDPR issues but also change control, operational management and risk assessment.
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • Getting Started with Tectonic Sandbox
    Getting Started with Tectonic Sandbox Paul Burt, CoreOS Recorded: Oct 11 2017 34 mins
    Tectonic Sandbox makes it easy to try, develop, and deploy applications to a Tectonic cluster locally. In this webinar, we'll discuss the differences between Tectonic Sandbox and other local Kubernetes environments. We'll cover what kinds of tasks a local cluster is better suited for. And, we'll use this local setup to look under the hood at some of the features that make Tectonic special.
  • Gain Visibility and Control of your Apps in the Hybrid Cloud
    Gain Visibility and Control of your Apps in the Hybrid Cloud Derek Yee, Sr. Product Mktg. Manager, Networking, Citrix & George McGregor, Sr. Director, Product Mktg., Networking, Citrix Recorded: Oct 11 2017 60 mins
    Applications are moving to the hybrid cloud: they are either migrating from the data center or they are being developed as cloud-native applications. This webinar explores the challenges of gaining end-to-end visibility and control of your applications in a hybrid cloud environment.

    Join us and learn how to:

    •Identify the key requirements to shift your applications to the hybrid cloud
    •Build an application-centric view across all your delivery infrastructure
    •Automate tasks that save time and eliminate human error
    •Integrate with OpenStack and Kubernetes to achieve true orchestration and automation
  • Solving Performance Bottlenecks For Spark Developers
    Solving Performance Bottlenecks For Spark Developers Vinod Nair, Director of Product Management Recorded: Oct 11 2017 47 mins
    Intended for software engineers, developers, architects and technical leads who develop Spark applications, Vinod Nair will discuss how Pepperdata the product suite helps developers in Big Data Environments.
  • Disruption of the file storage market:  Extending file storage to the cloud
    Disruption of the file storage market: Extending file storage to the cloud Taneja Group Senior Analysts Jeff Kato & Jeff Byrne with Qumulo Senior Product Manager Justin Mahood Recorded: Oct 11 2017 43 mins
    In over 400 interviews with IT decision makers, the Taneja Group learned that an increasing number of organizations want not just to store files in the cloud, but to easily move those files between the cloud and on-premise.

    In response, the Taneja Group has identified an emerging set of storage products they call “multi-cloud primary storage” that can span multiple environments. One of the vendors at the forefront of this trend is Qumulo, whose “universal-scale storage” product, Qumulo File Fabric (QF2), allows cloud instances and computing nodes on standard hardware to work together to form a single, unified file fabric.

    Join Taneja Group Senior Analysts Jeff Kato and Jeff Byrne as they discusses the research behind the Taneja Group’s Multi-Cloud Primary Storage report. They will be joined by Qumulo employee Justin Mahood, who will describe why the “universal-scale” of QF2 is the best way to store files in the cloud and on-premise.
  • Caringo Swarm Hybrid Cloud for Microsoft Azure
    Caringo Swarm Hybrid Cloud for Microsoft Azure Eric Dey, Product Manager Recorded: Oct 11 2017 50 mins
    Does your storage disaster recovery plan or strategy need a tune-up? Would you like to leverage public cloud to augment your data protection strategy? Caringo Swarm Hybrid Cloud for Microsoft Azure makes it simple for organizations to move data to the Azure cloud securely and quickly. Caringo Product Manager Eric Dey will talk about Caringo's latest product feature and explain how organizations can get data protection and additional benefits by using a hybrid cloud strategy.
  • Retail Analytics: Get More Value from Legacy Systems with a Modernized Approach
    Retail Analytics: Get More Value from Legacy Systems with a Modernized Approach Styrbjörn Torbacke, Managing Director, Zoined and Dana Gardner, Principal Analyst, Interarbor Solutions Recorded: Oct 11 2017 48 mins
    Recently Tesco went out in an Essential Retail article and defended legacy systems. “If you don’t have legacy, you are probably not in business”, said their CDO, Thomas Nielsen. So what would Vertica have to offer Retail if legacy is that good?

    In this webinar we’ll look at some of the strategic areas that are transforming retail, its operations, and its interaction with the ones who call the shots – the customers. The best use of Vertica in a retailer might not necessarily be to deploy it as a replacement for any of its siloed legacy systems, but rather to provide a means to explore, analyze and visualize insights derived from several of these legacy systems.

    This is exactly what Zoined, a Vertica OEM partner, does in its analytics offering. Zoined Retail & Hospitality Analytics is a cloud based SaaS product, which out of the box contains 90-95% of the metrics and KPIs used by retailers and hospitality operators to track and monitor their businesses, giving them support for smarter decisions and actions in key areas such as assortment, cross-sell and staff performance optimization, all in real time.

    Styrbjörn Torbacke, the MD of Zoined will describe how Vertica allows them to combine, correlate and present operational insights in real time to relevant staff in a retail environment.
  • Not all Storage is Created Equal: A Perspective on IT Convergence & HCI
    Not all Storage is Created Equal: A Perspective on IT Convergence & HCI Howard Marks, Chief Scientist, DeepStorage.Net, Vaughn Stewart, VP of Technology, Pure Storage Recorded: Oct 11 2017 20 mins
    Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace.

    Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise when it comes to your storage solution. Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what storage and infrastructure models are best for your organization.
  • Be Prepared for GDPR! Overview & Best Practices for Compliance
    Be Prepared for GDPR! Overview & Best Practices for Compliance Stéphane Estevez Recorded: Oct 11 2017 37 mins
    General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.
  • Why Boeing, Vodafone, SPAR and many others love Operations Bridge and What’s New
    Why Boeing, Vodafone, SPAR and many others love Operations Bridge and What’s New Harald Burose and Ian Bromehead Recorded: Oct 11 2017 76 mins
    As a retailer SPAR has solved their issues with web store rollout. Vodafone reduced events by over 80%. Boeing evolved most of the users from OM to Operations Bridge in less than 3 months. They have all gained visibility, focus on the right IT issues impacting business, and moreover autonomous operations. They profit from the high degree of automation that the Operations Bridge brings as well as the significant way it helps integrate their tools and data into a single service driven prioritized view.

    To launch this SIG, we’ll show you some of their work and the benefits gained. We’ll introduce you to the latest version of Operations Bridge, speak about the containerized version and its roadmap within the new Micro Focus branded software company. All this should inspire many questions for a lively SIG session, one of many more to come.

    Agenda:

    •Operations Bridge Action – success stories
    •What’s new in today’s version 2017.08
    •The roadmap
    •What’s coming up events, sessions, activities and where to get more information
    •Q&A
  • Introducing Apstra AOS™ 2.0 for  Virtual and Physical Workloads
    Introducing Apstra AOS™ 2.0 for Virtual and Physical Workloads Josh Saul, Solutions Architect, Apstra Recorded: Oct 10 2017 27 mins
    SaaS companies, telecom service providers and enterprises alike need to transform their networks to capitalize on market opportunities while reducing OPEX. This transformation is inexorably leading toward the development of autonomous networks.

    Apstra is leading this movement, and our intent-based networking system — the Apstra Operating System (AOS)™ — is taking another leap forward with powerful new features that will help enterprises increase their speed to market and ensure higher security levels for virtual and physical workloads.

    In the webinar "Introducing Apstra AOS for Virtual and Physical Workloads" Josh Saul will discuss and demonstrate several of the new features in the latest release of AOS that are critical steps forward in the evolution of autonomous networks.
  • VMware vSphere 6.5 Series: Best Practices and "How Tos" for Migration
    VMware vSphere 6.5 Series: Best Practices and "How Tos" for Migration Logan Smith, Senior Systems Engineer, and Joseph Griffiths, Senior Solutions Architect Recorded: Oct 10 2017 44 mins
    Discover top considerations around architecting the migration to vSphere 6.5 from Joseph Griffiths, Solution Architect, and Logan Smith, Systems Engineer. During this webcast, they will address specific design "How-Tos" and deep dive into architecture best practices.
  • Cloudify Your On Premises Data Storage
    Cloudify Your On Premises Data Storage Rob Commins, Sr. Director, Product Marketing at Tegile Systems, a Western Digital Company Oct 17 2017 6:00 pm UTC 60 mins
    CFOs rejoice! CEOs take to the streets in celebration! Ok, maybe it’s not quite that exciting, but did you know that you can get the best of both worlds in storage? One of the biggest challenges in storage has been paying for it. Thanks to trying to plan for exactly how much storage you need right now versus how much you need in the future, people often just overbuy with the expensive hopes that they’ll grow into it.

    You actually have a whole lot of financing options at your disposal to pay for storage, from buying to leasing to simply paying for what you use, just like the cloud. Why pay for storage that you’re never going to actually use?

    And, what happens when your storage gets too old? You buy new. What if you didn’t have to? What if you could pay a bit more in maintenance on your current system in exchange for an upgrade when the time comes?

    Join Rob Commins, Sr. Director of Product Marketing for Tegile Systems, as he takes a deep dive into:

    - Best practices for storing your data in the cloud
    - How to keep cloud storage costs to a minimum
    - How to scale data growth and storage capacity

    Speaker Bio:

    Rob Commins has been instrumental in the success of some of the storage industry's most interesting companies over the past twenty years including HP/3PAR, Pillar Data Systems, and StorageWay. At Western Digital, he leads the Data Center System's business unit's product marketing team.
  • 2018 Forecast: Clouds Keep Rolling In
    2018 Forecast: Clouds Keep Rolling In Howard Marks, Deep Storage & Bernie Behn, Avere Systems Oct 17 2017 7:00 pm UTC 60 mins
    Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.

    Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.

    Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.

    Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
    - Current environment and challenges in building hybrid infrastructures that support traditional and object storage
    - Five not-to-be-ignored trends ripe for adoption in 2018
    - How compute and storage can mix in the new cloud-enabled world
  • Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era
    Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era Jim Donovan, VP Product Management & Customer Operations Oct 17 2017 7:00 pm UTC 45 mins
    As digitalization and the Internet of Things (IoT) become commonplace, big data has the potential to transform business processes and reshape entire industries. But antiquated and expensive data storage solutions stand in the way.

    A new generation of cloud storage has arrived, bringing breakthrough pricing, performance and simplicity. Cloud Storage 2.0 delivers storage as an inexpensive and plentiful utility, so you no longer have to make difficult decisions about which data to collect, where to store it and how long to retain it. This talk takes a look into how you can cost-effectively store any type of data, for any purpose, for any length of time. Join us to learn about the next great global utility, Cloud Storage 2.0.

    Key takeaways:
    -The next biggest cloud storage trends and technologies that are shaping the industry
    -How to embrace the era of digital transformation and IoT without breaking the bank
    -Best practices for storing, analyzing and utilizing big data
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Oct 17 2017 9:00 pm UTC 60 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellonox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • Securing All of Your Data on All of Your Clouds
    Securing All of Your Data on All of Your Clouds Ronen Shpirer, Security Solutions Architect, Fortinet Oct 18 2017 9:00 am UTC 45 mins
    Your data is created, processed and consumed everywhere in your data center, and in an multi-dimensional hybrid cloud environment.

    Securing and protecting this data seamlessly across these environments in a coherent way is crucial to the effectiveness of your security posture.

    This session will provide a mix of information and live demonstrations on seamlessly securing all of your data on all of your clouds.
  • Visibility & Actionable Intelligence for a Migration to GCP
    Visibility & Actionable Intelligence for a Migration to GCP Chris Grossmeier, Director of Product Management Oct 18 2017 4:00 pm UTC 45 mins
    Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
  • Tiers Without Tears: A Modern Archive Architecture
    Tiers Without Tears: A Modern Archive Architecture Ashvin Naik Oct 18 2017 4:00 pm UTC 60 mins
    As a modern object storage platform, Elastic Cloud Storage (ECS) brings cloud economics and Exabyte scale to your datacenter, thereby drastically lowering the total cost of ownership for your storage. In this session, you will learn about tiering your data to ECS from Dell EMC platforms like Isilon, Data Domain, as well as third party storage platforms to take advantage of modern infrastructure and get more out of your IT investments.
  • A Storage Strategy to Achieve Better Data Protection, Preservation & Visibility
    A Storage Strategy to Achieve Better Data Protection, Preservation & Visibility Kieran Maloney, Product Marketing Manager, Quantum Oct 18 2017 5:00 pm UTC 45 mins
    Cloud and flash storage are still leading significant changes in today's data storage industry. With the amount of data and number of devices that organizations are experiencing, implementing a strategy that employs “cheap and deep” storage behind high performance flash is a must for 2018.

    Join Kieran Maloney, Product Marketing Manager at Quantum as he discusses how today’s archive solutions complement flash storage by providing low cost, long-term data preservation and protection while maintaining data visibility and access.

    You will learn:

    - How companies deploy storage tiers to optimize performance, data preservation and cost
    - A partner use case with Pure Storage that delivers a comprehensive tiered storage solution for large unstructured data sets
    - Trends and predictions for the flash storage market in 2018
  • Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage
    Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage Sim Upadhyayula, Supermicro; Vivek Sarathy, Intel; Jase McCarty, VMware Oct 18 2017 5:00 pm UTC 60 mins
    Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.

    BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.

    For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.

    Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
  • Cloud Native Enterprise ITOM
    Cloud Native Enterprise ITOM Greenlight Group Oct 18 2017 5:00 pm UTC 60 mins
    Join us for the first in a series of monthly webinars, presented by Greenlight Group, where Micro Focus and Greenlight Group will provide an introductory session of Micro Focus's container orchestrated IT Operations Management platform. In this webinar, Torrey Jones, Greenlight Group Principal Consultant, will talk through the basics of Micro Focus’s cloud native Container Deployment Foundation – a Docker and Kubernetes centric game changing platform for IT Operations Management in the Enterprise. Prior to diving into the topic of the hour, special guest Roy Ritthaler , VP, Marketing, IT Operations Management, will provide a short update of the New, Combined Micro Focus – post merger with HPE Software.
  • Answers to 5 Cyber Security Challenges for the Midsize Enterprise
    Answers to 5 Cyber Security Challenges for the Midsize Enterprise Dan Reis, FireEye Director of Product Marketing, Endpoint Security Oct 18 2017 5:00 pm UTC 60 mins
    Large corporations aren’t the only targets for sophisticated advanced attacks. In fact, cyber criminals find that small and midsize enterprise (SME) companies are easier targets because their security is not as advanced and they don’t have proper cyber defenses.

    FireEye SME customers are more prepared to defend their company’s digital assets. Join us for a live problem-solving webinar based on real-world examples from your peers and learn:

    •What best practices will increase cyber awareness
    •How to conduct a security assessment to identify gaps and a
    strategy
    •How to align security needs and reduce vulnerabilities

    Register today to gain insights into SME cyber warfare and more effectively protect your business from advanced attacks.
  • The Frontline Is Everywhere: New Perspectives on Defense in Depth
    The Frontline Is Everywhere: New Perspectives on Defense in Depth Brian Anderson, Director of Security Product Management Oct 18 2017 6:00 pm UTC 60 mins
    As today’s businesses come under attack from increasingly malicious cyber threats, a traditional “defense in depth” strategy may become insufficient to effectively fend off attackers and prevent business disruptions and downtime. As mobility, IoT, and BYOD open new attack vectors and attacks become more sophisticated, the situation only worsens. While 100% prevention is impossible, rapid identification and containment is not.

    
In this live webinar, TierPoint Director of Security Product Management, Brian Anderson will discuss why we need to redefine defense in depth approaches to safeguard data from emerging threats.

    
Join Brian as he shares insight into the following key considerations when developing a better, more comprehensive security strategy:

    • The implications of the disappearing network edge.
    • Why a traditional “defense in depth” approach, while still a good start, is no longer sufficient
    • Keys to rapid identification and containment
    • How visibility, detection, escalation, and automated response help close the loop
  • All things logging for Kubernetes on AWS
    All things logging for Kubernetes on AWS Colin Hom, CoreOS Oct 18 2017 6:30 pm UTC 60 mins
    This webinar will show how to set up an ELK (elasticsearch-logstash-kibana) logging stack on top of a Tectonic Kubernetes cluster. These three components work together to provide a solid logging, searching, and visualization of your infrastructure's data logs. We'll split this webinar into 3 segments to teach how to deploy the stack, how to query your log data, and how to integrate the ELK stack with Tectonic's cloud-native tools.

    Part I: Deploy the stack
    This involves three new components which will be deployed on the cluster: Elasticsearch statefulset, Fluentd daemonset, and Kibana.

    Part II: Querying log data
    Next, we'll look at how to effectively reference Kubernetes metadata when querying log objects in stored in Elasticsearch, and some common patterns in querying Kubernetes logs and gaining visiblity into various cluster components and/or deployed applications.

    Part III: EFK/ELK cluster logging on tectonic
    Finally, we will address how to deploy the ELK stack optimally on top of Tectonic.
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security
    451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto Oct 19 2017 3:00 pm UTC 60 mins
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Oct 19 2017 5:00 pm UTC 45 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • Business Insight: How to Interpret the Gartner Market Guide for PAM
    Business Insight: How to Interpret the Gartner Market Guide for PAM Suresh Sridharan, Director Privileged Access Management, CA Technologies Oct 19 2017 5:00 pm UTC 60 mins
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Paul Barrett, Systems Specialist, Teradici Oct 19 2017 5:00 pm UTC 30 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • How to Make Network Analytics Useful for the Whole Business
    How to Make Network Analytics Useful for the Whole Business Kentik Co-founder & CEO Avi Freedman and Forrester Analyst Andre Kindness Oct 19 2017 5:30 pm UTC 60 mins
    In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:

    - The changes in enterprise networks that make modern network analytics a must-have
    - Why it’s so important to combine network data with business context
    - Examples of business intelligence driven by network data in IT organizations today
    - How you can gain the business advantage that modern network analytics offers
  • Expanding on DataCore’s Vision - Learn What's New at DataCore
    Expanding on DataCore’s Vision - Learn What's New at DataCore Paul Nashawaty, Director of Technical Marketing, DataCore Software Oct 19 2017 6:00 pm UTC 60 mins
    George Teixeira, our CEO, President and Co-Founder once said:

    “DataCore is committed to creating an enduring and dynamic software-driven architecture liberating data and its productivity from static hardware based limitations.”

    We are expanding on our vision with the new capabilities in the next release of DataCore SANsymphony and Hyperconverged Virtual SAN.

    Join us for this webinar and learn about:

    •DataCore Cloud Replication
    •Container Management
    •Data Resiliency
    •Automation & Enhanced API Integration
  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Oct 19 2017 9:00 pm UTC 60 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • Asia Pacific Cyber Threat Landscape
    Asia Pacific Cyber Threat Landscape Bryce Boland, Asia Pacific CTO Oct 24 2017 1:00 am UTC 60 mins
    From the first time that criminal charges were files against a known state actor for hacking in 2014 to the recent US Senate Intelligence Committee hearing on Russian influence on the 2016 US Election, FireEye has been integral to investigations where cyber attacks resulted in the most significant impact on governments around the world. We will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
  • ThinkAgile VX Series: The World of HCI Just Got Easier
    ThinkAgile VX Series: The World of HCI Just Got Easier Tony Harvey, Sr Product Manager, vSAN Hyperconvergence, Lenovo; Robert Campbell, Technical Alliance Marketing Manager, Vmware Oct 24 2017 3:00 pm UTC 60 mins
    Imagine you went to a restaurant and ordered fish and your server came back with a Patagonian Toothfish, a pile of random spices and vegetables, a knife and a frying pan and told you to cook it yourself. Hhhmmm, you thought. So you asked for help. The response: a badly photocopied sheet of paper with a website URL to learn the ingredients for a “Chilean Sea Bass” and a few recipes to boot. This is how we build infrastructure today.

    VMware vSAN based hyperconverged solutions from Lenovo revolutionize how you can deliver your datacenter infrastructure. The set-up is simpler, it costs less and easier to use than traditional IT solution. It allows you to focus on running your business rather than on building your infrastructure. Join this webinar as VMware and Lenovo introduce the new ThinkAgile VX Series. The result of this offering: ability to focus on the true business value of hyperconvergence. You will see how vSAN ReadyNodes and ThinkAgile VX will help re-engineer Enterprise IT to be flexible and responsive, enabling more time delivering business value rather than integrating IT infrastructure.
  • Evaluating Managed Detection and Response Vendors
    Evaluating Managed Detection and Response Vendors Gareth Maclachlan, Vice President, Product and Market Strategy, Global Services and Intelligence Oct 24 2017 3:00 pm UTC 60 mins
    Evaluating Managed Detection and Response Vendors: Key Considerations that Cut Through the Hype

    You’re fighting an asymmetric battle. You’ve invested millions in protection technologies but unknown attackers still find a way in. SIEMs and MSSPs provide event monitoring - but in 85% of incident response engagements conducted by Mandiant consultants last year, the client had an existing MSSP or SIEM.

    A new class of managed detection and response services (MDR) has emerged to help organizations improve their threat detection and incident response capabilities. However, solution providers offer varied approaches and capabilities making it challenging for security leaders to understand and compare offerings.

    In this webinar, you will learn:

    •Why standard cyber security solutions still leave you vulnerable and why the market is transitioning to MDR
    •Which capabilities are critical to improving threat detection and response
    •What to consider when evaluating managed detection and response service providers