Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Powering Containers with ScaleIO and REX-Ray
    Powering Containers with ScaleIO and REX-Ray Kendrick Coleman and Brian Dean Recorded: May 25 2017 69 mins
    Organizations are using containers to revolutionize and accelerate application deployment, but often have trouble with persistent applications.  Software-defined storage like Dell EMC ScaleIO, combined with storage orchestration engines like REX-Ray, gives users the freedom and flexibility to support Docker, Mesos, and Kubernetes environments with enterprise-class, persistent storage. Learn why software-defined storage provides the best architecture for running containers and how {code} by Dell EMC provides the integration for highly available persistent applications.
  • Data Center Network Operations: Fragile to Agile
    Data Center Network Operations: Fragile to Agile Wyatt Sullivan Recorded: May 25 2017 47 mins
    Network infrastructure today does not provide the agility and availability to support business goals. As cloud, Internet of Things (IoT) and digital strategies take hold, network engineers need a solution for the data center network to increase their business velocity and close the gap between business demands and network service delivery.

    Join Wyatt Sullivan, Product Manager at Apstra®, on Thursday, May 25 at 11:00 AM PST / 2:00 PM EST as he discusses current and upcoming features in the Apstra Operating System™ that deliver a “command and control system” providing game-changing network service agility, uptime and dramatically improved infrastructure TCO.
  • Recovering your data from a Ransomware Attack
    Recovering your data from a Ransomware Attack Sushant Rao, Senior Director, Product Marketing Recorded: May 25 2017 36 mins
    When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.

    Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.
  • Ever dream of eliminating your backup licenses?
    Ever dream of eliminating your backup licenses? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: May 25 2017 49 mins
    Now you can. Hybrid cloud storage that delivers on-demand primary storage and offsite backup plus disaster recovery in a single service means you eliminate backup licenses, secondary storage sites and replicating data. Attend this webinar to learn more.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife Recorded: May 25 2017 59 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients
    Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients Matt Erich, Dir. of Pre-Sales, Imprivata & Slaven Boskovic, Systems Analyst, Teradici , Recorded: May 25 2017 24 mins
    As healthcare organizations look to improve workflows to enable clinicians to spend more time with patients, IT organizations must find ways to keep patient data secure; while providing convenient access.

    Join us for an informative session on how Imprivata OneSign® Single Sign On and PCoIP Zero Clients have improved clinician productivity and resulted in time savings for IT and medical staff; all while enhancing the security of patient data.

    This open Q&A forum will cover how to:
    •Streamline clinical workflows with No Click Access®
    •Increase security to ensure the protection of electronic patient information
    •Meet healthcare compliance requirements with joint solutions from Imprivata and Teradici
    •Provide a consistent user experience that follows clinicians to the point of care

    Q&A will follow at the end of the session.
  • Supermicro Rack Scale Design: Enabling Large Scale Modern Data Centers
    Supermicro Rack Scale Design: Enabling Large Scale Modern Data Centers Marc Fisher, RSD Solution Sales Manager, Intel & Ray Pang, Director of Technical & Solutions Marketing, Supermicro Recorded: May 25 2017 58 mins
    Over the past 20 years, Enterprise IT has evolved from a rigid, buying all IT equipment up-front and provisioning for the next 5 years approach, to the on-demand, agile, scale-out, software defined data centers that the hyperscale companies enjoy today. But if you are not one of those hyperscale companies and need to compete with them, what do you do? Then you will need a solution like Supermicro Rack Scale Design (RSD).

    Based on Intel® Rack Scale Design software framework, Supermicro RSD is a total solution comprised of Supermicro server/storage/networking hardware and an optimized rack level management software. Designed with the whole rack as the new management unit in mind, Supermicro RSD leverages industry standard Redfish RESTful APIs developed by DMTF (Distributed Management Task Force) and provides the agility and efficiency for cloud scale data center operators to perform operations such as resource pooling and composability.

    In this webinar, experts from Intel and Supermicro will discuss motivations behind Intel® Rack Scale Design software foundation and the unique benefits Supermicro RSD brings to cloud service providers, telecoms, and Fortune 500 companies to build their own agile, efficient, software-defined data centers.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife Recorded: May 25 2017 58 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • New Quantum Integration with Veeam
    New Quantum Integration with Veeam Eric Bassier Recorded: May 24 2017 27 mins
    Quantum Announces Unique DXi and Scalar Tape Integration with Veeam - DXi systems now integrated with Veeam Data Mover Service, new Scalar iBlade™ enables Veeam tape creation without separate physical server.
  • Connected Healthcare: How to Prepare for Future Bandwidth Demand
    Connected Healthcare: How to Prepare for Future Bandwidth Demand Susan Larson, Marketing Communications Manager Recorded: May 24 2017 27 mins
    The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:

    - How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
    - Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
    - Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
  • What Makes a Storage Solution TRULY  Software-Defined?
    What Makes a Storage Solution TRULY Software-Defined? Scott Sinclair, Senior Storage Analyst, ESG's Enterprise Strategy Group & Ashok Rajagopalan, Head of Product at Datera Recorded: May 24 2017 59 mins
    It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.

    Register for a chance to win an Apple Watch 2.

    As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.

    In this session, we will discuss:

    - What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
    - What benefits your organization should expect from SDS technology
    - What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.

    Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Sheryl Kingstone 451 Research, Bill Hurley CMO CenturyLink Recorded: May 24 2017 55 mins
    Join 451 Research and CenturyLink May 24th at 1pm ET to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery Recorded: May 24 2017 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Tech Talk: Security and SD-WAN
    Tech Talk: Security and SD-WAN Derek Granath and Anusha Vaidyanathan Recorded: May 23 2017 48 mins
    The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
  • A Case Study on Improving SQL Server Performance 20x with Hyperconverged
    A Case Study on Improving SQL Server Performance 20x with Hyperconverged Sushant Rao, Senior Director of Product Marketing Recorded: May 23 2017 49 mins
    How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
    In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS Recorded: May 23 2017 57 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • Making NFS and S3 Interoperable with Swarm Object Storage
    Making NFS and S3 Interoperable with Swarm Object Storage Glen Olsen, Product Manager Recorded: May 23 2017 53 mins
    While many storage vendors are touting multi-protocol access between file and object worlds, Caringo once again takes it to the next level extending multi-protocol access to metadata. Everything you can do with files in a file-based world you can do with objects through Swarm and SwarmNFS. Join this webinar to see a simple demonstration of the new go-to beyond the file system.
  • Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG
    Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG Terri McClure, Senior Analyst; Vaughn Stewart, VP of Product; Joel McKelvey, Infrastructure Solutions Recorded: May 23 2017 35 mins
    Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.

    In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.

    Terri McClure, Senior Analyst, ESG

    Vaughn Stewart, VP of Product, Pure Storage

    Joel McKelvey, Infrastructure Solutions, Pure Storage
  • Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning
    Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning ExtraHop Team Recorded: May 23 2017 55 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and software-defined networks will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight, on-prem and in the cloud.

    Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto Recorded: May 23 2017 51 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • Extending Real-time Service Assurance with 360o Visibility to Telco Cloud
    Extending Real-time Service Assurance with 360o Visibility to Telco Cloud Anton Basil, Vice President – Technologyand Selvaraj Balasubramanian, Vice President – Products, Veryx Technnologies Recorded: May 23 2017 30 mins
    While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.

    Join this webinar to learn about:
    - Challenges faced by telecom service providers while deploying NFV-based services.
    - Understanding potential bottlenecks in NFV infrastructure.
    - How to diagnose the bottlenecks and overcome them.
    - How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure

    Who should attend?
    - Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
    - Network engineering teams exploring service assurance and visibility tools.
    - Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
    - Application providers and system integrators designing and deploying NFV ecosystem.
    - Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
  • WannaCry Aftermath: Lessons Learned and What to Expect Next
    WannaCry Aftermath: Lessons Learned and What to Expect Next Tom Roeh, Systems Engineering Manager, Jeff Costlow, Director of Security, ExtraHop Networks Recorded: May 19 2017 49 mins
    What happens when cybercriminals get hold of exploits developed at the NSA? We found out earlier this month with the WannaCry ransomware attack, which quickly spread within organizations around the globe. In this webinar, we will discuss the weaknesses in existing IT defenses that WannaCry exposed, what the attack portends for the rest of 2017, and—most importantly—what IT organizations can do to defend themselves against increasingly potent threats.
  • Optimize Cloud and Traditional Data Center for Performance and Access
    Optimize Cloud and Traditional Data Center for Performance and Access Randy Hayes (Avere), David Belardo (Google Cloud), Scott Jeschonek (Avere) Recorded: May 19 2017 54 mins
    While cloud computing and storage are where IT is going, it is important to get the most value out of your existing data center assets. Seamless integration between these assets and cloud resources is key to optimizing each to match agency needs. But, how difficult is it to build a hybrid cloud architecture? How do you maximize performance while keeping security and cost in check?

    Ready to learn more? Please join Avere Systems, Google, and Carahsoft for a webcast as we explore how to approach integration between your existing architecture and Google Cloud Platform.

    Attendees of this webcast will learn:
    - Why and when to use Hybrid Cloud Architectures
    - Advantages of using Google Compute Engine and Google Cloud Storage services to government agencies
    - How to provide seamless integration between existing clients, network attached storage resources, and remote Google Cloud Platforms services
  • Ransomware Data Protection Strategy for Healthcare Organizations
    Ransomware Data Protection Strategy for Healthcare Organizations Natalie Eicher, Cliff Kittle, Jim Shook, and Scott Bedke Recorded: May 18 2017 65 mins
    Attend this webcast to learn more about how to better equip your healthcare organization in the fight against Ransomware and Cybersecurity threats. Some of the discussion points will include: The Current Cybersecurity Threat to Healthcare and Dell Technologies' Unique Approach to Security Transformation, Isolated Recovery Strategy.