Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 46 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • FCoE vs. iSCSI vs. iSER
    FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Recorded: Jun 21 2018 62 mins
    The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

    One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

    Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

    That leads to several questions about FCoE, iSCSI and iSER:

    •If we can run various network storage protocols over Ethernet, what
    differentiates them?
    •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
    •How are they structured?
    •What software and hardware do they require?
    •How are they implemented, configured and managed?
    •Do they perform differently?
    •What do you need to do to take advantage of them in the data center?
    •What are the best use cases for each?

    Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
  • Slash Storage TCO for Rapidly Scaling Data Sets
    Slash Storage TCO for Rapidly Scaling Data Sets Glen Olsen, Caringo Product Manager & Krishna Subramanian, Komprise COO Recorded: Jun 21 2018 57 mins
    The nature of enterprise data is rapidly changing and existing storage infrastructures can’t keep up. Network Attached Storage (NAS) devices were designed for performance and single-site collaboration but file creation and access is different now. Many turn to the cloud to offload data, however, for rapidly scaling data sets, daily transfer rates and bandwidth constraints are an issue. In addition, some sensitive information can’t leave your data center. Komprise and Caringo have partnered to solve these issues by pairing intelligent data management technology with hassle-free, limitless storage.

    Attend this webinar to learn how you can slash TCO for rapidly scaling data sets by identifying data to move from NAS. Then securely transferring it based on value to Caringo Swarm scale-out object storage were it is protected without backups and instantly and securely available internally or externally.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
    Attack Analytics: How to Tackle Too Many Alerts With The Help of AI Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva Recorded: Jun 21 2018 43 mins
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Recorded: Jun 21 2018 45 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Recorded: Jun 21 2018 40 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • VDI with XtremIO X2
    VDI with XtremIO X2 Chhandomay Mandal Recorded: Jun 21 2018 53 mins
    Hundreds of customers are running millions of virtual desktops on XtremIO today. The new XtremIO X2 platform offers opportunities to start with even smaller configurations and scale more granularly. In this session, we will present a holistic overview of an XtremIO X2-enabled VMware VDI environment. You will also learn about XtremIO X2 sizing and best practices for VMware VDI deployments.
  • Securely deliver high-performance desktops and workstations from anywhere
    Securely deliver high-performance desktops and workstations from anywhere Mirela Cunjalo Recorded: Jun 21 2018 33 mins
    Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
  • Impersonation Attacks -  The New Email Based Threats, presented by FireEye
    Impersonation Attacks - The New Email Based Threats, presented by FireEye Ken Bagnall, VP, Email Security, FireEye and Levi Lloyd, Sr. Manager, Detection Services, FireEye Recorded: Jun 21 2018 60 mins
    The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.

    This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:

    • How phishing and impersonation attacks are evolving.
    • How online/email scams develop.
    • What the future of impersonation is.
    • What has the best chance of winning against these attacks.
    • What techniques are used to detect and stop phishing and impersonation attacks.

    Attendees will receive the new FireEye report Changes in Email Attack
    Tactics: Based on Data from July to December of 2017.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Unlock the Power of Data Capital to Accelerate Digital Transformation
    Unlock the Power of Data Capital to Accelerate Digital Transformation Ritu Jyoti, Research Director, IDC and Varun Chhabra, Sr. Director - Product Marketing, Dell EMC Recorded: Jun 20 2018 47 mins
    IDC estimates by 2021 at least 50% of global GDP will be digitized. Data Capital is about helping customers to maximize the value of the insights and information in their data centers today to reach new audiences and revenue potential.

    In this webinar, we’ll be discussing the role data plays and why an emphasis on unlocking the power of your Data Capital will drive success for organizations. We’ll also cover real world examples that show the value of digital transformation, and how you can start your journey.

    In this webcast you will learn:

    Why Data Capital is so important to your organization
    How to unlock your Data Capital and overcome common challenges
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • How To Increase Value from Machine Learning and Advanced Analytics on Azure
    How To Increase Value from Machine Learning and Advanced Analytics on Azure Nate Shea-han, Americas Global Black Belt, Data & AI at Microsoft and Shaun Van Staden, Solutions Architect at Qubole Recorded: Jun 20 2018 31 mins
    Becoming more competitive with big data today means having the right technology to uncover new insights from your data and make critical business decisions in real time. Qubole and Microsoft help companies activate their big data in the cloud to uncover insights that improve customer engagement, increase revenue, and lower costs.

    ​Join experts from Qubole and Microsoft as they discuss how to activate your big data and how to get the most out of open source technologies on the cloud. In this webinar, you'll learn:

    - How to modernize with data lakes and data warehouses on the cloud
    - Strategies for boosting business value out of Machine Learning and advanced analytics with Qubole on Azure
    - How to reduce costs, control risks, and improve data governance as you build your data pipelines
    - The importance of data security and privacy
    - Real world example​s​ of successful companies activating their big data

    Webinar Speakers:

    Nate Shea-han
    Americas Global Black Belt, Data & AI at Microsoft

    Nate Shea-han has been with Microsoft for 14 years and has spent the last 8 years focused on the helping Microsoft customers transform their business in the cloud on the Azure platform. Currently he has responsibilities across the United States, Canada and Latin America for Microsoft’s AI, big data, and analytics offerings. Nate has also worked extensively with Microsoft partner community.

    Shaun Van Staden
    Solutions Architect, Qubole

    Shaun Van Staden has 19 years of experience in enterprise software managing advanced analytics projects, as a developer, DBA, business analyst and now a solutions architect. As a solutions architect manager, Shaun is responsible for supporting business development and sales at Qubole and helping customers transform their use cases for the cloud. Prior to Qubole, Shaun worked as a solutions architect at NICE Systems and Merced Systems (acquired by NICE).
  • The Time for vCPE is NOW!
    The Time for vCPE is NOW! Eyal Aloni & Philip Jerichower, RAD Recorded: Jun 20 2018 43 mins
    White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.

    Eyal Aloni Head of Service Provider Line of Business - RAD
    Philip Jerichower, Director of International Training, RAD
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • When to Choose Object Storage over NAS for Digital Video Workflows
    When to Choose Object Storage over NAS for Digital Video Workflows John Bell, Senior Consultant & Jose Juan Gonzalez, Engineer Recorded: Jun 19 2018 44 mins
    To keep pace with today’s media and digital asset management workflows, you need a cost-effective secondary tier of storage (active archive) that provides instant accessibility and unrelenting data protection—while scaling to store petabytes of unstructured data and billions of files. Caringo Senior Consultant John Bell and Engineer Jose Juan Gonzalez will explain how object storage (using NoSQL, unstructured methods of search like Elasticsearch, and advanced metadata and content management capabilities) can be used to build this active archive and will illustrate use with a live demo of how Caringo Swarm integrates with leading industry tools such as the CatDV media asset management (MAM).
  • Cloud Security: Lessons from the Trenches
    Cloud Security: Lessons from the Trenches Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX Recorded: Jun 19 2018 46 mins
    According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?

    Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
    - How security can help your company adopt a cloud first strategy
    - Key threats security teams should expect.
    - Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
    - How to gain visibility into your data center and cloud environments
    - Overcoming common objections encountered during migration
  • FICON 101
    FICON 101 Patty Driever, IBM; Howard Johnson, Broadcom; J Metz, Cisco Recorded: Jun 19 2018 62 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilize Fibre Channel as the underlying transport. Mainframes are built to provide a robust and resilient IT infrastructure, and FICON is a key element of their ability to meet the increasing demands placed on reliable and efficient access to data. What are some of the key objectives and benefits of the FICON protocol? And what are the characteristics that make FICON relevant in today’s data centers for mission-critical workloads?

    Join us in this live FCIA webcast where you’ll learn:

    • Basic mainframe I/O terminology
    • The characteristics of mainframe I/O and FICON architecture
    • Key features and benefits of FICON
  • How to manage a Datastore
    How to manage a Datastore Reduxio Systems Recorded: Jun 19 2018 2 mins
    A short guide on how to manage a datastore using the Reduxio StorApp for VMWare vSphere V2.0.
  • Optimize Your IT Infrastructure with Micro Focus Cloud Transformation
    Optimize Your IT Infrastructure with Micro Focus Cloud Transformation Jo De Baer, Arul Murugan Alwar and Renee Bradshaw, Micro Focus Recorded: Jun 19 2018 53 mins
    Enterprises today are looking to optimize their IT infrastructure to take advantage of new digital technologies and services.

    One of the most popular ways to achieve this is by moving server workloads and applications to the cloud. Since this often happens in large numbers, a cloud transformation project can be a complex effort.

    Join us on this webcast and learn how to easily execute even the largest and most complex cloud and data center migration projects, on time and within budget.
  • HCL NFV Cognitive troubleshooting framework
    HCL NFV Cognitive troubleshooting framework Ramesh Sriraman, GM, HCLTech Recorded: Jun 19 2018 54 mins
    Complexity of troubleshooting NFV stack is manifold because of multiple layers of telemetry data. With such large data, SME driven exploratory analysis can be time-consuming and is not scalable. Cognitive Troubleshooting Framework augments exploratory analysis, reduces the time taken to find needle out of haystack by applying AI (ML/DL) algorithms based on model arrived at and help understand the behavior of the overall system and identify bottleneck regions that need be optimized.