Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Big Data Maturity Trends: How Do You Measure Up?
    Big Data Maturity Trends: How Do You Measure Up? Josh Klahr, VP Product, AtScale; Brandon Bunker, Sr Director Analytics, Vivint; Vijay Raja, Cloudera; Dan Kogan, Tableau Live 60 mins
    Are you doing the right things with Big Data? How do your peers, and competitors, use it? Are you ahead of or behind the curve? Is on-premises or Cloud the best direction? Which workloads drive the fastest impact and biggest ROI?

    Join this webinar to learn details of the largest Big Data Maturity Survey, including why and what 2500+ Big Data and BI Enterprise Leaders choose for Big Data priorities in 2017.

    You’ll also hear from Brandon Bunker, Director of Customer Analytics and Intelligence at Vivint, IoT and Smart Home leader. With 1M+ customers generating >20K events per second. As pioneers in their space, Vivint had to get ahead of big data versus letting it get ahead of them. Brandon will share challenges, choices and lessons learned along his journey to deliver the ultimate customer experience and compete in today’s hyper-speed world.

    Join this interactive session to hear about the journey leading enterprises are making with Big Data. You will learn:

    Why leading enterprises are betting big on Big Data
    Which workloads can drive maximum value out of Big Data
    How to leverage Big Data for better customer experience + competitive advantage


    Josh Klahr, VP of Product, AtScale

    Josh is responsible for driving AtScale’s product roadmap and strategy to deliver what customers need to succeed, and has worked with data and analytics since 2000.

    Brandon Bunker, Sr. Director Analytics and Intelligence, Vivint

    Brandon Bunker is Sr. Director of Consumer Analytics and Intelligence at Vivint. Vivint is the leading home automation company in America. His team is responsible for creating real time digital products based on IOT data and machine learning.

    Vijay Raja, Solution Marketing Manager, Cloudera

    Vijay Raja is a Solutions marketing manager at Cloudera, where he is responsible for rolling out new and innovative big data solutions focused on key industry verticals.
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation
    All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Recorded: Mar 29 2017 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • Getting Started with Hyperconverged
    Getting Started with Hyperconverged Sushant Rao, Senior Director of Product Marketing Recorded: Mar 29 2017 41 mins
    If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
  • Faster, Wider and Stronger Cyber Security with SIEM
    Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Recorded: Mar 29 2017 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Own Your Keys to the Cloud
    Own Your Keys to the Cloud Rich Mogull, CEO, Securosis; Ken Beer, GM AWS; Jon Fan, Dir of Enterprise Products, Box Recorded: Mar 24 2017 59 mins
    As organizations, like yours, move their data to the cloud file sharing and collaboration solutions, there may be a limit to what type of data can be moved there without controlling your own encryption keys. With recently announced Box KeySafe (formerly Box EKM), you can now take advantage of content collaboration in the cloud while maintaining independent control over the encryption keys that protect their content. How?

    Box has partnered with Amazon Web Services to provide on-demand management of keys through AWS KMS (Key Management Services). This is a perfect option for organizations that require a simple solution configurable in 30 minutes to address advanced security needs.

    Join Rich Mogull, Industry Analyst and CEO of Securosis with Ken Beer, General Manager of Amazon Web Services and Jon Fan, Dir of Enterprise Products at Box to learn how to:

    - Identify whether you need customer-managed encryption
    - Evaluate options and identify requirements
    - Real-world case studies from different industries and company sizes
    - How organizations justify the investment
    - How to deploy fast without compromising usability and governance at scale
  • The Total Economic Impact of Box
    The Total Economic Impact of Box Michelle S. Bishop, Principal Consultant of Total Economic Impact™ Practice, Forrester; Jeremy Wood, Sr Director of PM, Box Recorded: Mar 24 2017 62 mins
    Looking to better understand your return on investment from using Box – and how you can use the same ROI­analysis techniques to make smarter IT decisions within your own organization?

    Today's workforce demands the ability to work securely from anywhere, at any time, on any device. These highly mobile­centric employees need robust tools to collaborate among diverse teams, yet sophisticated cybersecurity threats have placed new demands on IT – and on the applications they're choosing to deploy. Although cloud solutions have revolutionized the way we get work done, many businesses are still struggling to understand the true cost benefit of deploying these invaluable solutions.

    Box has commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, creating a detailed financial analysis of the cost, benefit, flexibility and risk factors associated with deploying Box.

    Watch this webinar to learn why the Forrester TEI study can be the key to your organization's digital evolution:
    - Become more familiar with Box and its functionality
    - Hear a detailed ROI analysis of Box deployment, as outlined in the -
    Forrester TEI study for Box
    - Discover the methodology Forrester uses to develop the study
    - Gain insight into how you can apply the Forrester methodology to your own company
  • How to Store and Manage 10 Billion Files
    How to Store and Manage 10 Billion Files David Bailey, Qumulo Director of Systems Engineering Recorded: Mar 24 2017 7 mins
    What’s in a number? Well, when that number is 10 billion, I’d say it can mean quite a lot.

    For some, 10 billion represents:
    - The number of photos posted on Facebook (by 2008)
    - The number of song downloads from Apple iTunes (by 2010)
    - The number of Tweets issued by Twitter (by 2010)
    - The number of times Shazam was used to tag songs (by 2013)
    - The number of monthly emails being sent by MailChimp (by 2014)
    - The number of monthly music video views on VEVO (by 2015)
    - The number of quarterly streaming hours of content on Netflix (by 2015)

    For Qumulo, we like to demonstrate how and why our customers create and manage 10+ billion files (in 1.2 million directories) in a single scale-out file system.

    Join David Bailey, Qumulo’s Director of Systems Engineering, for this demo, and see why customers call Qumulo Core scale-out storage “the smartest storage product ever built.”
  • The Simple, Smart Way to Move to the Cloud with Box
    The Simple, Smart Way to Move to the Cloud with Box Aaron Kramer, Head of Consulting, Box; Greg Cannan, Divisional Informational Officer, Toyota USA​ Recorded: Mar 24 2017 51 mins
    Considering the move to cloud but facing challenges getting there?

    Companies of all sizes and in all industries have recognized the productivity gains and cost benefits of moving to the cloud, but many often end up inadvertently using migration methods that are inefficient and insecure. After all, moving massive amounts of sensitive data to the cloud isn't a simple undertaking!

    At Box, we believe businesses across the globe should be able to make a smooth and seamless transition to the cloud so they can start reaping its benefits faster. That's why we're excited to announce a new service called Box Shuttle: the simple, smart way to migrate large amounts of content to Box.

    Watch now to learn about how our content migration services can help you move to Box.

    - Justify the investment – and return on investment – of content management in the cloud
    - Learn how Box can help you do the heavy lifting with customizable migration service offerings
    - Hear how Toyota moved hundreds of millions of files to Box and got up and running in a week

    It's your move. Register now for the webinar to learn how Box can help you accelerate your shift to the cloud.
  • Highlights of HPE Data Protector: Current and outlook to next release version
    Highlights of HPE Data Protector: Current and outlook to next release version Uli Wallscheid, Technical Consultant, HPE Information Management, specialist for HPE Data Protector Recorded: Mar 24 2017 62 mins
    Is your infrastructure evolving so fast that your existing backup environment can’t cope? Join presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, to learn what HPE has to offer with Data Protector, including features and benefits you never knew were available.

    You’ll also get a sneak preview of the next release version and will learn how it addresses the challenges of complexity, cost, and recoverability of today’s information-driven enterprises, with features such as:
    • Added platforms and integrations
    • New Virtualization features
    • Security updates
    • Storage integrations
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience
    How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 37 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud
    Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Proving the Business Value of Network Transformation
    Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore
    Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors
    Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Recorded: Mar 23 2017 53 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • 5 things you didn’t know you could do with a security policy management solution
    5 things you didn’t know you could do with a security policy management solution Edy Almer, VP Product Management at AlgoSec Recorded: Mar 23 2017 37 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    In this technical webinar Edy will focus on:

    •Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    •Mapping security vulnerabilities to their applications to assess and prioritize risk
    •Enable SOC engineers to tie cyber-attacks to business processes
    •Migrating Firewall policies between firewall brands
    •Performing a fully automated, zero-touch security policy change
  • #Vault7 Happened. There’s No Going Back. Now What?
    #Vault7 Happened. There’s No Going Back. Now What? Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm Recorded: Mar 22 2017 60 mins
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • Quantifying DevOps Outcomes - Increasing Speed
    Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Recorded: Mar 22 2017 31 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • WikiLeaks Vault 7:  Facts, Fiction & Implications
    WikiLeaks Vault 7: Facts, Fiction & Implications Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP) Recorded: Mar 22 2017 61 mins
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Vince Tocce a.k.a. Vince in the Bay

    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • Detect and Block Apache Struts Bug Across Your Enterprise
    Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout
    Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Shashi Kiran, Chief Marketing Officer at Quali. Recorded: Mar 22 2017 58 mins
    What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
    Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
    Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
  • Object Storage for Digital Evidence & Security
    Object Storage for Digital Evidence & Security Ryan Meek, Product Manager Recorded: Mar 22 2017 46 mins
    Caringo Product Manager Ryan Meek explains how object storage can be used for storing digital evidence and the benefits of using it as a secure, compliant repository for use in law enforcement, government, and health IT use cases.
  • Migrating application connectivity to the cloud
    Migrating application connectivity to the cloud Edy Almer, VP Product AlgoSec Recorded: Mar 22 2017 31 mins
    Migrating applications to the cloud or another data center– without creating security holes or causing application outages– is far easier said than done.

    For starters, mapping existing application flows across complex enterprise environments pre-migration – which is critical in order to re-establish the correct traffic flows post-migration – is extremely difficult. A single mistake can cause outages, compliance violations and create holes in your security perimeter. Moreover, cloud security architecture is fundamentally different from physical networks, making it extremely difficult to translate application connectivity flows to the cloud security controls, and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating applications is a complex, tedious and error-prone process that takes months and often compromises security, compliance and business agility.

    Presented by Edy Almer, AlgoSec’s VP of Product, this new webinar will explain how to simplify and accelerate large-scale complex application migration projects, while ensuring security and avoiding business application outages.

    The webinar will cover best practices on how to:

    - Automatically discover existing application connectivity flows
    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud Security Groups
    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows
    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • OPNFV Overview: Navigating Its Many Projects
    OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • 3 Proven Workflows for A Successful Windows 10 Migration
    3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • What WikiLeaks Vault 7 Means for You and Your Organization
    What WikiLeaks Vault 7 Means for You and Your Organization Chenxi Wang, Jason Haddix, and Gaurav Banga Recorded: Mar 17 2017 61 mins
    WikiLeaks published thousands of CIA-related documents in March detailing the agency's cyber-espionage programs. WikiLeaks is calling the archive "Vault 7". Discover the facts behind the leaks and how they may affect you. Some of the industry's top cybersecurity experts will discuss what the Vault 7 leaks mean for organizations and industries, from a security and privacy perspective.

    Chenxi Wang, Founder, the Jane Bond Project
    Jason Haddix, Head of Security at Bugcrowd
    Gaurav Banga, Founder & CEO of a stealth mode cybersecurity startup