Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Dell EMC Data Domain:  What's New for 2018
    Dell EMC Data Domain: What's New for 2018 Anand Rudrabhatla Recorded: Jul 20 2018 36 mins
    Discover the latest from Dell EMC Data Domain, the industry’s #1 protection storage. Hear what's new, expansions to the ecosystem, and the introduction of the DD3300 for small, midsized & ROBO environments. Plus, hear how Data Domain Virtual Edition saved the day for a customer when Hurricane Irma blew into town. Keep your mission critical data safe with Data Domain.
  • Service Excellence and Analytics Driving Digital Transformation
    Service Excellence and Analytics Driving Digital Transformation Brenda Lichtenberg, SVP Strategy & Portfolio & Jack Mansfield VP Digital Workplace Services Recorded: Jul 19 2018 46 mins
    This session will open with a discussion on the current market trends in analytics to showcase where companies are investing. We will then cover how to get started on the road of analytics and showcase some transformative effects of analytics to IT operations.

    Key Takeaways:
    1.Discovery – Find all of the data sources that you have.
    2.Insights – Take a multi-variable approach to analytics
    3.Actions & Outcomes – Identify 1 initiative at a minimum to get started with analytics
    4.The Big Picture – How BI and analytics fit into digital transformation
  • Impersonation: The Many Masks of Email Threats
    Impersonation: The Many Masks of Email Threats Ken Bagnall, Vice President, Email Security, FireEye Recorded: Jul 19 2018 50 mins
    You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.

    Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:

    • What psychological authentication involves
    • How attackers prey on recipients’ imagination and emotions
    • How impersonation attacks are evolving
    • What is in the future for impersonation
    • How threat intelligence and the speed of email security impact cyber risk
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud Danielle Russell, Group Product Marketing Manager & Brian Bledsoe, Sr. Technical Manager, Sales Enablement for NA, AlienVault Recorded: Jul 19 2018 61 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management

    Hosted By
    Danielle Russell
    Group Product Marketing Manager
    Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.

    Brian Bledsoe
    Sr. Technical Manager, Sales Enablement for North America
    Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
  • Assessing the impact of data science on the analytics landscape
    Assessing the impact of data science on the analytics landscape Matt Aslett, Research Director Recorded: Jul 19 2018 57 mins
    The evolution of data science – including machine learning, deep learning, and other forms of artificial intelligence – has had a significant impact on the data analytics landscape in recent years, and looks set to drive considerable change in the market in the coming years.

    In response, 451 Research’s new Data Management and Analytics Market Map 2018 includes a complete re-categorization of our Analytics Market Map to reflect the realities of analytics users and use cases today, dividing the analytics market into four key sectors:
    •Analytics tools
    •Analytics platforms
    •Data science tools
    •Data science platforms

    During this webinar, 451 Research’s Research Director, Data Platforms and Analytics, Matt Aslett, will explain the rationale and definitions behind the new categorization, as well as identifying the key challenges and innovations that will shape the analytics and data science market, and also revenue and growth expectations.

    The webinar will also touch on other aspects of note delivered with the Data Management and Analytics Market Map 2018, including:
    •The ongoing evolution of Corporate Performance Management
    •The addition of Data science Management to the Data Management Market Map
  • Solving the Jevons Paradox of Performance with Lenovo and Intel Optane
    Solving the Jevons Paradox of Performance with Lenovo and Intel Optane Tony Harvey, Sr. Product Mgr, Lenovo; Vivek Sarathy, Enterprise Architect, Intel; Ori Broit, Sr. Product Mktg Mgr, VMware Recorded: Jul 19 2018 51 mins
    Jevons paradox states that when a resource is used more efficiently, the consumption of that resource actually rises due to the lower prices and/or increased availability of the product. Nowhere in the data center is that more true than when you look at server performance. Storage has always been a bottleneck in compute systems because of the vast performance difference between the storage subsystem and CPU and memory. Together Lenovo, Intel and VMware address the bottleneck of storage performance in Hyperconverged systems with the introduction of Intel Optane technology to Lenovo vSAN ReadyNodes. Join us to hear how these new ReadyNodes from Lenovo will help you to increase the performance of your applications, increase VM density and still improve end-user response times.
  • 5 Ways Machine Learning with PowerMax enhances your PowerPath experience
    5 Ways Machine Learning with PowerMax enhances your PowerPath experience Robert Lonadier, PowerPath Product Manager Recorded: Jul 19 2018 34 mins
    In this webinar, which includes a demo, you will learn how to discover unused storage capacity, identify your server and storage array response times, generate an “attached hosts” list with detailed host data for easier troubleshooting, learn how to provision a new host using only a “host name” and improve Oracle’s performance with PowerMax I/O tagging Machine Learning.
  • HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper
    HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper Paul Speciale, CPO, Scality; Stephen Bacon, Director Scale-Out Storage, HPE; Special Guest: Amita Potnis, IDC Recorded: Jul 19 2018 48 mins
    Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
  • What’s New in Data Protection Suite: Introducing Data Protector 10.04
    What’s New in Data Protection Suite: Introducing Data Protector 10.04 Julita Kussmaul, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Recorded: Jul 19 2018 62 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector 10.04 brings improvements in the Scheduler and adds other enhancements to the user experience. It also introduces new platform integrations and virtualization improvements.

    Data Protector 10.04 offers our first integration with Micro Focus Operations Orchestration which allows automation of backup operations using workflows.

    See a live demo of the new features.
  • Implementing next-gen PON technologies over existing fiber infrastructure
    Implementing next-gen PON technologies over existing fiber infrastructure Steven Van Den Bergh, Nokia and Guillaume Lavallee, EXFO Recorded: Jul 19 2018 76 mins
    This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Recorded: Jul 19 2018 38 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • AIRflow at Scale
    AIRflow at Scale Qubole Data Engineers Recorded: Jul 18 2018 44 mins
    This webinar covers how Qubole extended Apache AIRflow to manage the operational inefficiencies that arise managing data pipelines in a multi-tenant environment. Qubole also shares how to make data pipelines robust by adding data quality checks using CheckOperators.

    Key Takeaways:

    - Overview of major types of data pipelines
    - How Qubole manages deployments and upgrades of data pipelines in a multi-tenant environment
    - The Data quality issues that arise during data ingestion or transformation.
    - The approach that Qubole has adopted using Apache Airflow Check operators
    - The best practices in using Apache Airflow for data quality checks.
  • The New Frontier Of Hybrid IT
    The New Frontier Of Hybrid IT Scott Mathewson, Data Center Practice Lead, North America, Softchoice Recorded: Jul 18 2018 52 mins
    The journey to the cloud had just had a major breakthrough.
     
    With VMware software now available on the global AWS Cloud, there is now a single, consistent, pervasive connectivity and a secure platform for apps and data. Whether that is in the Datacenter or in the AWS Cloud. This gives you the power to move existing applications seamlessly to the cloud and back as needed.
     
    You’ll understand how you can quickly get workloads on the cloud without having to re-engineer your applications. Keep applying the skills you've developed on the VMware platform, backed by the large array of services in the AWS platform. This allows you to be agile, reduce capital costs and increase availability for innovations.
     
    In this webinar, we will show you: 
    - How, as a VMware customer, you can go into the cloud without retraining, reconfiguring your apps, refactoring and more
    - What it will mean to have immediate access to the AWS platform and services and how it'll accelerate innovation
    - Immediate value Business Cases related to increased agility, disaster recovery, and stretch networking for high availability.
     
    Presenter Info:
     
    Scott Mathewson, Data Center Practice Lead, North America, Softchoice
    As Practice Lead for Softchoice North America, Scott has over 25 years of Datacenter experience with EMC, VMWare and Cisco, he is responsible for defining Softchoice assessments and services offerings for VM ware and SDN. Scott works with customers to develop solid solutions as it relates to SDS, SDN, Cloud, management and automation solutions.
  • Application Performance Management (APM) for Big Data Apps and Infrastructure
    Application Performance Management (APM) for Big Data Apps and Infrastructure Kirk Lewis, Pepperdata Field Engineer Recorded: Jul 18 2018 37 mins
    Pepperdata Application Spotlight analyzes all Hadoop and Spark jobs running on the cluster and provides developers with technical insights on how each job performed. Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar demonstrates how Application Spotlight helps developers quickly improve application performance, reduce resource usage, and understand application failures.

    Learn how developers can:

    – Maximize performance, improve productivity, guarantee reliability, and improve ROI
    – Generate application-specific recommendations to improve application performance
    – Highlight applications that need attention
    – Automatically identify bottlenecks, and alert on duration, failure conditions, and resource usage
    – Search for any applications running on the cluster, compare current and previous runs
    – Visualize Spark applications and its stages for easy root cause failure analysis and performance tuning

    Presenter Bio: Field Engineer, Kirk Lewis

    Kirk Lewis joined the Pepperdata team in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
  • Separating Query from Storage in BI and Analytics:  The Presto Story
    Separating Query from Storage in BI and Analytics: The Presto Story Matt Aslett of 451 Research & Justin Borgman of Starburst Recorded: Jul 18 2018 47 mins
    As enterprises continue the steady migration towards the cloud, a new data architecture is gaining popularity that takes advantage of the natural separation of compute and storage the cloud provides. By separating the query engine from the data layer, companies are able to elastically scale each independently and optimize for the lowest cost and highest performance.

    The open source Presto project was purpose-built for this and is being used by leading companies like Facebook, Airbnb, Uber, Netflix, and LinkedIn to empower analysts and data scientists to run SQL queries on data no matter where it resides, whether that's Hadoop, S3, or a traditional RDBMS.

    Join this webcast to learn why companies are changing the very definition of what a "database" is and using Presto to query anything, anywhere.

    BI and Big Data veterans Matt Aslett, Research Director at 451 Research and Justin Borgman, CEO at Starburst will deliver this session covering current industry trends, real use case scenarios and answering questions from the audience.

    In this webinar you will learn:

    - The pros and cons of separating query from storage
    - An overview of the open source Presto project
    - How to apply the principles of this cloud architecture in both public and private clouds
  • How to run best-in-class IT Operations in a world of Machine Learning
    How to run best-in-class IT Operations in a world of Machine Learning Andi Mann, Chief Technology Advocate, Splunk and David Hodgson, Chief Product Officer, Syncsort Recorded: Jul 18 2018 59 mins
    IT leaders looking to move beyond reactive and ad hoc troubleshooting need to find the intersection of maintaining existing systems while still driving innovation - solving for the present while preparing for the future. Identifying ways to bring existing infrastructure and legacy systems into the modern world can create the business advantage you need.

    Splunk’s Chief Technology Advocate, Andi Mann and Syncsort’s Chief Product Officer, David Hodgson discuss the digital transformation taking place in IT and how machine learning and AI are helping IT leaders create a more business-centric view of their world
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Simplify Hybrid Cloud VDI with Nutanix Enterprise Cloud Platform & Citrix Cloud
    Simplify Hybrid Cloud VDI with Nutanix Enterprise Cloud Platform & Citrix Cloud Paul Murray,Sr.Systems Engineer/Nutanix & James Hsu, Senior Technology Architec/Citrix Recorded: Jul 18 2018 60 mins
    It’s Time to Embrace Hybrid Cloud VDI with Nutanix InstantON for Citrix Cloud

    Nutanix and Citrix have partnered to create a tightly integrated hybrid cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.

    In this webinar, you will learn how Nutanix and Citrix allow you to:
    · Take advantage of enterprise-class VDI benefits without any complexity
    · Simplify desktop management and operations while increasing security and compliance
    · Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
    · Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
  • AI Ready Infrastructure For Deep Learning Deployment at Scale
    AI Ready Infrastructure For Deep Learning Deployment at Scale Michael Lang Senior Solutions Architect, NVIDIA ANZ and Michael Boots, Head of FlashBlade Sales ANZ, Pure Storage ANZ Recorded: Jul 18 2018 52 mins
    The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.

    In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
  • The Future of Backup Isn't Bakup
    The Future of Backup Isn't Bakup Steve Blow Recorded: Jul 17 2018 34 mins
    Old school backup is out! Zerto is changing the way companies do traditional backup with Continuous Data Protection. Learn more!
  • Modernizing Healthcare IT with Software-Defined Storage
    Modernizing Healthcare IT with Software-Defined Storage Scott Lowe, CEO at ActualTech Media & Dave Brown, Sr. Solutions Architect at DataCore Software Recorded: Jul 17 2018 25 mins
    Join us in this presentation as we discuss how today’s leading healthcare organizations are using software-defined storage to tackle the top challenges in Healthcare IT by delivering uninterrupted data access, massive architectural scale-out, and game-changing application performance.
  • Tech Tuesday: Object Storage for High-Performance Computing
    Tech Tuesday: Object Storage for High-Performance Computing John Bell, Senior Consultant & Pat Ray, Integration Engineering Lead Recorded: Jul 17 2018 43 mins
    When it comes to High-Performance Computing (HPC), the volume of data that comprises data sets can easily over-burden primary storage. When that happens, performance and speed are compromised and research and business objectives are at risk. As data sets continue to grow, more and more HPC organizations are turning to object storage technology to build active archives. Learn how adding cost-effective object storage into your storage infrastructure can reduce storage TCO, provide continuous data protection, and give you the power of metadata so you can quickly retrieve data when you need it.
  • Accudata's White-Hat Files | July 2018 Edition
    Accudata's White-Hat Files | July 2018 Edition Anton Abaya, CISA, PCI QSA, Senior Consultant Recorded: Jul 17 2018 16 mins
    Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

    In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.

    Register for the August edition of the White-Hat Files here: https://www.brighttalk.com/webcast/16347/330367
  • Why Architecture Matters: Dell EMC Cloud For Microsoft AzureStack
    Why Architecture Matters: Dell EMC Cloud For Microsoft AzureStack Gregory Colburn and Preetham Mukhatira Recorded: Jul 17 2018 54 mins
    In this webinar we will discuss the architectural design considerations that went into the development of VxRack AS, which provides an unparalleled platform for Azure Stack deployment and sustainability.
  • AI and the new Cyber Battlefield
    AI and the new Cyber Battlefield Simon Bryden, Consulting Systems Engineer, Fortinet Recorded: Jul 17 2018 48 mins
    As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.

    Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.

    This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
  • TEMP.Periscope Surfaces in Cambodia: A Chinese espionage operation
    TEMP.Periscope Surfaces in Cambodia: A Chinese espionage operation Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst Jul 24 2018 4:00 am UTC 60 mins
    Earlier this month, FireEye revealed an extensive cyber espionage carried out by China-linked TEMP.Periscope which targeted Cambodia’s political system. The effort—which was covered by Bloomberg, Time, Associated Press and others—compromised multiple ministries, diplomats and opposition members. It was carried out by China’s second most active cyber espionage groups, which has previously targeted US-, Europe- and Asia-based organizations.

    Join Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst for the webinar to learn more about TEMP.Periscope’s mission, and its attacker tactics, techniques and procedures.
  • Repenser la sécurité
    Repenser la sécurité Yann Samama, Consutlant Solutions de Sécurité Jul 24 2018 8:30 am UTC 45 mins
    Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.

    Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :

    * Augmenter la disponibilité du réseau tout en simplifiant la  connectivité des outils grâce à une solution de module bypass
    * Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés  tout en réduisant la complexité de leur exploitation
    * Diminuer les coûts OPEX et CAPEX via un  ROI très court-termisme

    Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
  • [US/UK] Network security at the speed of DevOps
    [US/UK] Network security at the speed of DevOps Anner Kushnir, VP Technology Jul 24 2018 3:00 pm UTC 60 mins
    DevOps methodologies have become extremely popular to enable agile application development and delivery.
    Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.

    In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.

    Attend this webinar to learn how to:
    •Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
    •Avoid external out-of-band network connectivity problems that require separate and manual handling
    •Ensure continuous compliance and auditability throughout the application delivery process
    •Get clearly documented application connectivity requirements which help prevent disruptions to the business
    •Bridge the gap between application developers and network security throughout the entire application lifecycle
  • The Evolving Market for Primary Storage
    The Evolving Market for Primary Storage Eric Burgener, IDC and Caitlin Gordon,Dell EMC Jul 24 2018 4:00 pm UTC 60 mins
    One of the defining characteristics of the IT and Digital Transformations is the tremendous drive to put that data to work. The need for insights from data is reshaping IT, from the data center to the cloud. At the heart of the matter, so to speak: how that data is stored, accessed and managed. Tune in to this webcast to hear the latest from IDC’s Eric Burgener and Dell EMC’s Caitlin Gordon. You’ll get insights on the storage market; how storage is transforming, and a dive into Dell EMC’s PowerMax technology powered by Intel® Xeon® processors.
  • 10 Questions on ServiceNow with Acorio Experts
    10 Questions on ServiceNow with Acorio Experts Ajay Gautam, Damian Broccoli, Jared Romaine, Juliet Acuff, Meghan Lockwood, Ryan Dinwiddie, Sean Duhaime Jul 24 2018 5:00 pm UTC 60 mins
    This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
  • Your Secure Hybrid Cloud Simplified. Too good to be true?
    Your Secure Hybrid Cloud Simplified. Too good to be true? Henry Baltazar of 451 Research & Clint Wyckoff of Datrium Jul 24 2018 5:00 pm UTC 60 mins
    Gone are the days that IT was focused on configuring, managing or troubleshooting infrastructure. The lines between "Clouds" are continuing to become blurred more and more. IT now demands simplicity; the business demands that all applications run fast and perform reliably. In this session, our experts will discuss the evolution of the datacenter focuses on a few core tenants: Simple. Scalable. Reliable. Secure.
  • Do You Really Know Your IT Life Cycle?
    Do You Really Know Your IT Life Cycle? Patrick Morris, Director Products & Services - Asia-Pacific; Peter McCarthy, Director Global Solutions Design Team Jul 25 2018 1:00 pm UTC 45 mins
    IT deployment has evolved rapidly over the years, driven by its growing influence as it shifts from being a competitive differentiator to a core strategic asset. In a world where digital transformation and digital disruptors are redefining the status quo across large swaths of industry verticals, IT upgrades are now closely watched by the C-Suite.

    Despite this, many organizations continue to cling to a rigid 3~5 year refresh cycle across their estate, primarily driven by an OEM’s EoL timetable.

    In this 45-minute webinar, Curvature subject matter experts will discuss:
    •Common myths associated with aging HW and access to SW updates
    •When is third party maintenance a good fit? (hint: much earlier than EoL)
    •How to apply a “Fit for Purpose” life cycle to challenge the OEM’s EoL Life cycle



    As the global leader in independent IT support, products and services, Curvature is transforming how companies manage, maintain and upgrade equipment and support for multi-vendor, multinational networks and data centers. At a time of competing IT priorities and digital transformations, companies need to be nimble, efficient and smart in how they invest in IT and business innovation. A strategic partner with more than 15,000 organizations globally, Curvature specializes in delivering 24x7 global technical support, advanced hardware replacement, and complete lifecycle management of networking and data center equipment under one global contract from locations in the Americas, Europe and Asia. For more information, visit us at www.curvature.com
  • Virtualized & Accelerated Cloud Infrastructure for Big Data workloads
    Virtualized & Accelerated Cloud Infrastructure for Big Data workloads Taufik Ma, CEO, Co-founder Attala Systems; & Colin Cunningham, Data Scientist, Intel Jul 25 2018 3:00 pm UTC 60 mins
    Whether for private clouds, public clouds or a multi-user environment, IT operators require an infrastructure solution that can instantly spin-up data-intensive workloads and that can scale to support multiple big data workloads or tenants. Attala Systems and Intel have partnered to create a solution that delivers composable storage with local NVMe performance for big data workloads like Apache Hadoop and Spark. The performance available to direct-attached PCIe flash is welcome, but cloud total cost of ownership (TCO) is better when storage is shared to many hosts while offering the elasticity to meet dynamic tenant demands. The maturing of the NVMe over Fabrics (NVMe-oF) specification enables local NVMe performance over a network. With remote direct memory access (RDMA), NVMe actions and data can be transported over a fabric such as Ethernet. This brief illustrates how a complex big data analytics workload is well served by Attala Composable Storage with Intel® 3D NAND SSDs. This workload—which once struggled to scale to support concurrent customers when serviced by an iSCSI appliance or enterprise storage area network (SAN), is shown to match local NVMe performance and scale independently for two customers with no degradation in application runtime when using the NVMe-oF target.
  • Data Center Operational Excellence: Staffing & Training
    Data Center Operational Excellence: Staffing & Training Matt Stansberry, Vice President - North America, Uptime Institute Jul 25 2018 4:00 pm UTC 60 mins
    How do you ensure your staffing plan meets your business's performance and risk requirements? Do you have an appropriate training program to drive a culture of continuous improvement? How can you evaluate and enhance your training program to ensure continuity of expertise, and retain key employees?
  • Luma Health: Leveraging Product Analytics for Innovation in Healthcare
    Luma Health: Leveraging Product Analytics for Innovation in Healthcare Aditya Bansod and Humair Burney from Luma Health and Scott Castle from Periscope Data Jul 25 2018 5:00 pm UTC 45 mins
    Product managers often have challenges getting all necessary quantifiable metrics to make informed product decisions. How do you know if you are looking at the right information (and is it all of the information you need)? And now what do you do with this data to ensure that the users experience is the best possible?

    Join our webinar with Luma Health, an innovator in the Patient Experience space, to learn how they’ve gained full visibility into their user journey and how each product contributes to the company’s overall revenue metrics, ensuring they are fulfilling their customer’s expectations (and innovating new ways to support them).

    In this webinar, you will learn:
    - When it is time to turn to advanced analytics
    - Tying together disparate product data sources
    - How product metrics can help serve different customer needs
    - Lessons learned along the way
  • Sicherheit neu überdenken
    Sicherheit neu überdenken Daniela Fusaro, Senior Solutions Architect Jul 26 2018 8:00 am UTC 45 mins
    Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.

    Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.

    Die Teilnehmer lernen, wie man:
    * Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
    * Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
    * Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert

    Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
  • The Attacker’s Invoice: Real Costs of a Cyber Breach
    The Attacker’s Invoice: Real Costs of a Cyber Breach Jon Horner, FireEye, Katherine Keefe, Beazley Group & Eric Packel, BakerHostetler Jul 26 2018 3:00 pm UTC 60 mins
    Cyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Attacks not only places a financial strain on organizations, but can also hinder their ability to conduct normal business operations, which affects sales transactions and market reputations.

    Join Jon Horner, Senior Consultant, Mandiant, a FireEye company with featured speakers, Katherine Keefe, Head of Beazley Breach Response Services, Beazley Group and Eric Packel, Partner, BakerHostetler, as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item. After this session, you’ll be able to educate your leaders on:

    • Common costs of a breach, which involve number of records affected, remediation efforts, revenue loss and reputational backlash
    • Processes to estimate each type of cost
    • Risk mitigation activities to help reduce future costs
  • Industrial IoT: What is Missing and What is Next?
    Industrial IoT: What is Missing and What is Next? Ian Hughes, Senior Analyst IoT, and Emily Wentworth, Research Associate Jul 26 2018 3:00 pm UTC 60 mins
    451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.

    During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.

    The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
  • How to Outsource your Security Monitoring 101
    How to Outsource your Security Monitoring 101 Mike LaPeters, VP of Global Channels, AlienVault Jul 26 2018 4:00 pm UTC 45 mins
    Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.

    With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.

    Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:

    Topics Include:

    - Why Managed Security
    - Types of Managed Security Services
    - Benefits of Outsourcing Security
    - How to Select the right MSSP

    Hosted By
    Mike LaPeters
    VP of Global Channels
    Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
  • VMAX and Oracle: Blazing performance and data reduction efficiencies
    VMAX and Oracle: Blazing performance and data reduction efficiencies Yaron Dar Jul 26 2018 4:00 pm UTC 60 mins
    This webinar will focus on achieving peak performance for Oracle workloads with VMAX. You will learn about the latest data reduction capabilities and best practices for BC/DR/HA.
  • Moving Big Data To The Cloud? Here’s Why You Need A Cloud-Native Data Platform
    Moving Big Data To The Cloud? Here’s Why You Need A Cloud-Native Data Platform Matheen Raza and Kevin Blaisdell from Qubole Jul 26 2018 5:00 pm UTC 60 mins
    Cloud service models have become the new norm for enterprise deployments in almost every category — and big data is no exception. As the volume, variety, and velocity of data increase exponentially, the cloud offers a more efficient and cost-effective option for managing the unpredictable and bursty workloads associated with big data compared to traditional on-premises data centers.

    Organizations looking to scale their big data projects and implement a data-driven business culture can do so with greater ease on the cloud. However, adopting a cloud deployment model requires a cloud-first re-architecture and a platform approach rather than a simple lift and shift of data applications and pipelines.

    A cloud-native data platform like Qubole helps organizations save on average 50 percent in total cost of ownership. Intelligent automation of cluster management tasks allows data teams to focus on business outcomes, thereby greatly improving SLAs and the end-user experience.

    ​Join experts from Qubole as they discuss how to activate your big data and get the most out of open source technologies on the cloud. In this webinar, you'll learn:

    - How big data projects benefit from a cloud-native data platform
    - How intelligent cluster management can help you save in total cost of ownership
    - About companies that successfully transitioned their big data to the cloud
    - How to evaluate cloud data platforms for your big data needs
  • Unleash the Power of NVMe Fabrics
    Unleash the Power of NVMe Fabrics Rick Walsworth, Venky Nagapudi Jul 26 2018 5:00 pm UTC 60 mins
    This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
    -How to migrate services from standard SCSI based to NVMe-oF based
    solutions using FC
    -Detailed architectural analysis and benefits achieved by deploying NVMe-
    oF via GbE.
    -Tradeoffs and decision to utilize mixed mode FC and GbE deployments.

    In addition to the presentation, there will be a brief demo of the Vexata
    NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
  • Microsegmentation Made Easy
    Microsegmentation Made Easy Jason Burns,Technical Marketing; Abhisheck Tiwari, Product Management; Ravi Samprathi, Engineering, Nutanix Jul 26 2018 5:00 pm UTC 45 mins
    As security threats become more sophisticated, infrastructure design and policy need to be able to respond.

    Learn the common use cases for securing applications and users via VM microsegmentation. Nutanix engineers will walk through design considerations for creating microsegmentation policy, and demonstrate how Nutanix Flow provides the application visibility and policy controls to quickly and easily deploy microsegmentation in your environment.
  • Beyond the GUI: Leveraging Nutanix APIs
    Beyond the GUI: Leveraging Nutanix APIs Tarek Parekh, Zankhana Pathak & Mukesh Baphna, Nutanix; David Hess, Principal Infrastructure Architect Cyxtera Jul 26 2018 5:00 pm UTC 45 mins
    Automation is turning manual or repetitive IT tasks into a thing of the past—including in the data center. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you’ll explore Nutanix APIs—from provisioning to other Day 0, Day 1 operations.

    Join this webinar to learn how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, and even backup/DR. We’ll review available APIs and conduct live demonstrations of integrations and the automating common IT tasks.

    Tarek Parekh - Principal Product Manager, Nutanix
    Zankhana Pathak - Member of Technical Staff, Nutanix
    Mukesh Baphna - Director, Engineering, Nutanix
    David Hess, Principal Infrastructure Architect Cyxtera
  • Making Cybersecurity Matter to Business -  A conversation with Pete Herzog
    Making Cybersecurity Matter to Business - A conversation with Pete Herzog Pete Herzog, Managing Director at ISECOM Jul 26 2018 5:00 pm UTC 75 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing.

    Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • Enterprise Cloud 101: Introduction to Nutanix Enterprise Cloud OS
    Enterprise Cloud 101: Introduction to Nutanix Enterprise Cloud OS Marjon Otero, Systems Engineer, Matt Slotten, Snr. Mgr, Consulting Services; Rachel Luke, Systems Eng. II, Laser Spine Inst. Jul 26 2018 5:00 pm UTC 45 mins
    Welcome to Enterprise Cloud 101! This session will provide an introduction to Nutanix software, architecture, and complete feature set. Nutanix experts will show how Nutanix combines HCI storage, virtualization, software defined networking and compute services into the Enterprise Cloud OS that can run on off-the-shelf x86 servers. See how the Enterprise Cloud OS goes beyond legacy datacenter architectures and prepares your business for the hybrid cloud future.
  • Introducing Beam: Cost Optimizaton in a Multi-Cloud World
    Introducing Beam: Cost Optimizaton in a Multi-Cloud World Anand Jayaraman, Sr. Manager, & Aroosh Sohi, Director, Engineering, Nutanix Jonathan Mosco, Sr. Automation Architect, Corp. Jul 26 2018 6:00 pm UTC 45 mins
    Businesses today are seeking to adopt hybrid cloud architecture and boost cloud flexibility to improve their responsiveness, and enable more rapid innovation. However, lack of public cloud consumption visibility and security concerns lead to uncontrolled spend and security vulnerabilities.

    Learn about Nutanix cloud management capabilities that enable organizations to provision and maintain applications across multi-cloud environments, optimize cloud consumption and centralize governance and security compliance. We will discuss some of the most pressing customer challenges such as public cloud cost visibility, compliance, and application vulnerability management.
  • Automation and Multi-Cloud Management with Nutanix Calm
    Automation and Multi-Cloud Management with Nutanix Calm Jasnoor Gil, Director of Product Management & Gil Haberman, Director of Product Marketing, Nutanix Jul 26 2018 6:00 pm UTC 45 mins
    Driving automation and self-service across private and public clouds is the strategic goal for many CIOs. While many of the fundamental building blocks have long been available, they have been missing a unified, full-stack, orchestration layer that works across multiple cloud environments.

    In this session, we’ll explain and demonstrate Nutanix Calm, which provides cloud operators with a one-click self-service capability to automate application provisioning and lifecycle management across multiple environments, making the entire IT infrastructure more agile and application-centric.
  • Shift Happens! Future-Proof Your Business by becoming product-centric
    Shift Happens! Future-Proof Your Business by becoming product-centric Inxeption VP of Sales David Judd, Primitive Logic Senior Director Ethan Silvers and President Kevin Moos Jul 26 2018 6:00 pm UTC 60 mins
    Join Inxeption’s David Judd and Primitive Logic’s Ethan Silvers as they discuss the important role of product digitization on B2B sales and marketing as a way to future-proof your business.

    This webinar will cover the critical shift in business to become a product-centric organization:

    Bring together all your product data to develop a product-centric strategy

    Create a process to build speed, efficiency, and flexibility into your marketing campaigns

    Attain greater scalability to easily make changes and add more products and new sale channels

    Optimize the performance of your products across all sales channels

    Learn how blockchain can allow you to quickly react to market changes by connecting your digital asset and marketing systems to your product delivery supply chain.
  • Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery
    Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery David Hines, TierPoint - Vice President of Architecture and Engineering Jul 26 2018 6:00 pm UTC 60 mins
    Multitenancy in cloud is nothing new. Providers and organizations have long leveraged this model to manage costs and complexity as well as enable access to the latest releases and technology. Within a multitenant environment, resources are shared with all the other users of the cloud which leads to concerns about control and confidentiality of data and workloads. In a recent study, over two thirds of IT professionals say security is their most significant concern in adopting an enterprise cloud computing strategy.

    In this live webinar, TierPoint Vice President of Architecture and Engineering, David Hines will address some key considerations for tackling security concerns in a multitenant environment including:
    • Ensuring each layer of the environment is designed with strong isolation properties
    • Leveraging encryption to create logical isolation from other tenants and data protection
    • Understanding how the environment is protected from outages or high-volume usage

    Register Today!