The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.
Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.
Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
UK Public sector organisations have IT requirements that are evolving. Techniques such as containerisation, continuous integration and infrastructure-as-code have significantly increased the pace and agility of modern development teams.
Correct deployment of these techniques can enable deployment of new features many times a day, so that business value is achieved in the shortest time possible.
As a result, UKCloud recognise that there is a need for a fully optimised Platform as a Service offering which enables Developers to push applications straight to the cloud all without having to concern themselves with the management, support and configuration of underlying infrastructure
Priya Shivakumar, Director of Product, Confluent + Ryan Lippert, Product Marketing, Google CloudRecorded: Feb 14 201957 mins
Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.
In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka® service, to migrate to Google Cloud Platform. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.
Register now to learn:
-How to take the first step in migrating to GCP
-How to reliably sync your on premises applications using a persistent bridge to cloud
-How Confluent Cloud can make this daunting task simple, reliable and performant
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at DateraRecorded: Feb 14 201956 mins
Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.
Datera is the only true, software-driven data services platform that:
•Powers modern application environments at global scale
•Provides game-changing data orchestration and automation with enterprise-class performance
•Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
•Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
Sam Fawaz, Cloud Solutions Architect; Amit Rawlani, Dir. of Tech Alliance, Cloudian; William Bell, EVP of Product, PhoenixNAPRecorded: Feb 14 201941 mins
Storage admins today manage ever-increasing data volumes in a 24x7, zero-downtime environment. Protecting these critical assets – while maintaining service levels, compliance, and security across all locations – has never been more costly and complex. Excessive backup times and unmet RPO/RTO SLAs potentially lead to data loss and downtime.
Join us for a live webcast to learn how PhoenixNAP streamlined their backup and storage services with Veeam and Cloudian to provide:
• Flexible data protection options for all of your workloads – including for VMware and Hyper-V
• Improved operational efficiencies, including RPO/RTO service levels
• Optimized data storage for scale and performance
• Simple and unified control and visibility of data
• Protection from ransomware
Live Webcast: Thursday, February 14th at 10am PST / 1pm EST / 6pm GMT
Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales EngineerRecorded: Feb 14 201956 mins
Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.
Join this webcast to learn:
- How fileless attacks work and how they evade detection by most traditional antivirus software
- The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
- Why HIDS is an essential security control for threat detection and compliance
- How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response
Group Product Marketing Manager
Sr. Sales Engineer
Elodie Huang, IoT Embedded Solution Manager, Supermicro & Magnus Almquist, VP Business Development, ZEDEDARecorded: Feb 14 201945 mins
Supermicro and ZEDEDA solutions deliver cloud-managed devices with password-less installation to reduce the costs of deploying and managing geographically widespread edge devices. Join this webinar to learn about:
• New Supermicro Cloud-Managed Gateway solutions designed to enable business' to drop-ship and instantly provision Supermicro devices at thousands of locations.
• One-click mass updates, real-time visibility of every device and disaster recovery at every location, all centrally controlled from the cloud
• Securely adding new services to edge gateways and how they can be as easy to deploy and update as adding an app to your smartphone.
Dave Hiechel, Eagle Technologies and Greg Bennett, CommvaultRecorded: Feb 14 201930 mins
Backup and recovery has become increasingly complex due to the continued exponential growth of data and the need to protect it across physical, virtual, endpoint, and cloud environments. In response, IT has implemented solutions to address each of these use cases. But what started out as a noble effort to protect data with ‘optimized’ solutions has morphed into a convoluted mess of point products, each with its own interface, capabilities, and hardware and software infrastructure. These data silos increase complexity and make recovery challenging. Bottom line, this is unsustainable.
You need a complete solution that can address each of these uses cases without increasing complexity in your environment. In this webinar, you’ll learn how Commvault Complete Backup & Recovery:
- significantly reduces your management complexity
- improves operational efficiency
- lowers costs vs. managing multiple point products so you can focus your valuable IT resources on more strategic initiatives
Dr. Anya Rumyantseva, Data Scientist, Solution EngineeringRecorded: Feb 13 201939 mins
The transition from descriptive to predictive & prescriptive analytics is speeding up across digitally native industries, while more traditional industries are lagging behind. This transition often requires usage of machine learning techniques and a variety of data formats. Many companies find it difficult to complete. In this webinar, we review barriers for implementation, best practices, interesting use cases and success stories coming from steel and oil industries. Also, we will show how IoT data can be used to predict health problems of cows at farms. Moooving to cutting-edge analytics is possible for everyone!
Jim Meehan, Director of Product MarketingRecorded: Feb 13 201934 mins
With physical network infrastructure moving to the cloud, it’s easy to think that networks are instantly faster, more reliable, limitless, and cheap. However, the reality is that cloud technology can be complex, especially when it comes to networking. Combined with the rapid pace of deployment and lack of visibility into how cloud resources are being utilized, it’s easy to make costly mistakes.
Please Join Jim Meehan, Kentik Product Marketing Director, to discuss five network-related cloud deployment mistakes that you might not be aware of, but can negate the cloud benefits that you’re hoping to achieve.
Mistake #1 - Duplicate services and unknown dependencies
Mistake #2 - Traffic or request hair-pinning
Mistake #3 - Unnecessary inter-region traffic
Mistake #4 - Missing compression
Mistake #5 - Internet traffic delivery
In this webinar, we will also advise how to avoid these top cloud deployment mistakes with pervasive visibility.
Philip Kufeldt, Univ. of California, Santa Cruz; Mike Jochimsen, Kaminario; Alex McDonald, NetAppRecorded: Feb 13 201960 mins
Cloud data centers are by definition very dynamic. The need for infrastructure availability in the right place at the right time for the right use case is not as predictable, nor as static, as it has been in traditional data centers. These cloud data centers need to rapidly construct virtual pools of compute, network and storage based on the needs of particular customers or applications, then have those resources dynamically and automatically flex as needs change. To accomplish this, many in the industry espouse composable infrastructure capabilities, which rely on heterogeneous resources with specific capabilities which can be discovered, managed, and automatically provisioned and re-provisioned through data center orchestration tools. The primary benefit of composable infrastructure results in a smaller grained sets of resources that are independently scalable and can be brought together as required. In this webcast, SNIA experts will discuss:
•What prompted the development of composable infrastructure?
•What are the solutions?
•What is composable infrastructure?
•Enabling technologies (not just what’s here, but what’s needed…)
•Status of composable infrastructure standards/products
•What’s on the horizon – 2 years? 5 Years
•What it all means
Johna Till Johnson, CEO & Founder, Nemertes ResearchRecorded: Feb 12 201949 mins
Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
• Who are the right providers?
• What are the critical factors to consider in selecting one?
This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
Nathan Rader, Director of NFV Strategy, CanonicalRecorded: Feb 12 201930 mins
The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
• Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
• Redevelopment path of VNF for containers
• Laying the groundwork for container technology: proactive planning and prep
• The impact of containers on strategy for 5G, edge computing, AI, and blockchain
• Components for core certifications, portability and kubernetes distributions
• Use cases and deployments
Parker Sinclair Sales Engineer, Druva Inc.Recorded: Feb 12 201920 mins
Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?
Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!
During this demo you'll learn how to:
- Provide global protection for enterprise server and virtual workloads
- Reduce total cost of ownership (TCO) by up to 60%
- Isolate and quickly restore data during infrastructure attacks
- Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
Ian Hartley, Principle Engineer, SyncsortRecorded: Feb 11 201918 mins
View this 15-minute webinar to see how you can broaden the scope of ITSI in Splunk to include mainframe and IBM i log data - achieving end-to-end visibility into application health and performance…
When an application goes down or IT services are delayed, your business can grind to a halt. It’s important to have a view of operational data from across all of your systems so you can identify and fix problems quickly.
Splunk IT Service Intelligence (ITSI) is a monitoring and analytics solution that gives visibility across IT infrastructures and business services. By proactively watching streams of machine data it can detect when something starts to step out of line, and more importantly, give you time to correct problems before they have a negative impact.
But in today’s enterprise IT environments, systems can span multiple technology stacks and platforms. So, what if you have a mainframe or IBM i server? Can you bring this onto the surveillance radar of ITSI? With Syncsort Ironstream® you can.
Daniela Fusaro, Senior Solutions ArchitectRecorded: Feb 8 201920 mins
Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.
Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.
Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.
Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.
Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.
An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.
Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.
Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
Nirav Shah Sr. Director, Product & Solutions & Stephen Watkins, Principal Security Architect, Secure SD-WANRecorded: Feb 8 201947 mins
SD-WAN was the most sought out technology in 2018. Organizations eagerly adopted it to replace legacy WAN edge products. SD-WAN provides the application visibility to enable digital transformation at enterprise branches. However, many solutions largely lack essential security.
Watch this webinar.to learn:
- How to enable enterprise branches by creating an SD-Branch
- Third Party analysis and outlook for the future of SD-WAN
- Multiple use cases and examples that demonstrate the cost savings and unified management benefits of SD-WAN.
Nathan Newton, IBM Cloud network developer, and Gerard Sheehan, Cisco product managerRecorded: Feb 7 201934 mins
Attend this 30-minute webinar to learn how the network team at IBM Cloud uses SaltStack event-driven automation to increase operational efficiency, enhance visibility into current state, streamline deployments, and to proactively and reactively secure network infrastructure. Cisco, a primary networking vendor for IBM Cloud, will join the webinar to share its contributions to the project's success through a native integration between Cisco NX-OS and SaltStack network automation. Learn how an event-driven approach to software-defined networking provides unparalleled control and security at scale for enterprise network operations teams.
Vaishnav Gorur, Box | Morgan Littell, Box | Ling Wu, Box Recorded: Feb 7 201946 mins
When the EU General Data Protection Regulation (GDPR) went into effect in May 2018, there was a lot of confusion about its impact. Today, the picture is more clear: multi-million dollar fines have been levied and companies have learned just how costly non-compliance with GDPR can be.
The good news is that Box is GDPR-ready so that all customers can use Box as the Cloud Content Management platform to facilitate their GDPR compliance program. Watch our webinar as we look at how to meet GDPR standards and protect yourself. You'll learn:
-How to set up your Box account for GDPR, step by step
-How to support key GDPR requirements like the Right to be Forgotten
-How to formalize your usage of Box for GDPR with the Box Data Processing Addendum (DPA)
Mike Harding, Product Manager - Microsoft Storage Solutions, HPERecorded: Feb 7 201952 mins
Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
Xavier Stern, Territory Director Southern Europe, HYCU, Inc.Feb 19 20199:00 amUTC90 mins
Nous organisons un Workshop de notre solution HYCU solution dédiée pour NUTANIX
Hycu est une solution de sauvegarde dédiée NUTANIX ( AHV, ESX), permettant de venir en complément de la Data protection délivrée en natif par NUTANIX.
Certifiée AHV ( HYCU développe en premier sur Acropolis) et ESX , Nutanix Files, Volume Groupes, CALM….
Hycu, Strategic Technology Partner Nutanix.
Nutanix utilise la solution Hycu pour ses sauvegardes
David Bloxham, SoftwareONE; Kevin O'Donnell, NitroFeb 19 20192:00 pmUTC45 mins
Successful digital transformation begins by equipping all knowledge workers with strategic, easy-to-use tools. SoftwareONE and Nitro can provide you with tools to reduce printing and enable 100% digital workflows through PDF productivity, eSigning and usage insights.
During this webinar, Nitro’s Director of Product, Kevin O’Donnell, will explain how these tools can be easily implemented and how they can benefit organisations of every size.
• Learn the benefits of going paperless. Aside from saving trees a paperless office can help greatly with GDPR compliance and protects the confidentiality and integrity of documents.
• eSigning tools are only available to a fraction of knowledge workers today; Kevin will discuss why this is the case and how this tool can be extended across the entire organisation in an affordable way.
• Can every industry and organisation digitize their workflows? We will share how companies in various industries are using Nitro as part of their digital transformation initiative.
Kevin has 16 years of experience in technology innovation, strategic leadership and delivering scalable, breakthrough global solutions. Kevin leads Nitro’s Product Management and UX teams to deliver innovative Digital Transformation breakthroughs across all platforms.
Sarah Beaudoin, Product Marketing Manager, DruvaFeb 19 20194:00 pmUTC44 mins
As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.
Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
- Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
- How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
- How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / IntelFeb 19 20194:00 pmUTC60 mins
Workloads are shifting across platforms that span from entry-level to extreme performance.
Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.
This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:
•Simplify Network Evolution using platforms verified as Intel® Select Solutions
•Get on faster, more efficient deployments using tested white box servers
•Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
Xavier Stern, Territory Director Southern Europe, HYCU, Inc.Feb 20 20199:00 amUTC90 mins
Deseamos invitarle a nuestro workshop de HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
HYCU es la única solución de respaldo y seguridad dedicada a NUTANIX (AHV, ESX), para complementar la protección de datos proporcionada de forma nativa por NUTANIX.
Certificado en AHV (HYCU se desarrolla en primer lugar en Acrópolis) ESX, Nutanix Files, Volume Groups, y CALM .
HYCU, socio tecnológico estratégico de Nutanix.
Nutanix utiliza la solución de HYCU para sus copias de seguridad.
Yoni Geva, Product ManagerFeb 20 20193:00 pmUTC60 mins
As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.
In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:
• Segmentation challenges
• Micro-segmentation explained
• Micro-segmentation strategy benefits
• Micro-segmentation strategy development – first steps
• Implementation Do’s and Don’ts
David Neugebauer, Sr. Business Development Mgr, FujitsuFeb 20 20194:00 pmUTC60 mins
Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon InsightFeb 20 20195:00 pmUTC45 mins
To whack, or not to whack, that is the question:
Whether ‘tis nobler in the mind to torch all
The compromised boxes on your poor network,
Or to take arms against a sea of malware
And by blocking stop them all.
So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.
We’ll break down some of the most important points to remember during the commotion of an active incident response, including:
•Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
•Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
•The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
Tony Palmer, Enterprise Strategy Group; Marcus Thordal, Brocade; Eduardo Freitas & Tony Huynh, Hitachi VantaraFeb 20 20195:00 pmUTC60 mins
Join Tony Palmer, senior analyst from Enterprise Strategy Group, and technical experts from Hitachi Vantara and Broadcom as we discuss how customers can achieve strict zero RTO/RPO objectives for mission-critical Oracle database deployments.
•Join experts from Enterprise Strategy Group, Hitachi Vantara and Broadcom as we discuss how you can achieve strict zero RTO/RPO SLO’s for your Oracle database deployment.
•Learn best practices to maximize Oracle performance on Hitachi Virtual Storage Platform (VSP) and Hitachi Unified Compute Platform (UCP).
•Ask your toughest Oracle questions and, if you can stump the experts, win a prize!
Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO TechnologiesFeb 20 20196:00 pmUTC75 mins
FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.
The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.
Join this live FCIA webcast where you’ll learn:
- How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
- The evolution of the FICON protocol optimizations
- How FICON adapts to new technologies
John Armstrong, Head of Product Marketing, PepperdataFeb 20 20196:00 pmUTC30 mins
For most enterprises, APM is considered an essential element of IT operations, bridging production and development with IT and digital business. As companies invest in new technology and projects in their digital transformation journeys, it’s critical to understand the ROI value of those investments.
This webinar will look at eight ROI benefits of APM — both financial and non-financial — that organizations need to consider when evaluating APM solutions. These include increased developer productivity, reducing downtime, improving business continuity and more.
Attendees will learn:
- 8 elements to consider when assessing APM solutions
- How to evaluate financial and non-financial benefits to technology solutions
- How leading organizations measure ROI, often through hard lessons learned
Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & SullivanFeb 21 20194:00 pmUTC60 mins
IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.
Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.
· What are the key verticals in this market?
· How will the revenue shares of the hardware, software, services, and connectivity segments change?
· What are the top three drivers for IoT investments?
Jeff Laskowski, Security Consulting Director, FireEye MandiantFeb 21 20194:00 pmUTC60 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Mark Gaydos, CMO, at NlyteFeb 21 20195:00 pmUTC60 mins
Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.
Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
You will learn:
- Security Officers report more than 10% of assets on network are undetected
- Only 10% of IT Operations managers believe that all assets are detectable and monitored
- 6% of Financial Officers feel they have no risk from a vendor software audit
- IT Managers report more than 69% of assets not current with software and patches
- 87% of Organizations believe 10% of assets or more are not in their CMDB
Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, DateraFeb 21 20195:00 pmUTC105 mins
Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.
Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.
What you will learn from this webinar:
• Architecting your data center for high-performance
• Ease of deployment and management
• Advanced automation and future-ready choice to orchestrate data for VMs
Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, TigeraFeb 21 20196:00 pmUTC60 mins
Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
James Clampffer and Anatoli Shein, VerticaFeb 21 20196:00 pmUTC60 mins
If you use Vertica, you already know that it’s a high-performance MPP analytical database. But, did you know that Vertica is also a highly performant query engine?
Join us for this Webcast to learn how Vertica for SQL on Hadoop offers the fastest and most enterprise-ready way to perform SQL queries on your Hadoop data. We’ve leveraged our years of experience in Big Data analytics and opened up our platform to use the full power of the Hadoop cluster.
In this webcast, you’ll learn to take advantage of our open source contributions to the Apache community, ORC and Parquet file readers/writers, and various connectors and features to accelerate the exploration of your growing data lakes.
Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.
This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.
Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.
This is why we developed the new Procurement Workbench in PyraCloud.
We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.
Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:
• Simplifying the management of quotes, orders and invoices
• Improving product search capabilities across multiple products and services in global catalogues
• Tracking software previously purchased, product favourites and subscriptions
• Consolidating multiple aspects of the procurement process in one place
PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.
As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.
During this talk, you will:
-Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
-Be able to evaluate your current plans against a "customer security model"
Alessandro Barbieri, VP Product Management at Pluribus NetworksFeb 26 20194:00 pmUTC60 mins
In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.