Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment
Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-
Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-level agreements (SLAs), and require robust, effective and automated failover and failback. Unfortunately, traditional business continuity/disaster recovery (BC/DR) approaches are complex, rigid and inflexible, and IT departments have struggled to protect these applications in a virtual environment.
Want to learn how to mitigate data loss, minimize RPOs and RTOs, and ensure a high degree of service continuity? Join this interactive webinar and discover how to protect your applications, not just your data.
•Leading 451 Group Analyst Dave Simpson will discuss the industry drivers for virtualized mission-critical applications, core challenges of traditional BC/DR approaches, and the key features needed to ensure a robust, yet flexible, BC/DR solution for a virtual environment.
•Gil Levonai, VP of products for Zerto, will quickly highlight a revolutionary technology, hypervisor-based replication, which simplifies enterprise-class BC/DR in a virtual environment.
•Your peer, Mark Montagna, IT Infrastructure Manager for The Philadelphia Contributionship, will share his experience including: previous BC/DR challenges, selection process, the Zerto implementation and resulting benefits.
RecordedJun 13 2012
Your place is confirmed, we'll send you email reminders
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
If you can’t see what’s on your network, then you can’t control it.
As new technologies emerge each day, so do the associated security threats - are you confident that you can see them before they wreak havoc on your network? 86% of executives aren’t, believing there are gaps in their ability to see what’s really going on inside their network.
Join Julian Matossian, Senior Product Manager, and Nick Kelly, Director of Product Marketing, as they delve into the current state of network visibility: the challenges, blind spots, and most importantly, the solutions to help illuminate your network.
Having the right security measures in place is only half the battle – you need to know exactly what they’re protecting you from.
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.
Join us for this live webinar where you will learn:
• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
As a cybersecurity professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
• An insider turns against your organisation
• A cyber-attacker steals a user’s credentials
• An administrator abuses account privileges
If you’re focused on addressing user threats, UBA can be a powerful tool in your kit. Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
• Why detecting user threats is so important—and so difficult
• Different approaches to UBA
• The value of data from across your business
• How to maximise the efficiency of your security analysts
Attend this webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.
As traditional enterprises look to experiment with emerging Docker use cases, the need to connect containers to persistent data or even just to share data between Docker containers becomes more obvious. However, this expansion has proven to be a challenge for infrastructure that relies on monolithic storage arrays. As a result, enterprises are looking to software-defined storage as a more attractive choice because of its flexibility, programmability and ability to provide well-managed, persistent storage. In this talk, you’ll get:
• What Docker is and is not, as well as container-specific storage challenges
• Why you need container-specific storage policies, SLAs, and classes of service (CoS)
• How to leverage software-defined storage solutions for Docker and containers
• When to use hyperconverged or hyperscale architectures for your Docker initiatives
Computing models in today’s dynamic data centers and clouds are changing dramatically. Application-centric enterprises are finding that they need to develop nimble operational models for infrastructure, networking, and application services. Application delivery controllers (ADCs) are an important part of the networking and application services considerations for software-defined data centers.
New software-defined load balancers are significantly improving the way that application services are delivered and scaled, while freeing IT from repetitive tasks through intelligent automation. Application developers and lines of business are benefiting from better APIs that align with their goals for continuous integration and delivery (CI/CD) and cloud-native applications.
In this webinar, you’ll learn:
– How to eliminate the overprovisioning and overspending that is typical with traditional hardware-based load balancing solutions?
– How to scale not just load balancers but also applications, elastically and predictively based on real-time traffic patterns?
– How to take advantage of x86 servers, VMs, or containers to deliver application services close to individual applications?
– What are the best ways to support multi-cloud deployments and cloud-native applications?
– Ways to troubleshoot applications in minutes with the ability to record and replay traffic events, security and client data.
– How to accelerate application services for SDN environments such as Cisco ACI and private clouds such as OpenStack or for container-based microservices applications?
– The move to agile infrastructure and operations is already happening and it is now reaching critical networking components in the stack such as ADCs.
Join us for our live webinar on May 11th at 1 p.m.ET and 10 a.m. PT when Storage Switzerland and Tegile Systems will discuss how the acquisition and operating costs of flash make it feasible to build a private cloud that is responsive to the needs of the business and cost effective.
Storage architectures have evolved to meet ever-changing business demands. Today’s enterprises need the flexibility to place workloads where they make the most sense and achieve objectives for resiliency and growth without introducing unnecessary complexity and cost.
If you have storage initiatives focused on virtualization, backup, archiving, or cloud, attend this session to learn new strategies for building a more agile, multi-site storage infrastructure at lower cost.
As organizations run more mission-critical applications within virtual environments, it's often a challenge to continue to meet performance and availability SLAs. Storage is usually the likely culprit. IT managers must have a keen understanding of the latest advancements in storage technology so they can recommend the best approach moving forward.
In this session, you’ll learn about the latest storage architectures (flash caching, server-side PCIe flash, hybrid, and all-flash) and the pros and cons for each. We’ll also discuss how a well-designed infrastructure can help you meet your performance requirements, drive efficiencies, and deliver high availability for your VMware environment.
Tell a friend! Share this webinar by clicking on the social icon above.
In this webinar Storage Switzerland, Hitachi Data Systems and Brocade discuss why enterprises need to invest in big data analytics, how they can make that investment and what are some of the key requirements in designing a system.
In the latest version of HPE NNMi, see how you can seamlessly monitor your physical and virtual network infrastructure end to end. NNMi discovers and visualizes connectivity for virtual network appliances hosted in your VMware environment, and provides root cause analysis and troubleshooting for outages that occur at the virtual network edge. See these features in action, as well as the lineup of new capabilities in NNMi 10.10:
See new mapping and visualizations to explore the virtual network edge
Learn how NNMi tracks workloads as they migrate within the data center
Learn how events, incidents, and root cause analysis capabilities extend into the virtual network edge
Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
Driven by the need for business agility, the infrastructure convergence and hybrid cloud trend are proliferating fast.
However, backup is often overlooked when new converged platforms and cloud services are inserted into existing environments. These new silos complicate management and introduce complexity by breaking down existing backup architectures, slowing down your data centre modernisation projects and putting your business at risk.
Join us on Wednesday, 20th January and learn how you can implement new data centre modernisation projects efficiently, identify and remove data protection blind spots and ease the transition of your applications to the cloud.
In this interactive webinar we will discuss the storage challenges that VMware creates for IT professionals and how flash-based storage systems can not only help solve storage performance challenges, they can also simplify storage management and increase storage efficiency. We will also speak to Fritz Gielow, IT Administrator with the County of Nevada to discuss how flash has solved their VMware storage problems.
Russ Fellows, Senior Partner & Analyst, Evaluator Group
Deploying Solid-State for Virtualized Environments: Use Cases for All Flash, Hybrid and Alternative Storage Implementations
This session dives into common use cases for all-flash and hybrid storage systems for virtualized environments in mid and large enterprises. Russ will focus on actual deployments, allowing listeners an opportunity to learn how to build a solid business case for solid-state, based upon findings from enterprise firms, as well as hands on performance testing with multiple systems in head to head comparisons, providing practical information.
Review the options and architectures that are best suited for server and desktop virtualization
Understanding of when and where to deploy solid-state storage or hybrid to maximize your IT budget and ROI.
This webinar presents a groundbreaking concept called "Orchestrated Assurance". For you as a service provider, this will dramatically change the way you deliver, operate and troubleshoot new services. Orchestrated Assurance is based around a model-driven service orchestrator that uses software-based active test agents in NFV to enable automated, agile and assured service deliveries.
David Hughes, CEO, Silver Peak and Tony Thompson, VP of Marketing, Silver Peak
Annual Crystal Ball Webinar - The Top Disruptive Networking Technologies Heading Your Way
Which new trends and technologies will be game-changing in 2016? What trends from last year will continue? What benefits will these new concepts bring and what challenges will you have to tackle?
Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball Webinar. David will share his predictions for the coming year and also look back at last year’s predictions that will continue to impact the world of networking. He will discuss technologies that took the industry by storm and ones that quite simply missed the mark. Find out for yourself how accurate David’s 2015 predictions were and more importantly, what’s in store for 2016.
Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade.
You should attend to:
•Hear about predictions that will signal market changes in end-user connectivity
•Learn about technologies that took off and went bust in 2015
•Find out how to dramatically drive down networking costs
•Get ahead for your 2016 WAN strategies
While virtualizing infrastructure is a method to help manage sprawl, it is not a solution by itself. Learn how and why a truly heterogeneous, software-defined storage approach is the key to reducing complexity, maximizing efficiency and lowering costs. It’s time for IT staff to stop reacting and gain back the freedom and flexibility to drive business.
Containers have become a huge area of interest in our industry with the introduction of Docker in Microsoft Azure and the announcement of Windows Server containers coming with Windows Server 2016. But have you heard about Turbo containers? Unlike Docker and others, Turbo containers by Spoon are for Server and Desktop applications. They are also super quick as the name suggests. CTO of Algiz Technology Rory Monaghan will provide an introduction to Turbo containers with some cool demos.
SAFEGUARDING THE ENTERPRISE WITH SECURE DATA AS A SERVICE
It seems like every other day another industry leader is caught off-guard by data theft. As data breaches continue to make headlines, commercial and public organizations are seeking solutions to protect sensitive customer data, including health, financial, and identity information.
What are the biggest challenges for organizations in securing sensitive data? What are some things that you can do to mitigate risk?
Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data masking approaches fail. With Delphix, application teams get full, fresh, and secure data sets in just minutes, via self service.
Key challenges organizations face in securing sensitive data
Why traditional approaches to data masking fail
How the combination of virtual data and service-based masking transforms security
How do YOU choose the ideal data storage solution for your virtual server environment? Do you need Flash/SSD?
This webinar focuses on common questions that data storage buyers ask when they are looking to purchase storage to handle their virtualized server environment and solutions that can increase their productivity while saving on costs.
While it is clear that data on mobile devices should be managed, many organizations struggle to choose between device management and containerization. In this session, an AirWatch expert will discuss the differences between native and proprietary containerization, how each approach addresses different use cases, and how AirWatch can help you meet security requirements with each approach.
Until now, delivering high performance graphics workstations remotely was cost prohibitive and complicated to setup and deliver. With VMware Horizon 6 and NVIDIA GRID vGPU, there has never been a better time to deliver high performance 3D desktops in a cost effective manner that is simple to setup and deploy. Bring your customers the security, performance, reliability, and colloboration needed to transform their business.
Virtualization is no longer a passing trend. Organization deploying it in their servers, desktops, storage and networks are experiencing increased performance and decreased costs, when implemented and managed properly. Join this channel to hear leading experts discuss this maturing technology and how you can create your own software-defined data center.