Browse communities
Browse communities
Presenting a webinar?

Risks & Rewards of Cloud & Hybrid Data Centers

Billy Cox, Director Cloud Strategy, Intel; Sanjeet Singh, Dell; Steven O'Donnell, S1NED (moderator)
An agile data center shouldn't mean compromised service, but new technology adoption isn't an easy process. First you need to develop a strategy, then you need to make a business case, then you need to roll out a smooth implementation and finally you need to layer security, compliance and management considerations into your stack.

Cloud and hybrid data center technologies are hitting the mainstream with the majority of IT leaders rating cloud to be a priority over the next two years. This panel of experts will take you through the pros, cons and key questions for those who are evaluating cloud and getting started with their datacenter transformations. Key topics will include data storage, security, consolidation and integration and deployment techniques.
Dec 8 2011
53 mins
Risks & Rewards of Cloud & Hybrid Data Centers
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5370)
  • Upcoming (108)
  • Date
  • Rating
  • Views
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
    Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
    In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
    Key takeaways:
    -Data related to software vulnerabilities
    -The challenge of prioritizing mitigation
    -How the use of vulnerability intelligence can help support consistent risk reduction
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Channel
  • Channel profile
  • Three Ways to Increase Productivity with Unified Communications Apr 7 2015 5:00 pm UTC 45 mins
    John Scarborough, SVP Marketing & Product Management, MegaPath
    Year-over-year, the number of organizations moving from one-off communication tools to a more collaborative approach are growing dramatically. A key driving force behind this shift is the increase in worker mobility. Research shows that within 3 years, 51% of organizations will be doing businesses primarily over mobile devices. Without the presence of a unified communication system, the increase in mobility may not translate into an increase in productivity.

    In this webinar, you will learn three ways to increase productivity with your unified communications platform.
  • Easing Your Transition to a Cloud Phone System Apr 7 2015 3:00 pm UTC 15 mins
    RingCentral
    When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.
  • VMware Virtual Volumes – What impact will they have on the datacenter? Apr 2 2015 4:00 pm UTC 60 mins
    Tom Fenton, Taneja Group; Eric Siebert, HP; Joel Kaufman, NetApp; Ben Bolles, NexGen
    Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?

    Panelists:
    Eric Siebert, Worldwide Solutions Marketing Manager; HP
    Joel Kaufman, VMware Technical Director; NetApp
    Ben Bolles, VP Products; NexGen Storage
  • Lyft Case Study: Achieving Growth with Cloud Communications Apr 1 2015 5:00 pm UTC 15 mins
    RingCentral
    Pick up your smartphone, tap a button, and get a lift to wherever you need to go. That’s the idea behind Lyft, the San Francisco-based company whose service is now available in five major metropolitan areas.

    “We wouldn’t be able to operate at this capacity without a product like RingCentral,” says Adam Fishman, Director of Growth and Operations. “We needed something that was fast, scalable, and had all the features we were missing.”

    With RingCentral, Lyft has realized an exponential growth in productivity, including:

    -An increase in call-back rates from 5% to nearly 50%
    -More than 100% improvement in outbound call volume

    Watch the video to understand the role cloud communications plays in turning a good idea into something revolutionary.
  • Hyper-converged Infrastructure: A Hype-Free Buyer’s Guide Mar 31 2015 6:00 pm UTC 45 mins
    Jon Toigo, Chairman, Data Management Institute; Sushant Rao, Sr. Director of Product Marketing, DataCore Software
    Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • How Rackspace Makes OpenStack Production-Ready Mar 31 2015 3:00 pm UTC 60 mins
    Christian Foster, Director of Marketing for Rackspace Private Cloud; Justin Shepherd, RPC Distinguished Architect
    As companies explore how they can leverage OpenStack to advance their business, they often ask if OpenStack is really “production-ready.” Through co-founding OpenStack, running one of the world’s largest OpenStack clouds, and managing OpenStack private clouds for enterprises, we know what is takes to make OpenStack production-ready. In this session, Justin Shepard, a Rackspace distinguished architect, will discuss what it means to be "production-ready" and how we designed Rackspace Private Cloud Powered By OpenStack to run production workloads. Register today to join this insightful and informative discussion.
  • Simplifying Private Cloud Deployments: The Next Generation of Network Automation Recorded: Mar 26 2015 29 mins
    Matt Gowarty, Sr. Product Marketing Manager
    Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Why Capacity Management is Essential for a Cloud Strategy Recorded: Mar 26 2015 50 mins
    Marina Yesakova, Sr. Marketing Manager; Giuseppe Nardiello, Sr. Product Manager, BMC Software
    To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:

    • Gain visibility into capacity utilization at the resource, service, and business level.
    • Support timely decision-making on IT investments.
    • Increase agility, reduce IT costs, and minimize risks.

    Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
  • Accelerate your Desktop Transformation Strategy: Six New Additions to Horizon 6 Recorded: Mar 25 2015 59 mins
    Sumit Dhawan, SVP and GM of VMware Desktops
    Join us as Sumit Dhawan, SVP and GM of VMware Desktops, unveils the next wave of application and desktop innovations:

    - Six key new enhancements to Horizon 6
    - Features that help you deliver unlimited access to desktops and apps at lower costs, with better performance (think 3D!) - and at unprecedented scale
    - New technology demonstrations that bring together virtual networking, storage, desktops and apps
  • Cloud-based Computing Survey Results: Adoption Trends and Security Concerns Recorded: Mar 25 2015 7 mins
    Kris Bondi, VP of Marketing, Moka5
    Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Deploying a Cloud Scale App with Rackspace DevOps Automation Recorded: Mar 25 2015 50 mins
    Eric Brinkman
    Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Visions For Ethernet Connected Drives Recorded: Mar 25 2015 61 mins
    Chris DePuy, Vice President, Dell’Oro Group; David Fair, SNIA-ESF Chair
    The arrival of mass-storage services, the emergence of analytics applications and the adoption of Object Storage by the cloud-services industry have provided an impetus for new storage hardware architectures. One such underlying hardware technology is the Ethernet connected hard drive, which is in early stages of availability.

    Join this Webcast to hear Chris DePuy, Vice President of Dell’Oro Group, share findings from interviews with storage-related companies, including those selling hard drives, semiconductors, peripherals and systems. Chris will present some common themes uncovered, including:
    •What system-level architectural changes may be needed to support Ethernet connected drives
    •What capabilities may emerge as a result of the availability of these new drives
    •What part of the value chain spends the time and money to package working solutions
    This Webcast will also present some revenue and unit statistics about the storage systems and hard drive markets and will discuss potential market scenarios that may unfold as a result of the Object storage and Ethernet connected drive trends.
  • Leveraging Cloud Connected Storage for Limitless and Backup-less NAS Recorded: Mar 25 2015 39 mins
    Fred Pinkett, Senior Director of Product Marketing
    The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Private and Hybrid Cloud – What Are Their Roles in a Modern Datacenter? Recorded: Mar 24 2015 63 mins
    Tom Fenton, Taneja Group; Steve Wilson, Citrix; Burzin Patel, Microsoft; Bryan Che, Red Hat; Mathew Lodge, VMware
    Join us for this informative 60 minute roundtable as we discuss how private and hybrid clouds fit into the modern datacenter. This panel includes top luminaries from major private and hybrid cloud providers. Some of the questions we will be asking include: Why use private and hybrid clouds instead of public clouds? Are all workloads suitable for these types of clouds? What are the economic factors that play into these types of clouds? Are they a transitional technology or the new normal?

    Panelists:
    Steve Wilson, VP Cloud Software, Citrix
    Burzin Patel, Director of Product Marketing, Microsoft
    Bryan Che, General Manager, Cloud Product Strategy, Red Hat
    Mathew Lodge, VP Product Marketing and Management, Cloud Services, VMware
  • Choosing the Right DCIM Software: of RFPs, POCs and Other Adventures Recorded: Mar 24 2015 49 mins
    Jason Sherman, Director of Sales Engineering, Graphical Networks
    So you have been tasked to find a DCIM solution for your organization. There's only about a hundred of them, so that sounds like fun!

    Before you plunge into mind-numbing RFP writing, join Jason Sherman, Director of Sales Engineering at Graphical Networks as he provides valuable tips and tricks of the trade that can save you time and energy.

    We'll go over some of the aspects that may be forgotten in the RFP writing process as well as requirements for a meaningful proof of concept, and other important things to consider when evaluating a DCIM software tool.
  • 5 Reasons to Deploy File Sync in a Private Cloud Environment Recorded: Mar 24 2015 27 mins
    Trace Ronning, Content Marketing Manager, eFolder
    The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • Cost Analysis of On-Premise vs. Cloud Phone Systems Recorded: Mar 24 2015 3 mins
    RingCentral
    There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
  • Dealing with Hidden Cloud Dependencies Recorded: Mar 19 2015 48 mins
    Edward L. Haletky, Principal Analyst, The Virtualization Practice, LLC
    As you move your workloads to the cloud, you need to be aware of hidden dependencies whether in your workloads you have moved, or within the cloud itself. There are many aspects of the cloud that are hidden from view, and these cause unknown dependencies. Moving to rapidly, these dependencies could rear up and cause disaster or at the very least some headaches. A well thought out plan is required when using the cloud. Each dependency should be tackled, each should be discussed before entering the cloud, but often that is not always the case. We will look at these dependencies and provide actionable advice on best practices on dealing with these hidden dependencies.
  • Security and Scalability in the Hybrid Cloud Recorded: Mar 19 2015 47 mins
    Matt Shover and Joseph Palumbo
    Security and Scalability in the Hybrid Cloud: How to get one without losing the other

    Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:

    •Top reasons why people choose the cloud
    •Top reason why people think the cloud isn’t the best fit for them
    •What is scaling?
    •How do you scale?
    •How does the hybrid cloud help scale your application?
    •How does the hybrid cloud help secure your application?
    •So how do you build a hybrid environment?


    About the Speakers

    Matt Shover:
    Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.

    Joseph Palumbo:
    As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
  • Developing Multi-Cloud Solution Architectures Recorded: Mar 19 2015 31 mins
    Kendra Matthews, Marketing Director; Matt O’Donel, Solution Consultant
    77 percent of IT professionals are planning to deploy to multiple clouds within the next 12 months, based on a recent Dimensional Research survey. Why the movement to multi-cloud? Organizations are learning not all clouds are created equal and understanding how to identify the right provider and service to strike a balance between cost and capability is key. Maximizing the value of a multi-cloud strategy and building multi-cloud application architectures requires a robust catalog, ability to compare providers against key application characteristics, and way to easily collaborate and design a multi-layered architecture. In this webinar we walk through the identification and design of a multi-layer, multi-cloud architecture highlighting how the planning and design tools from Gravitant can augment current processes and speed the planning and design of a multi-cloud solution.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Risks & Rewards of Cloud & Hybrid Data Centers
  • Live at: Dec 8 2011 7:00 pm
  • Presented by: Billy Cox, Director Cloud Strategy, Intel; Sanjeet Singh, Dell; Steven O'Donnell, S1NED (moderator)
  • From:
Your email has been sent.
or close
You must be logged in to email this