Browse communities
Browse communities
Presenting a webinar?

vExperts on VMworld: Top 3 Disaster Recovery Trends

Shannon Snowden, vExpert; Gabrie van Zanten, vExpert; Gil Levonai, Zerto
Business Continuity and Disaster Recovery (BC/DR) will take center stage at VMworld 2012 as enterprises strive to meet evolving DR needs in a virtual world. Ready for a sneak peek at the top three DR trends that are sure to dominate VMworld discussions?

Join a panel discussion with vExperts Shannon Snowden, Gabrie van Zanten and Gil Levonai from Zerto as they address:

- Trend 1: Virtualizing mission-critical applications. Learn how DR plays a big part in virtualizing mission-critical applications.

- Trend 2: Simplifying BC/DR. Virtualization is supposed to simplify IT operations, but DR seems to hinder that. Understand why, and what can be done about it.

- Trend 3: The Cloud! Can you use the cloud for disaster recovery? Are cloud providers ready for replication primetime? Explore reasons why DR-as-a-Service hasn’t taken off yet, and how this is changing.

You’ll also have a chance to ask the experts your BC/ DR questions during a roundtable Q&A.

Register now to get ahead of the VMworld dialogue and learn how virtualization is changing the game for effective DR initiatives.
Aug 16 2012
46 mins
vExperts on VMworld: Top 3 Disaster Recovery Trends
Join us for this summit:
More from this community:

IT Security

  • Live 1 and recorded (5371)
  • Upcoming (112)
  • Date
  • Rating
  • Views
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Channel
  • Channel profile
  • Backup Target Appliances: Ready. Aim. Point. Apr 16 2015 5:00 pm UTC 45 mins
    Samuel Nagalingam, Sr. Product Manager, Seagate Technology; Anne Haggar, Sr. Product Marketing Manager, Seagate Technology
    The Fastest, Easiest Way to Backup and Store Data—so You Can Do More Important Things

    Are you still spending too much time backing up and storing data rather than using that information to drive business innovation? If so, it just might be time to consider an all-in-one backup target appliance (BTA).

    Join us as Seagate appliance experts Anne Haggar and Samuel Nagalingam will help you answer these important questions:

    1. Why are backup target appliances gaining steam in the market?
    2. How do you know if a BTA is right for you?
    3. How can Seagate’s BTA solve the problems you have managing your information and backing up enterprise applications?

    After taking a high-level look at the latest trends in BTA technology, Anne and Samuel will introduce you to the powerful, all-new Seagate Backup Target Appliance—an all-in-one solution that provides an onsite backup point for your most important information, let’s you optionally run the EVault Director Backup and Recovery Software, and allows you to replicate to another BTA or to the cloud.

    Find out how you can protect the information that matters most—wherever it resides—freeing you to use the information to drive innovation.
  • Traditional PBX vs Cloud Communications: A Customer Weighs-in Apr 15 2015 5:00 pm UTC 15 mins
    RingCentral
    Coldwell Banker Mid-America Group is a real estate brokerage with approximately 200 agents in central Iowa. Recently the company switched from an expensive Avaya PBX system to a RingCentral cloud communications solution. Director of IT Paul Clowser says, “Agents now have much more control over their needs without having to contact IT.”
  • From the Front Lines: The Top 10 DNS Attacks Apr 9 2015 5:00 pm UTC 45 mins
    Srikrupa Srivatsan, Sr. Product Marketing Manager, Infoblox
    More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
  • How Mobile Data Protection Can Accelerate Top CIO Initiatives Apr 8 2015 4:00 pm UTC 60 mins
    Dave Packer, Director of Product Marketing & Seyi Verma, Sr. Product Marketing Manager
    The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • Three Ways to Increase Productivity with Unified Communications Apr 7 2015 5:00 pm UTC 45 mins
    John Scarborough, SVP Marketing & Product Management, MegaPath
    Year-over-year, the number of organizations moving from one-off communication tools to a more collaborative approach are growing dramatically. A key driving force behind this shift is the increase in worker mobility. Research shows that within 3 years, 51% of organizations will be doing businesses primarily over mobile devices. Without the presence of a unified communication system, the increase in mobility may not translate into an increase in productivity.

    In this webinar, you will learn three ways to increase productivity with your unified communications platform.
  • Easing Your Transition to a Cloud Phone System Apr 7 2015 3:00 pm UTC 15 mins
    RingCentral
    When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.
  • VMware Virtual Volumes – What impact will they have on the datacenter? Apr 2 2015 4:00 pm UTC 60 mins
    Tom Fenton, Taneja Group; Eric Siebert, HP; Joel Kaufman, NetApp; Ben Bolles, NexGen
    Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?

    Panelists:
    Eric Siebert, Worldwide Solutions Marketing Manager; HP
    Joel Kaufman, VMware Technical Director; NetApp
    Ben Bolles, VP Products; NexGen Storage
  • Lyft Case Study: Achieving Growth with Cloud Communications Apr 1 2015 5:00 pm UTC 15 mins
    RingCentral
    Pick up your smartphone, tap a button, and get a lift to wherever you need to go. That’s the idea behind Lyft, the San Francisco-based company whose service is now available in five major metropolitan areas.

    “We wouldn’t be able to operate at this capacity without a product like RingCentral,” says Adam Fishman, Director of Growth and Operations. “We needed something that was fast, scalable, and had all the features we were missing.”

    With RingCentral, Lyft has realized an exponential growth in productivity, including:

    -An increase in call-back rates from 5% to nearly 50%
    -More than 100% improvement in outbound call volume

    Watch the video to understand the role cloud communications plays in turning a good idea into something revolutionary.
  • Hyper-converged Infrastructure: A Hype-Free Buyer’s Guide Mar 31 2015 6:00 pm UTC 45 mins
    Jon Toigo, Chairman, Data Management Institute; Sushant Rao, Sr. Director of Product Marketing, DataCore Software
    Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • How Rackspace Makes OpenStack Production-Ready Mar 31 2015 3:00 pm UTC 60 mins
    Christian Foster, Director of Marketing for Rackspace Private Cloud; Justin Shepherd, RPC Distinguished Architect
    As companies explore how they can leverage OpenStack to advance their business, they often ask if OpenStack is really “production-ready.” Through co-founding OpenStack, running one of the world’s largest OpenStack clouds, and managing OpenStack private clouds for enterprises, we know what is takes to make OpenStack production-ready. In this session, Justin Shepard, a Rackspace distinguished architect, will discuss what it means to be "production-ready" and how we designed Rackspace Private Cloud Powered By OpenStack to run production workloads. Register today to join this insightful and informative discussion.
  • Simplifying Private Cloud Deployments: The Next Generation of Network Automation Recorded: Mar 26 2015 29 mins
    Matt Gowarty, Sr. Product Marketing Manager
    Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Why Capacity Management is Essential for a Cloud Strategy Recorded: Mar 26 2015 50 mins
    Marina Yesakova, Sr. Marketing Manager; Giuseppe Nardiello, Sr. Product Manager, BMC Software
    To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:

    • Gain visibility into capacity utilization at the resource, service, and business level.
    • Support timely decision-making on IT investments.
    • Increase agility, reduce IT costs, and minimize risks.

    Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
  • Accelerate your Desktop Transformation Strategy: Six New Additions to Horizon 6 Recorded: Mar 25 2015 59 mins
    Sumit Dhawan, SVP and GM of VMware Desktops
    Join us as Sumit Dhawan, SVP and GM of VMware Desktops, unveils the next wave of application and desktop innovations:

    - Six key new enhancements to Horizon 6
    - Features that help you deliver unlimited access to desktops and apps at lower costs, with better performance (think 3D!) - and at unprecedented scale
    - New technology demonstrations that bring together virtual networking, storage, desktops and apps
  • Cloud-based Computing Survey Results: Adoption Trends and Security Concerns Recorded: Mar 25 2015 7 mins
    Kris Bondi, VP of Marketing, Moka5
    Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Deploying a Cloud Scale App with Rackspace DevOps Automation Recorded: Mar 25 2015 50 mins
    Eric Brinkman
    Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Visions For Ethernet Connected Drives Recorded: Mar 25 2015 61 mins
    Chris DePuy, Vice President, Dell’Oro Group; David Fair, SNIA-ESF Chair
    The arrival of mass-storage services, the emergence of analytics applications and the adoption of Object Storage by the cloud-services industry have provided an impetus for new storage hardware architectures. One such underlying hardware technology is the Ethernet connected hard drive, which is in early stages of availability.

    Join this Webcast to hear Chris DePuy, Vice President of Dell’Oro Group, share findings from interviews with storage-related companies, including those selling hard drives, semiconductors, peripherals and systems. Chris will present some common themes uncovered, including:
    •What system-level architectural changes may be needed to support Ethernet connected drives
    •What capabilities may emerge as a result of the availability of these new drives
    •What part of the value chain spends the time and money to package working solutions
    This Webcast will also present some revenue and unit statistics about the storage systems and hard drive markets and will discuss potential market scenarios that may unfold as a result of the Object storage and Ethernet connected drive trends.
  • Leveraging Cloud Connected Storage for Limitless and Backup-less NAS Recorded: Mar 25 2015 39 mins
    Fred Pinkett, Senior Director of Product Marketing
    The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Private and Hybrid Cloud – What Are Their Roles in a Modern Datacenter? Recorded: Mar 24 2015 63 mins
    Tom Fenton, Taneja Group; Steve Wilson, Citrix; Burzin Patel, Microsoft; Bryan Che, Red Hat; Mathew Lodge, VMware
    Join us for this informative 60 minute roundtable as we discuss how private and hybrid clouds fit into the modern datacenter. This panel includes top luminaries from major private and hybrid cloud providers. Some of the questions we will be asking include: Why use private and hybrid clouds instead of public clouds? Are all workloads suitable for these types of clouds? What are the economic factors that play into these types of clouds? Are they a transitional technology or the new normal?

    Panelists:
    Steve Wilson, VP Cloud Software, Citrix
    Burzin Patel, Director of Product Marketing, Microsoft
    Bryan Che, General Manager, Cloud Product Strategy, Red Hat
    Mathew Lodge, VP Product Marketing and Management, Cloud Services, VMware
  • Choosing the Right DCIM Software: of RFPs, POCs and Other Adventures Recorded: Mar 24 2015 49 mins
    Jason Sherman, Director of Sales Engineering, Graphical Networks
    So you have been tasked to find a DCIM solution for your organization. There's only about a hundred of them, so that sounds like fun!

    Before you plunge into mind-numbing RFP writing, join Jason Sherman, Director of Sales Engineering at Graphical Networks as he provides valuable tips and tricks of the trade that can save you time and energy.

    We'll go over some of the aspects that may be forgotten in the RFP writing process as well as requirements for a meaningful proof of concept, and other important things to consider when evaluating a DCIM software tool.
  • 5 Reasons to Deploy File Sync in a Private Cloud Environment Recorded: Mar 24 2015 27 mins
    Trace Ronning, Content Marketing Manager, eFolder
    The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: vExperts on VMworld: Top 3 Disaster Recovery Trends
  • Live at: Aug 16 2012 5:00 pm
  • Presented by: Shannon Snowden, vExpert; Gabrie van Zanten, vExpert; Gil Levonai, Zerto
  • From:
Your email has been sent.
or close
You must be logged in to email this