Hi [[ session.user.profile.firstName ]]


  • The Evolution of VMware’s Private Cloud Network Using NSX The Evolution of VMware’s Private Cloud Network Using NSX John Tompkins, OneCloud Network Architect, VMware Live 45 mins
    VMware’s Private Cloud network relies heavily on the Software Defined Networking features provided by NSX today: however; it all started with a very traditional network topology. In this session we will discuss the evolution of VMware’s Private Cloud Network and how it evolved into one of the world’s biggest NSX for vSphere deployments. We will discuss design considerations and challenges, how we were able to achieve a scalable, multi-tenant security model and the technical and operational benefits that VMware’s Private Cloud team has garnered from adopting NSX.
    •Design considerations for large-scale, multi-tenant NSX environments
    •Overcoming technical and operational challenges with VMware’s Private Cloud and NSX
    •Benefits of transforming your traditional network to a software-defined one
  • Should you keep your On-Premises NAS: Upgrade, Pay Maintenance or Public Cloud? Should you keep your On-Premises NAS: Upgrade, Pay Maintenance or Public Cloud? Kevin Brown, Solutions Architect, SoftNAS Recorded: Oct 26 2016 52 mins
    The maintenance bill is due. It’s hundreds of thousands or millions of dollars, and you know you will need to purchase more storage capacity:

    -Do you pay your maintenance and commit to another 3-5 years?
    -Do you upgrade your data center architecture?
    -Do you shift to the public AWS cloud?

    In this webinar and demo, we covered:
    -Pros/Cons: on-premises SAN/NAS vs. hyperconverged infrastructure vs. AWS cloud storage
    -Demo: “Lift and shift” on-premises storage to AWS without re-architecting applications
    -How to fund a move to public cloud storage with existing budget
    -TCO analysis
    -Other public cloud use cases
  • Take 20 Series- Ep 3: Understanding the Availability Features of Virtual SAN Take 20 Series- Ep 3: Understanding the Availability Features of Virtual SAN GS Khasla, Sr. Tech Marketing Manager Storage and Availability VMware Recorded: Oct 26 2016 22 mins
    Application uptime and resiliency to failure are key factors with any hyper-converged infrastructure (HCI) storage solution. This technical discussion will focus on the availability features of Virtual SAN and why it's the best HCI platform.
  • Flash Storage: Virtualization Unleashed Flash Storage: Virtualization Unleashed Joel McKelvey, PMM Infrastructure Solutions - Pure Storage Recorded: Oct 26 2016 35 mins
    With today's massive influx of data, storage demands are increasingly on the rise. From flash, disk, solid state drives, persistent memory, software-defined and more, how do you decide which storage technology is right for your organization? Join this webinar to learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.

    In the Webinar we will cover:

    -What is possible with flash?
    -What flash solutions are available today?
    -How do the costs compare?
    -Pure Storage architecture overview
    -Demonstration of storage provisioning tasks
  • DR Strategies For Hyperconverged Architectures DR Strategies For Hyperconverged Architectures Curtis Preston, Storage Switzerland Recorded: Oct 26 2016 60 mins
    Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
  • How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric Recorded: Oct 26 2016 28 mins
    Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

    In this webinar, you will learn critical aspects to securing data in a variety of ways:

    1) Three approaches to securing data-at-rest
    2) How software-defined policies can ease security management
    3) The role that key management plays in securing data-at-rest
    4) How real-time alerting can take your security posture to the next level
  • Netflix: The Journey to Efficiently Securing Your Video Stream Netflix: The Journey to Efficiently Securing Your Video Stream Jonathan Stern, Applications Engineer at Intel & Scott Long, Sr. Software Engineer at Netflix Recorded: Oct 26 2016 53 mins
    Netflix engineers were faced with a challenge: how do you protect the privacy of your customers while serving over a third of all internet traffic in the US? Intel and Netflix engineers discuss the scale of the challenge and how it was solved using Intel® software ingredients and the latest Intel® Xeon® processors. This session includes details of the analysis performed, the software ingredients used, and the record setting results of this collaboration.
  • Use Cases for Software-Defined Storage Use Cases for Software-Defined Storage Rick Walsworth, Vice President of Marketing, Formation Data Systems Recorded: Oct 26 2016 61 mins
    Join us for this presentation which includes an in depth look at a number of case studies regarding customers that have successfully deployed the FormationOne software-defined storage platform. This interactive presentation will include a number of specific use cases with performance and ROI results to demonstrate the value and benefits of moving away from hardware based arrays and towards software based architectures.
  • eSummit 3 Cyber-Forensics - an Overview of Intrusion Investigations eSummit 3 Cyber-Forensics - an Overview of Intrusion Investigations Dr. Gareth Owenson, Senior Lecturer, University of Portsmouth, Christopher Laing,(ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 41 mins
    Dr Gareth Owenson is the course leader for the Forensic Computing programme at the University of Portsmouth. He teaches extensively in forensics, cryptography and malware analysis. His research expertise is in darknets, where he is presenting working on alternative approaches that may lead to novel applications of the blockchain. Gareth also has a strong interest in Memory Forensics, and undertakes work into application-agnostic extraction of evidence by using program analysis.

    Gareth has a PhD in Computer Science (2007) and has taught at several Universities throughout the UK.
  • eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong? eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong? Matthias Maier, Security Evangelist EMEA, Splunk, Christopher Laing, (ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 46 mins
    Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.
  • eSummit 1 - How I learned to stop worrying and love forensics eSummit 1 - How I learned to stop worrying and love forensics Simon Biles, Digital Forensic Analyst, Forensic Equity Limited, Christopher Laing, (ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 49 mins
    There is no such thing as a "secure" system - we do our level best to design them as well as we can, to put controls and measures in place - but, at the end of the day, things can and do go awry. Today we are going to talk about Forensics, and how it is the opposite side of the coin from security. What can we do in advance to aid in forensic investigation? What do we do at the point of a compromise to allow us to preserve as much evidence as is possible? And, ultimately, how to we take a forensic analysis and learn from it to create a better system the next time?
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Recorded: Oct 25 2016 53 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Recorded: Oct 25 2016 62 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Recorded: Oct 25 2016 61 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Securing Hyperconverged Infrastructure Securing Hyperconverged Infrastructure Rohit Goyal, Nutanix Security PMM Recorded: Oct 25 2016 38 mins
    Security in the modern datacenter requires an evolved mindset and approach. In this technical webinar, Nutanix will provide deep insight into the latest security advancements engineered into the Nutanix enterprise cloud platform, and explain how these advancements can be leveraged to build the most secure environments for your applications and data. Join this webinar to learn security best practices and ask questions relevant to your organization.

    Nutanix offers defense in depth by embracing a security-first approach to platform design and development. The Nutanix enterprise cloud platform combines powerful features, including two-factor authentication and data at rest encryption, with a Security Development Lifecycle that is integrated into product development to help customers meet the most stringent security requirements. The Nutanix solution is certified across a broad set of evaluation programs to ensure compliance with the strictest standards.
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Recorded: Oct 25 2016 66 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Recorded: Oct 21 2016 36 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Data Governance: Behalten Sie die Kontrolle über Ihre Daten Data Governance: Behalten Sie die Kontrolle über Ihre Daten Stefan Girschweiler, Presales Consultant Recorded: Oct 21 2016 51 mins
    Data Governance definiert die Regeln und Prozesse für das Management der Daten im Unternehmen und hat die Aufsicht über alle Unternehmensdaten. Daten werden über mehrere Abteilungen hinweg eingesetzt und benötigen somit eine einheitliche Definition und zentrale Regeln zur Aufrechterhaltung der Datenqualität.
  • Hacktivism Culture: DDoS 101 Hacktivism Culture: DDoS 101 Larry Collins, Product Manager at HOSTING and James Askham, Solutions Engineer at CloudFlare Recorded: Oct 20 2016 48 mins
    The threat of Distributed Denial of Service (DDoS) attacks is a growing problem for mission-critical websites, such as eCommerce shops, SaaS applications, gaming forums, and University portals; in addition, politically or artistically important organizations and journalists can be especially at risk of attack, due to the nature of their website content.

    The company CloudFlare delivers DDoS protection to over 4,000,000 websites globally, from personal blogs to large enterprises, while also offering a free protection program for respected free speech, public interest, and civil society organizations, called “Project Galileo”.

    Join Larry Collins, Product Manager at HOSTING, and special guest, James Askham, Solutions Engineer at CloudFlare, on October 20th at 3 PM EST for the webinar Hacktivism Culture: DDoS 101. During the live event, they will go over:

    •What a DDoS attack is from a technical perspective
    •The most common types of DDoS attacks
    •Best practices for mitigating against these attacks and how CloudFlare’s “Project Galileo” protects political and artistic organizations.
  • Five Tips For Building a More Efficient Data Center Five Tips For Building a More Efficient Data Center Adam Roberts, Chief Solutions Architect, SanDisk Recorded: Oct 20 2016 60 mins
    The growth of data has put a strain on data center performance and efficiency. Solid-state-devices (SSD) are playing a significant role in increasing storage speeds and performance – but it’s not a simple plug and play solution. Join Adam Roberts, Chief Solutions Architect at SanDisk, to learn 5 tips to consider when looking to improve storage performance and data center efficiency with flash.
  • Gen 4 Attacks: Web Behavior Analytics to Protect Websites Gen 4 Attacks: Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Recorded: Oct 20 2016 58 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • Building A Superior XenDesktop Experience Building A Superior XenDesktop Experience Gunnar Berger, Citrix, Kenneth Wong, RPM Mortgage, Michael Thomason, Emory Health & Calvin Nieh, Pure Storage Recorded: Oct 20 2016 62 mins
    Learn how two customers have transformed end-user and VDI administrator productivity with Citrix XenDesktop and Pure Storage. Hear directly from Emory Healthcare and RPM Mortgage on how they have built and deployed a XenDesktop solution that delivers a superior end-user experience with management simplicity and a lower cost infrastructure.

    Featured Speakers:
    Gunnar Berger, CTO Office, Citrix
    Kenneth Wong, Sr. Network Engineer, RPM Mortgage
    Michael Thomason, Chief Technology Architect, Emory Health
    Calvin Nieh, Solutions Marketing, Pure Storage
  • All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price Patric Chang, SanDisk, Sr. Director Marketing Manager; Jack Poller, ESG Analyst; Jase McCarty, VMware vExpert Recorded: Oct 20 2016 46 mins
    Mission-critical databases and business applications serve as the lifeline of many organizations. Therefore, performance is tantamount. In this webinar we’ll review a recent ESG study that confirms running VMware Virtual SAN cluster with SanDisk® flash easily accommodates the performance and cost requirements of an enterprise-class virtualized OLTP database environment and delivers a better price/performance at the same time. Join Patric Chang, SanDisk, Technical Marketing Manager, Jack Poller, ESG Analyst and Jase McCarty vExpert from VMware to learn:

    1. Key features, highlights and benefits of VMware Virtual SAN 6
    2. Hybrid and All-Flash Virtual SAN Configurations with SanDisk SSDs
    3. Performance results (NOPM) of Hybrid and All-Flash VSAN
    4. Price/performance and comparisons between Hybrid and All-Flash Virtual SAN configurations
  • IT Automation with NSX Network Virtualization and Security IT Automation with NSX Network Virtualization and Security Mark Schweighardt, Director of Product Marketing, VMware and Andrew Voltmer, Sr Product Line Manager, VMware Recorded: Oct 20 2016 55 mins
    Today, enterprises are being held back by their physical networking and security infrastructure. Manual configuration decreases an enterprise's speed, agility, and security and increases the risk of downtime and security incidents due to errors. In this session we will cover automation solutions for NSX network virtualization and security. We will discuss how enterprises are automating provisioning and configuration management for their networking and security infrastructure and achieving more speed, agility, and consistency—with much better economics for their operating expenses.