Virtualization

Community information
Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.

Webinars and videos

  • In this session, we’ll introduce our cloud desktop offering and discuss how businesses are using this technology to drive down support costs, improve security, and create business agility. Additionally, we will discuss some best practices around planning and implementing a cloud desktop strategy.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Präsentiert von:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderiert von:
    Ashwin Viswanath, Informatica Cloud
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Décrouvrez les solutions Networking Dell, Convergence, 10Gb et administration centralisée
  • Dell Présente lors du CRIP une approche concrète des PRA/PCA en 90 secondes
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • Software-defined networking offers the potential for an open network platform, hosting diverse applications, running over multiple technologies and vendors’ equipment. Openness is arguably the key to widespread SDN adoption, and the elusive goal of multi-vendor interoperability.

    This session will address the implications of Openness on SDN, including the evolving role of standards and OpenSource Software, including an examination of why the Open Networking Foundation, Network Functions Virtualization, and OpenDaylight are indicative of the future of networking.
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • Scientists at CERN deployed PowerEdge C class servers to increase computing power and process data from the CMS experiment at the world-famous Large Hadron Collider (LHC) as they searched for the Higgs boson.
  • "Technology underpins everything at the Glasgow 2014 Commonwealth Games, and Dell plays an integral part, providing an end-to-end solution comprising all of the laptops, desktops, servers, storage and services we need"
    Brian Nourse, Chief Information Officer, Glasgow 2014 Commonwealth Games, United Kingdom
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • Every application, email, web page and Internet connection relies on information encapsulated into a data packet that can be easily distributed across networks. These packets include information about the sender and receiver, as well as the actual contents, or payload. By manipulating pieces of the packet data, criminals can infiltrate networks, applications, data centers, and individual computers.
    How do you defend your network against advanced threats that manipulate data at the packet level? Join McAfee for a revealing presentation on the current state of threat prevention. Find out why you should be using deep packet inspection (DPI) for protocol identification, normalization, and data stream-based inspection to detect and block threats, in both clear-text and encrypted connections. And stop Advanced Persistent Threats (ATP) that rely on packet manipulation to thwart most common firewall and IPS defenses.
  • Nos puissantes solutions de gestion des événements et des informations de sécurité (SIEM) associent des données sur les événements, les menaces et les risques pour offrir une connaissance approfondie de l'état de la sécurité, une réponse rapide aux incidents, une gestion transparente des journaux ainsi qu'une fonction de génération de rapports de conformité extensible. Produit phare de notre offre SIEM, McAfee Enterprise Security Manager assure la consolidation, la corrélation, l'évaluation et la hiérarchisation des événements de sécurité pour les solutions McAfee et d'autres éditeurs. Composant essentiel de notre cadre d'implémentation Security Connected, McAfee Enterprise Security Manager s'intègre en toute transparence avec le logiciel McAfee ePolicy Orchestrator (McAfee ePO), McAfee Risk Advisor et Global Threat Intelligence afin de fournir le contexte nécessaire à une gestion des risques de sécurité autonome et adaptatif.
  • Deploy your own cloud based business fully supported by the industry leaders - Dell, OnApp and Peer1
  • As your customers and partners become increasingly global, managing the end user experience all over the world becomes increasingly challenging as well. The reality is that sometimes even when your webservers, networks and SLAs are telling you everything is ok, they might be pulling their hair out at the other end!

    With a growing number of applications being SaaS based or delivered by a managed service provider, and being accessed anywhere and anytime via mobile devices, how do you truly understand what's going on outside your own datacenter and firewall when it comes to the end user experience?

    Join Simon Campbell, Senior Consultant from CA Technologies to learn how you can precisely identify how your cloud, web or mobile applications are responding for users all over the world to give you the complete 360 degree global picture so you can quickly, easily and very cost-effectively isolate end-user experience problems down to local connectivity, page or performance issues or your own service provider and prevent a severe case of customer experience jetlag!

    In addition, this session will also cover how to:
     Manage your end user experience around the world far more proactively and effectively
     Manage the "3am problem" and test performance even when there is no live traffic
     Extend your global performance monitoring to your own Datacenters or Secure FTP
  • Join this webinar on Endpoint Security as we:
    •Understand what AMT-enabled hardware offers
    •Hear how AMT hardware can improve our ability to manage an endpoint
    •Highlight important use cases that are enabled when management extends beyond the operating system
    •Discuss how ePO can be used to easily configure AMT
  • Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware presents a hatful of challenges that your infrastructure team might not have thought about.

    In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:

    (a) Introduction to scalability techniques: clouds from a hardware perspective.
    Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.

    (b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.

    Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.

    You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware.
  • Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

    Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
  • This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • - Cache is not just for virtualization anymore (actually it never was)

    Server and Desktop virtualization capture a lot of attention from storage vendors these days, especially Flash or SSD vendors. Server-side flash solutions have vaulted into the market lead and are the most commonly implemented method to solve virtualization performance issues. While the value of using server-side flash is undeniable, the fact remains that most data centers have large numbers of bare metal servers that also require high performance.

    Join us for our live webinar in which experts from Storage Switzerland and SanDisk discuss how to analyze these bare metal systems to determine if they can benefit from a flash based performance boost and which of the many flash options available are best for them (Shared Flash, Server Side Flash or Server Side Caching).

    The live event will be held on April 30th at 1PM ET, 10am PT so sign up now and get your exclusive white paper today!
  • High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.

    HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
  • Join us for a 30 minute webcast on May 1st, 2014 and learn how EMC Isilon provides an efficient and scalable storage solution to help manage unstructured data growth. Isilon’s scale-out NAS platform, in conjunction with the OneFS OS, provides a highly reliable and efficient infrastructure that easily scales in both capacity and performance.

    In this free webinar, we'll show you how you can:
    - Provide access to data anytime, anywhere, and from any device
    - Use data analytics to gain new insight that can accelerate your business
    - Maximize cloud-based capabilities for greater efficiency and flexibility
    - Scale capacity and performance easily and as needed – with no change in an administrator's time or efforts as storage grows

    Don't miss out on this opportunity, we look forward to having you attend!
  • The Next Generation Data Center is HERE. These data centers are highly virtualized environments with extremely high virtual machine densities. They thrive on flexibility and cost efficiency. While most of these data centers are in the hands of cloud service providers (CSPs), more traditional enterprises see the benefits of the next generation data center and are adopting much of the CSP mentality. Because of their levels of VM density, these data centers change the storage I/O dynamic and essentially make the traditional storage array obsolete.

    In our upcoming webinar "The Storage Requirements for the Next Generation Data Center" join experts from Storage Switzerland and SolidFire to learn:
    1. What is the Next Generation Data Center?
    2. Why are Next Generation Data Centers ‘The End Game’ of IT?
    3. How Do Next Generation Data Centers Break Storage?
    4. How Does Storage Need to Change to Keep Up?

    All pre-registrants for this webinar will receive an exclusive, advanced copy of Storage Switzerland's latest white paper "How to Design Storage for the Next Generation Data Center" emailed right after they sign up.
  • Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.

    1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
    2)Leverage McAfee ePO to automate DLP policies based on situational awareness
    3)See how McAfee DLP and ESM work together to provide real-time data protection
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • In an increasingly connected world, your data gets around - often times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information

    Join the webinar on DLP and learn about:
    •The new cool features in the latest DLP release.
    •How to stay ahead of threats without guesswork or trial and error.
    •Use cases on leveraging the synergy between the different McAfee Data Protection technologies.

    Don't miss out the opportunity to hear from data protection experts on how to protect your data in the modern organization!
  • From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That’s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization.
  • This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

    Gordon Beith, Director of Product Management at VSS Monitoring, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
    • Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
    • Metadata versus flow statistics versus full packet capture – considerations and use cases for each
    • Open versus proprietary formats for storage
    • Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
    • Addressing retrieval in an “open” forensics model
    • Leveraging a distributed computing framework for processing large-scale data stores
  • Choosing the best network security solution for your organization can be complicated. Many organizations turn to third party analysts, each offering their unique perspective and insight, to help narrow the choices. However, their different viewpoints and methodology can make it difficult to understand.

    Nat Smith, Director of Network Security at McAfee, will discuss NSS Labs' 2014 Security Value Map for Data Center Intrusion Prevention Systems (IPS) and also touch on other third party analysts reports on IPS, each with a keen value when understood in context.
  • McAfee and Norse present: Combating Advanced Cyber Threats with McAfee Global Threat Intelligence (GTI) and Norse Dark Threat Intelligence

    Threat intelligence is a critical tool in the never-ending struggle to protect the world’s networks, but many threat intelligence solutions lack visibility into the parts of the Internet where bad actors operate—the darknets. As the effectiveness of these solutions declines, organizations are exposed to increased risk of security breaches, data ex-filtration, and loss of reputation and revenue from today’s advanced cyber threats.
    McAfee and Norse have developed an integrated threat intelligence approach leveraging the strengths of McAfee GTI along with Norse’s unique ability to provide visibility into the darknet and dark web. This integration of McAfee Network Threat Response Cloud Analysis and Deconstruction Services with Norse IPViking provides the strongest web-based reputation protection available against botnets, distributed denial-of-service (DDoS), and advanced persistent threats. When combined in an automated fashion with machine-to-machine interface, users now have a single-pane-of-glass with rich context to track new organizational threats not detected through traditional means.
    Join McAfee and Norse to learn about:
    •The value of Dark Threat Intelligence and its role in preventing compromise and data breaches
    •Threat intelligence-based strategies for advanced threat prevention and detection
    •Using threat intelligence to streamline and improve the incident response process
  • Target Stores has invested millions in "next gen" cyber security and had received PCI certification. And yet hackers compromised its systems and credit card data during the busy retail holiday season. Over 70 million people were impacted. Join Ken Donze/Senior Engineer - Trend Micro as he outlines the breach, how people and processes were impacted, and how warnings and false positives were overlooked. As more and more firms consolidate data centers and invest in new solutions, how can human error and social engineering be mitigated and risks managed? How can organizations balance risk and security investment? What Best Practices and controls are recommended?
  • Despite advances in project management a surprising number of projects still fail by missing budget and timing goals, not delivering real business value or in other ways. Managers also still struggle with visibility into the entire portfolio and with communicating program status and success with stakeholders. Implementing a Project and Portfolio management toolset in the enterprise has proven to be one of the fastest IT payback investments and highest first-year Returns on Investment (ROI) available. In this session you will learn how others have implemented a toolset and improved their business results right away. You’ll also hear about a proven approach that focuses on performance, adoption, and simplification and how that will accelerate the benefits of a holistic approach to project and portfolio management.

    Join Jay Krackeler, an HP Product Manager with extensive experience in this space and Russ King, from HP Partner ResultsPositive, for an informative session packed with real-world examples from companies across a variety of industries.
  • McAfee offre la sécurité, la flexibilité et le contrôle avancés dont les entreprises ont besoin pour tirer le meilleur parti de l'environnement web.
  • This session will cover the integration between Cisco Prime Service Catalog and Red Hat OpenShift. The result of this partnership is a new innovative tool that enables end users to order and take delivery of fully configured application stacks from a unified self-service portal. In this session you will learn:

    •What is an application blueprint and how it enables automated deployment of application stacks in a consistent manner
    •How Cisco Prime Service Catalog delivers a single pane-of-glass for all users to provision, configure and manage complete application stacks
    •How configure complete application stacks including the underlying components such as network services
    •Auto-scaling and load balancing capabilities of this solution relieve developers of the need to recreate platform services for each application
  • Many vendors are rushing to bring malware protection systems to market, but today’s advanced malware is stealthy and can often evade these systems. Organizations need a more comprehensive approach that looks beyond behavior seen in the sandbox, uncovering the hidden danger in malware's latent code.

    Anne Aarness, Senior Manager at McAfee, explains how McAfee Advanced Threat Defense combines in-depth static code and dynamic malware analysis for a comprehensive malware protection system. Combined, this represents the strongest advanced anti-malware technology in the market, and effectively balances the need for both security and performance.
  • A number of companies are helping to build the green Internet by committing to power their operations with 100 percent renewable energy. Find out who is doing it and how they are doing it, in this talk from Greenpeace’s, Head of Technology, Andrew Hatton

    - Cloud Energy Snapshot
    A quick look at the different energy sources powering the internet today across the globe

    - Your Roadmap to a Green Internet
    The IT sector has made substantial progress in driving innovation in data centre and server energy efficiency design in the past 5-plus years, yet there is more to do.

    Here we look at the key ingredients for any company which wants to build their part of the internet with renewable energy.

    - Your own online world: Green in Real Life or #Dirty
    From social media to music, streaming video, we are increasingly moving much of our lives online. That means a lot of new data to store. But where is that databeing stored, which companies are storing it, and what kind of energy are they using?

    - Green Internet leaders and best practice
    Find out which companies have committed to a goal of powering data centres with 100 % renewable energy. Find out which organisations are providing the early signs of the promise and potential impact of a renewably powered internet.