Virtualization

Community information
Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
  • Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:
    •Enable automated security across multiple environments
    •Correlate IT and security incidents and respond accordingly
    •Ease security deployment and management for lower cost of ownership
  • User Environment Management (UEM) technologie zorgt ervoor dat alle gebruikers naar tevredenheid kunnen werken op ieder device, terwijl het de IT-omgeving en daarmee het beheer minder complex maakt. Vooral ook in een omgeving met een mix van fysieke en virtuele devices of een combinatie van meerdere devices, locaties of delivery methodes.

    Wil je weten of een UEM-oplossing toegevoegde waarde heeft voor jouw IT-omgeving? Schrijf je dan nu in voor de 5 technische webinars gehost door onze Pre Sales Consultants. Zij gaan in op de vijf belangrijkste redenen om de gebruikerservaring in jouw organisatie naar een hoger niveau te brengen en hoe je dat technisch gezien voor elkaar krijgt.

    Tijdens dit vierde webinar gaan we in op reden #4: Gebruikers willen gewoon dat het werkt. Naast het bespreken van de techniek, laten onze pre-sales door middel van een demo zien hoe je door middel van een UEM-oplossing de ervaring die gebruikers hebben als ze werken op hun systeem versnelt, waardoor de gebruikersacceptatie verbetert en de productiviteit wordt verhoogd. Door een efficiëntere distributie van het profiel- en applicatiebeleid, hoeven gebruikers niet meer te wachten op het laden van die delen van hun omgeving die ze (nog) niet nodig hebben. Daarnaast worden CPU-, geheugen- en schijfruimte op een slimme manier gealloceerd, user density verhoogd en de hardware-eisen verlaagd zodat de algehele kwaliteit van de IT-dienstverlening wordt verbeterd.
  • Chris Tsilipounidakis gives you an overview of the Tegile IntelliFlash dashboard and user interface. Explore the various widgets, learn how to gain additional insight into storage performance and capacity, and see how you can simplify storage administration with a Tegile Intelligent Flash Storage Array.
  • EMC XtremIO™ is an all-flash scale-out enterprise storage array that provides substantial improvements to I/O performance. ViPR SRM simplifies monitoring of XtremIO in SAN environments by collecting key indicators for performance and capacity from virtual guests to provide the insight to optimize storage investments and improve SLA’s. Watch this webcast to learn how you can gain improved visibility and insights to your XtremIO and multi-vendor storage infrastructure to maximize your ROI with:

    -Performance troubleshooting and analysis
    -Capacity planning, reporting and chargeback
    -Configuration compliance validation and alerting
  • The Top Five Best Practices for Controlling Third-Party Vendor Risks.

    Target, Home Depot, eBay — look at almost any of the seemingly never-ending string of mega-data breaches, and you’ll find a common thread. Stolen or compromised user credentials, belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack path. Often — in as many as two-thirds of cases — those credentials belonged to a third-party; a vendor or business partner who’s been granted internal access to your network. With those credentials in hand, attackers are free to roam about your IT infrastructure, seeking out and exploiting their ultimate goals. It’s a frustrating — and dangerous — challenge. You have to provide access to vendors, contractors, and business partners — but doing so often introduces unacceptable security risks.
    But these risks are manageable. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches. In this webcast, we’ll discuss:
    • The identity, access, and security governance processes needed to protect your network
    • How to ensure positive user identification to prevent credential theft and misuse
    • Techniques to limit access to only those resources required to satisfy work or business requirements
    • Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    • Establishing monitoring procedures that flag violations and speed forensic investigations
  • Cloud and data center security can be dauntingly complex, and selecting the right vendor to engage with is a critical decision for any enterprise. However, cloud and data center security can be a difficult market to navigate. Are vendors backing up their marketing claims? How do different approaches stack up next to each other? What factors need to be taken into consideration when comparing products? Trend Micro has teamed with analyst firm ESG to sort these questions out, and encourage organizations to think differently when it comes to cloud and data center security.

    ESG conducted an independent economic evaluation to investigate the differences between Trend Micro and traditional security approaches, and are conducting a live webinar to present their findings. ESG and Trend Micro will give insight into the cloud and data center security market, ESG’s Economic Value Validation methodology, and the conclusions that were reached about the value Trend Micro is providing to their customers. Join us to learn more!
  • Willbros, a leading infrastructure contractor serving the oil and gas industry, leverages Amazon Web Services (AWS) and Trend Micro Deep Security to quickly design and deploy agile, secure cloud solutions to protect their vital data. Moving to AWS allows organizations to leave their infrastructure behind and start fresh – architecting for flexibility and scalability. However, bottlenecks are created when traditional on-premises security approaches and tools are used. Learn how Willbros unleashed innovation in the energy industry by taking a greenfield approach to security in AWS. Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share their experience on how they achieved building robust and secure pipeline management systems in the cloud.

    In this webinar you’ll learn how to:
    - Architect a secure application using a combination of AWS services, Trend Micro services, and configurations
    - Understand how host-based protection improves application security, as well as agility and flexibility
    - How to protect workloads from attack, without hampering performance
  • With an ever-changing IT landscape and growing business demands, it’s time to expect more from your enterprise software. Dell Software delivers integrated, end-to-end solutions that simplify IT management while mitigating risks and accelerating results. Thanks to Dell Software, your workday is more efficient, and ends when it should – giving you the time to do the things you love.
  • Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • Smaller companies and enterprises face the same challenges when it comes to attracting top talent. Both need to offer the flexibility to work anywhere, anytime while retaining control of sensitive data and intellectual property. Desktop and application virtualization can solve this problem, but until now it had been too costly and complex to justify smaller deployments.
    Join experts from Cisco and discover how the Cisco UCS Mini with Nimble Storage offers a small business-ready infrastructure with enterprise power. You will learn how you can quickly and easily deploy 500 virtual desktops with XenDesktop/XenApp.
  • Infrastructure teams often struggle with determining the root cause of a performance problem when looking at complex cloud environments. Virtualization complicates this further since physical resources are shared by many virtualized applications leading to difficulties in determining the offender of the performance issue.

    EMC ViPR SRM provides comprehensive end-to-end monitoring, reporting, and analysis for heterogeneous storage and virtualized environments. Watch this webcast to learn how administrators can have a single pane of glass with simple correlation of all components of the infrastructure with ViPR SRM. ViPR SRM monitors the environment proactively to warn administrators of potential problems before they cause an outage.
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
  • Michael DePetro, Sr. Technical Delivery Manager, Americas PIM Practice, Informatica, brings 15+ years’ experience to the table in successful Master Data Management projects. Implementing a Product Information Management solution is not just installing an IT tool. PIM is a program enabler for information transformation in the enterprise for both Business and IT.

    In this webinar, Michael will share his expertise on key agilities when implementing PIM in order to drive business goals like omnichannel ready experience, faster time to market, operational efficiencies or regulation ready data.

    - Expectations
    - Change Management
    - PIM Enterprise Approach
    - Time Lines
    - Core Team Utilization
    - Partners in Implementation
  • This webinar will go through 10 proven ways to assure your business can be resilient to any sort of downtime event including disaster recovery as a service, instant recovery, recovery assurance, archiving, and other best practices.
  • Organizations need to be more business-centric in their approach if data loss prevention is to be successful. By supplying McAfee Data Loss Prevention (DLP) with reliable insight into the meaning and value of data, Classifier complements the detection methods based on keywords and regular expressions alone, helping reduce the risk of data- loss.

    The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of DLP decision making, improves system effectiveness and reduces false positives.

    In this webinar we will explore:

    - The role of user-driven classification
    - How user-driven classification benefits DLP
    - When to introduce user-driven classification into a DLP project
    - How to measure and monitor the benefits of user-driven classification
  • Complete and thorough network analysis is an underappreciated art. In today’s complex network environment, band-aid approaches are more the norm than thorough efforts to identify root cause of performance issues.

    In this webinar we will:
    - Review best practices used by top network pros to ensure optimal network performance
    - Share troubleshooting tips to stay ahead of today’s network challenges
    - Show the OptiView XG – a unique, all –in-one analysis tablet for today’s busy pros

    Register Today!
  • Willbros, a leading infrastructure contractor serving the oil and gas industry, leverages Amazon Web Services (AWS) and Trend Micro Deep Security to quickly design and deploy agile, secure cloud solutions to protect their vital data. Moving to AWS allows organizations to leave their infrastructure behind and start fresh – architecting for flexibility and scalability. However, bottlenecks are created when traditional on-premises security approaches and tools are used. Learn how Willbros unleashed innovation in the energy industry by taking a greenfield approach to security in AWS. Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share their experience on how they achieved building robust and secure pipeline management systems in the cloud.

    In this webinar you’ll learn how to:
    - Architect a secure application using a combination of AWS services, Trend Micro services, and configurations
    - Understand how host-based protection improves application security, as well as agility and flexibility
    - How to protect workloads from attack, without hampering performance
  • Lifecycle service orchestration (LSO) is a key enabler to deliver Network as a Service as defined in the MEF’s Third Network vision. The objective of the Third Network is to provide an on-demand cloud-centric experience with unprecedented levels of user control over the network’s capabilities. Such capabilities are orchestrated between physical and virtual service endpoints across multiple networks and technology domains.

    This webinar will discuss the MEF work to define the complete service lifecycle requirements to deliver Network as a Service from ordering through service activation including supporting APIs. We also will share highlights from a joint survey conducted by the MEF and the Rayno Report that (1) benchmarks where service providers are in terms of evolving data service portfolios toward more dynamic solutions and (2) sheds light on network operator views about how lifecycle service orchestration can be applied to overcome operational support system (OSS) challenges as they transition to SDN and NFV-enabled networks.
  • Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?

    Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:

    -Top peer challenges, according to leading industry research
    -What the future holds for the competing data storage architectures
    -The difference between converged and hyper-converged infrastructures
    -Best and worst use case for SDS

    How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
  • The rise of processing power and steady development of supercomputers have allowed Computational Fluid Dynamics (CFD) to grow out of all recognition. But how has this affected the Data Center market – particularly in respect to cooling systems?

    The ideal DCIM system offers CFD capability as part of its core solution (rather than as an external application), fed by real-time monitoring information to allow for continuous improvements and validation of your cooling strategy and air handling choices.


    Join DCIM expert Philippe Heim and leading heat transfer authority Remi Duquette for this free webinar, as they discuss:
    •Benefits of a single data model for asset management
    •Challenges of real-time monitoring
    •Some of the issues in CFD simulation, and possible solutions
    •How CFD can have a direct, positive impact on your bottom line

    Note: All attendees will have access to a free copy of the latest Siemens White Paper: "Using CFD for Optimal Thermal Management and Cooling Design in Data Centers".