Hi [[ session.user.profile.firstName ]]

Virtualization

  • Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product Manager Recorded: Mar 20 2019 45 mins
    Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

    Join us live Wednesday, March 20 @10AM PST to learn

    * Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
    * How to set triggers based on thresholds important to your business
    * Set feature flags to control specific parts of your environment to reduce stress levels.

    See a Honeycomb demo, ask questions and learn more.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 19 2019 42 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • How to Create an Infrastructure-less Backup Strategy
    How to Create an Infrastructure-less Backup Strategy
    Storage Switzerland, Actifio Recorded: Mar 19 2019 56 mins
    Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for shorter recovery times and new threats like ransomware. The cost for IT to design, implement, maintain and upgrade these infrastructures can consume a big part of the IT budget. Additionally, the time required for each of these steps is something that most IT teams simply don’t have.

    As a result, many organizations are looking for ways to move to an infrastructure-less architecture where most of the physical hardware is in the cloud as well as the software intelligence. The goal is to move data protection from a very unpredictable CAPEX cost to a normalized OPEX cost. There are an increasing number of cloud solutions that claim an infrastructure-less solution but many of these solutions force the organization to give up many of the capabilities they’ve come to count on or force them into long-term cloud relationships.

    Attendees to the webinar will learn the challenges of maintaining an on-premises infrastructure, why current cloud solutions fall short and what IT really needs from an infrastructure-less solution.
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Mar 19 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • Aporeto + Digital Anarchist: RSA Conference 2019 Interview with Jason Schmitt
    Aporeto + Digital Anarchist: RSA Conference 2019 Interview with Jason Schmitt
    Jason Schmitt Recorded: Mar 19 2019 9 mins
    Aporeto CEO, Jason Schmitt discusses cloud security trends and risk management with Digital Anarchist at RSA Conference 2019 in San Francisco.
  • 5G READY: SECURE AND MODERNIZE YOUR 4G/LTE NETWORK
    5G READY: SECURE AND MODERNIZE YOUR 4G/LTE NETWORK
    Paul Nicholson, Sr. Director of Product Marketing, and Yasir Liaqatullah, VP of Product Management at A10 Networks Recorded: Mar 19 2019 56 mins
    Most mobile operators are moving ahead with their 5G plans, some tentatively and others aggressively. Those who don’t act, face the very real prospect of being left behind in the greatest technology transformation in decades.

    To Modernize your 4G/LTE networks for 5G, we will outline four strategic investments that mobile operators should consider today while delving into the myths and realities around them. These four areas are:
    •Upgrading network management
    •Consolidating network functions
    •Boosting security at key protection points
    •Virtualizing network functions

    In the security portion of this webinar, we also spotlight key concerns where modern Gi/SGi firewalls and advanced machine learning powered DDoS protection are essential. By carefully investing in upgrades to support specific 5G use cases, network operators can monetize their near-term investments and at the same time modernize the existing infrastructure in preparation for the eventual migration to a full 5G architecture.
  • How to Leverage the Cloud to Consolidate IT Infrastructure
    How to Leverage the Cloud to Consolidate IT Infrastructure
    Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, Nasuni Recorded: Mar 19 2019 35 mins
    Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.

    With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:

    - How the business strategy drove TBWA to the cloud
    - What key decisions enabled them to reduce costs and meet capacity requirements at the same time
    - How they went about a worldwide roll-out of their cloud storage strategy
    - Why multi-cloud capability is important
  • Open Demo: Network Automation with Ansible, March 18
    Open Demo: Network Automation with Ansible, March 18
    Eric McLeroy Recorded: Mar 19 2019 59 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
  • The Advantages of Filtering Applications
    The Advantages of Filtering Applications
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)² Recorded: Mar 19 2019 55 mins
    Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

    Join us for this webinar to learn more about how you can:

    •Ensure that the Application traffic regardless of port spoofing gets to the right tool
    •Improve tool efficiency by discarding irrelevant Application traffic
    •Filter the traffic based on the application rather than the IP & Port
  • SUSE Enterprise Storage 6 Beta Overview
    SUSE Enterprise Storage 6 Beta Overview
    Lars Marowsky-Brée, Architect; Vincent Moutoussamy, Beta Program Manager & Holger Sickenburg, Technical Project Manager, SUSE Recorded: Mar 18 2019 53 mins
    This webinar will give you an opportunity to hear about the Beta testing program for the next release of SUSE Enterprise Storage 6. We will give an overview of the SES 6 release schedule, an overview of key features, and a demo installation.
  • Migrate from Teradata to Azure SQL DW in Six Simple Steps with Datometry
    Migrate from Teradata to Azure SQL DW in Six Simple Steps with Datometry
    Mike Waas | Datometry, Inc., Daniel Yu | Microsoft Corp., Deepak Patel | Datometry, Inc. Recorded: Mar 14 2019 47 mins
    Enterprises now have an easier way to take their existing Teradata applications to Azure SQL DW. Azure SQL DW has the scale and elasticity required to match the demands of enterprise workloads. Datometry software suite enables Teradata applications to run natively on Azure SQL without changing SQL or Business logic.

    The webinar will detail key insights from experts who have successfully implemented the six step replatforming plan from Datometry.
  • Operationalize Data Movement to Supercharge Your Architecture
    Operationalize Data Movement to Supercharge Your Architecture
    Julian Ereth - Research Analyst - Eckerson Group | Arvind Prabhakar - Co-Founder & CTO - StreamSets Recorded: Mar 14 2019 59 mins
    DataOps borrows concepts from agile development to streamline the process of building, deploying and operating dataflow pipelines at scale. Putting DataOps into action requires not only the right technology, but more broadly a thoughtful approach to align the people and the process behind such an initiative.

    Eckerson Group research analyst Julian Ereth join StreamSets' Co-Founder and CTO, Arvind Prabhakar to explore the emerging trend of DataOps.

    During this webinar, we will discuss:

    -Principles and benefits of DataOps
    -Common DataOps use cases
    -Practical guidelines for putting DataOps into action
    -How StreamSets can help on a DataOps journey
  • Data Protection on HCI Should be Simple
    Data Protection on HCI Should be Simple
    Paul Nashawaty - Product & Solution Marketing at HYCU | Mayank Gupta - Product Marketing at Nutanix Recorded: Mar 14 2019 46 mins
    Hyper converged infrastructure (HCI) has completely disrupted the enterprise datacenter by breaking down silos to make management of the entire storage, network and compute stack simple and flexible. A data protection solution purpose built and integrated with HCI will make data protection management easy enough for any generalist to handle yet powerful enough for even the most extreme recovery requirements.

    Join us for this webinar to hear how a customer has implemented Nutanix AOS and Hycu data protection for an integrated and protected HCI solution.

    • Simplified data protection for AHV & ESX
    • Optimal protection leveraging Change File Tracking (CFT) for Nutanix Files
    • Eliminate IT silos
  • Three Steps to Modernizing Backup Storage
    Three Steps to Modernizing Backup Storage
    Storage Switzerland, Cloudian, Veeam Recorded: Mar 14 2019 48 mins
    Backup software is continuously improving. Solutions like Veeam Backup and Replication deliver instant recoveries, enabling virtual machine volumes to instantiate directly on the backup device, without having to wait for data to transfer back to primary storage. These solutions can also move older backups to higher capacity, lower cost object storage or cloud storage systems. To deliver meaningful performance during instant recovery without exceeding the backup storage budget requires IT to re-think its backup storage architecture.

    Modern backup processes need high performance, low capacity systems to deliver high-performance instant recovery, as well as high-capacity, modest performance systems to store backup data long term and software to manage data placement for the most appropriate recovery performance while not breaking the budget.
  • Building Blocks for Your 2019 IT Security Program
    Building Blocks for Your 2019 IT Security Program
    Danielle Russell, Group Product Marketing Manager, AlienVault; Amy Pace, Principal Product Marketing Manager, AlienVault Recorded: Mar 14 2019 51 mins
    Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast and demo of the AlienVault Unified Security Management (USM) platform to learn how solutions from AlienVault, an AT&T Company, can help you to:

    - Determine your current security posture and make a prioritized plan for improvement
    - Centralize security monitoring across multi-cloud and on-premises environments
    - Automate threat detection and incident response activities for improved efficiency
    - Consolidate your regulatory compliance requirements to help accelerate audit readiness
    - Maintain continuous security monitoring all year long

    Register today to reserve your seat. Here's to a secure 2019!
  • Cyber Security: Keeping Ahead of the Game with Micro Focus
    Cyber Security: Keeping Ahead of the Game with Micro Focus
    Darren Blumenthal, Stan Wisseman Recorded: Mar 14 2019 60 mins
    Join us to hear about the hot new technology trends and topics in the world of cyber security and how Micro Focus tools can help you stay ahead of the game with your cyber hygiene.

    This webinar is the first of its kind, as we are combining the Vivit Automation & Cloud Builders Special Interest Group and the Vivit Security Special Interest Group. This gives us an opportunity:

    •To align our thoughts and common practices
    •To learn from each other
    •To ensure we are all being cyber resilient
  • Hybrid-Converged Infrastructure: Deploying HCI 2.0 with Existing SANs
    Hybrid-Converged Infrastructure: Deploying HCI 2.0 with Existing SANs
    Enrico Signoretti Analyst, GigaOm Research Manish Chacko Sr. Product Manager, DataCore Recorded: Mar 13 2019 61 mins
    Hyperconvergence is now adopted by an ever-growing number of enterprises because of its simplicity, but others don’t like it because of its lack of efficiency, or because they do not find it flexible enough to answer to all of their workload needs.

    Yet, it is not always possible to get everything you want. However, technology and products are quickly maturing, and now enterprises can ask for much more.

    Attend this free GigaOm webinar featuring experts in enterprise data storage and IT infrastructure, including GigaOm Analyst, Enrico Signoretti and DataCore’s Sr. Product Manager, Manish Chacko, discussing innovative solutions for infrastructure strategies.

    Attendees will learn innovative infrastructure strategies and explore solutions from both technical and business perspectives, including:

    The good, the bad and the ugly of hyper-convergence
    - Trade-offs of hyper-convergence
    - Evolution of hyper-convergence and benefits for the end users
    - New options that allow a smoother migration path to hyper-convergence
    - The next major features to expect from an HCI platform

    Join GigaOm and DataCore for this free expert webinar!
  • Achieving IT Modernization and Flexibility Without the Pain of Migrations
    Achieving IT Modernization and Flexibility Without the Pain of Migrations
    Scott Sinclair, Sr. Analyst - Enterprise Strategy Group & Alfons Michel, Sr. Product Marketing Manager - DataCore Software Recorded: Mar 13 2019 60 mins
    Data is a strategic weapon of any institution or business. But, if you’re not leveraging it, then it can be a massive competitive disadvantage in the industry!

    So how can you, and your IT organization, gain this advantage? A transformation must occur.

    Maximizing IT infrastructure flexibility is paramount to keep pace in this newly formed digital age. But typically, any major change in your IT infrastructure, besides costs, requires risky, time consuming and disruptive data migrations. So how to overcome this obstacle?

    Join our brief webinar and Q&A at the end to hear more about the background, drivers and enablers to achieve IT modernization and flexibility without the pain of migrations. In other words: to disrupt without disruption. Experts from ESG and DataCore will jointly look at the challenges associated with the need of IT modernization and how it can be accomplished – within budget and without any disruption for your operations.

    Learn more about the hold-backs and how to overcome them, because there is nothing more constant than change. Join us to discover:

    • The need for change and transformations in IT
    • Seamless introduction of new technologies
    • Seamless migration options (e.g. to hyperconvergence)
  • From Photojournalism to Drone Journalism: One Woman's Journey Piloting Drones
    From Photojournalism to Drone Journalism: One Woman's Journey Piloting Drones
    Gail Orenstein Recorded: Mar 13 2019 51 mins
    Gail Orenstein is an award winning photojournalist & drone journalist covering humanitarian areas and conflict zones. She is an FAA and CAA licensed commercial UAV pilot and has droned in 21 countries. She is a speaker and educator and a champion of women's issues.

    Her work is globally recognised and can be seen on CNN, BBC, Time, Aljazeera and The times of London. Join Gail in this live webinar as she discusses:

    - Taking her career from photojournalism to drone journalism and being one of the first females to do so
    - The hero of "fake news" and how drone journalism can save news
    - Why a female perspective is critically needed in the drone industry
  • Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions
    Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Mar 12 2019 40 mins
    Managing sensitive financial information and combatting cyberthreats often means finding efficiencies to do more with less. Modestly staffed IT teams often find themselves overwhelmed and challenged to complete projects that benefit the top line while also improving their cybersecurity maturity and meeting compliance obligations.

    With such a wide breadth of responsibility, how can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing or building an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Concerns we will address:

    1. Doing more with less: how to free up resources to accelerate projects affecting the top/bottom lines.
    2. How is SOC-as-a-service different than conventional managed security service provider offerings.
    3. Obtaining visibility across on-premises and cloud (SaaS and IaaS) environments

    Save your seat now!
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media Recorded: Mar 12 2019 55 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:

    •Discover applications that you didn’t even know were running on your network
    •Increase overall performance of your network and shared components
    •Spot potential security vulnerabilities before they become a problem

    Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
  • Why The Edge is Demanding Next Generation Network Fabrics
    Why The Edge is Demanding Next Generation Network Fabrics
    George Crump Recorded: Mar 12 2019 17 mins
    Edge Computing, often referred to as Distributed Cloud, is becoming a requirement for a set of new application use cases revolving around IoT, AI/ML and other new technologies requiring ultra low latency, data thinning to reduce bandwidth costs, autonomy, and privacy. These drivers mean that data center operators need to rethink their networking infrastructure as they plan for and deploy edge compute which will result in an explosion of mini- and micro-data centers. New approaches leveraging open networking, next generation SDN fabrics and network automation are required to simplify, manage and troubleshoot their increasingly distributed network infrastructures.

    Join Storage Switzerland's Lead Analyst, George Crump and Pluribus Network's Mike Capuano for our on demand Lightboard webinar, "Using Next Generation Network Fabric for Your Distributed Cloud."
  • Extend Equipment Life and Optimize Service Efficiency with AylaIQ
    Extend Equipment Life and Optimize Service Efficiency with AylaIQ
    Sahir Sait, VP, Product Management, Ayla Networks and Uday Tennety, Head of Global Product Alliances, AI/ML and IoT, AWS Recorded: Mar 12 2019 47 mins
    Are you a product or service professional or division executive facing challenges of managing and maintaining your install base of assets, as well as improving performance and utilization? Existing technology solutions are costly, cumbersome to deploy and don’t provide real time performance insights.

    Ayla Networks and Amazon Web Services (AWS) join together to discuss how AylaIQ, a new and incredibly simple diagnostic plug-in solution supported on AWS cloud services, works in transforming asset management.
  • 3 Steps to be a Storage Superhero - How to Slash Storage Costs
    3 Steps to be a Storage Superhero - How to Slash Storage Costs
    Storage Switzerland, SolarWinds Recorded: Mar 12 2019 56 mins
    Reducing or a least slowing the growth of storage costs is a top priority facing IT organizations in 2019. In this live webinar with Storage Switzerland and SolarWinds, you will learn the three steps IT professionals can take to lower storage costs WITHOUT buying more storage (the typical vendor answer). The biggest challenges are that IT professionals don't arm themselves with the tools they need to be successful, take the next step in their career path and of course, save their company money.

    Join us for our live interactive webinar and learn:

    1. How to Eliminate/Resolve Storage Problems - Not Throw Hardware at the Problem
    2. Plan and be prepared for capacity growth and performance demands
    3. How to manage multiple vendor's storage systems without replacing them
  • The Evolution of DataOps at GSK (GlaxoSmithKline)
    The Evolution of DataOps at GSK (GlaxoSmithKline)
    Chuck Smith - VP of Data Strategy - GlaxoSmithKline | Bryan Duxbury - Chief Technologist - StreamSets Mar 21 2019 5:00 pm UTC 58 mins
    GlaxoSmithKline is a pharmaceutical company that has pioneered a transformation of its R&D data and analytics infrastructure. Creating a new drug can take anywhere from 8 years to 20 years for a pharmaceutical company and GSK aimed to shorten that development time by giving over 8,000 scientists access to trial data. GSK is focused on bringing siloed data together into a primary data and information platform where users across the enterprise can consume all the data in different ways.

    In order to deliver these capabilities GSK has set up a Center of Excellence (COE) around data delivery and dataops. The team is responsible for dynamically scaling its data flows to meet the demands of new data sources. They have evolved the data practices over time to automate aspects of data acquisition and delivery utilizing bot-driven pipelines.

    VP of Strategy at GSK Chuck Smith joins us for a look at the solution and talks about the future.

    During this webinar, we will discuss:

    -Building a DataOps practice
    -High-level solution and architecture overview
    -Best practices for automation
  • Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of Carmel Mar 21 2019 6:00 pm UTC 60 mins
    Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.

    Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.

    The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.

    Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.

    In this webcast you will discover how City of Carmel:
    • Has experienced 100% uptime for nearly 10 years
    • Extended their storage life expectancy by 80% and saved $75k
    • Replaced every storage component without doing a forklift and replace
  • SUSE und Protosoft: Software Defined Storage - schlüsselfertiges Komplettsystem
    SUSE und Protosoft: Software Defined Storage - schlüsselfertiges Komplettsystem
    Thomas Grätz, Sales Engineer, SUSE Linux GmbH, Michael Hojnacki, Geschäftsführer, ProtoSoft AG Mar 22 2019 9:00 am UTC 60 mins
    Mit der digitalen Transformation setzt sich das Datenwachstum ungebremst fort. Softwarebasierte-Storage-Lösungen sind die optimale Antwort auf steigende Datenmengen und wachsende Anforderungen an Datenspeicher. Günstiger und skalierbarer als konventionelle Lösungen werden sie hohen Ansprüchen an Verfügbarkeit und Performance gerecht. SUSE Enterprise Storage bietet eine offene Technologie auf Ceph-Basis, die selbstverwaltenden Speicher, praktisch unbegrenzte Skalierbarkeit und höchste Verfügbarkeit kombiniert.

    Als langjähriger SUSE-Partner hat ProtoSoft gemeinsam mit SUSE ein schlüsselfertiges Komplettsystem bestehend aus Soft- und Hardware für den Einsatz vor Ort oder im Rechenzentrum konzipiert. ProtoSoft Enterprise Storage ist ein vorkonfiguriertes System inklusive aller nötigen SUSE-Subskriptionen, 12 Monaten Priority Support sowie Vor-Ort-Installation, das für alle Storage-Aufgaben im Unternehmen oder im Data Center gerüstet ist. Im Webinar geben wir Ihnen Einblick in die neuesten Benchmark-Tests. Melden Sie sich jetzt an!

    Agenda im Überblick
    •SUSE + Protosoft: eine erfolgreiche Partnerschaft
    •Warum Software Defined Storage?
    •Vorstellung der Hardware- und Software-Konfiguration
    •Benchmarks der Konfigurationen
    •Neuerungen in SUSE Enterprise Storage 5.5 und Ausblick auf SUSE Enterprise Storage 6
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Mar 25 2019 5:00 pm UTC 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • SUSE Enterprise Storage 5.5运维以及常用命令讲解
    SUSE Enterprise Storage 5.5运维以及常用命令讲解
    杨冬冬 Mar 26 2019 6:30 am UTC 60 mins
    运维的科学性是存储系统健壮运行的重要支持,运维的时效性是衡量一个存储系统的重要指标,运维的标准化是存储系统拓展的重要支持。SES5.5分布式存储系统,通过saltstack和deepsea交付完整高效的运维体系和常用命令,针对常见故障,系统运维人员可直接通过预置的系统命令完成日志分析、故障处理,减少系统宕机时间,提高数据的可靠性。同时,SES5.5针对硬件保养、按计划检修等日常硬件时间处理,提供了完整的上下电操作命令和操作规程,确保存储系统持续健康运行。SES5.5以其高效科学标准的运维支持,很好地保证了存储系统的拓展性、持续性、可靠性。
  • Cyberattacks: Q1 Review and Emerging Trends
    Cyberattacks: Q1 Review and Emerging Trends
    Kelvin Murray, Threat Expert, Webroot Mar 26 2019 11:00 am UTC 60 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Threat expert as he discusses topics such as:

    •The rise of information stealers
    •The changing face of ransomware
    •Relentless phishing attacks
    •The theft, trade and cracking of passwords
  • Active EDR - Automated Investigation with Artificial Intelligence
    Active EDR - Automated Investigation with Artificial Intelligence
    Jared Phipps, Worldwide Technical Director, SentinelOne, Brandon Dunlap, Moderator, (ISC)² Mar 26 2019 1:00 pm UTC 60 mins
    If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.

    The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.

    Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:

    - Eradicate benign alert noise, focus on what’s important.
    - Optimise threat hunting time with curated and focused story lines.
    - Maximise staff efficiency and let staff become expert threat hunters.
  • Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Zahid Ghadialy, Sr. Dir., Strategic Mktg and 3G/4G Blogger and Babak Jafarian, Dir, Strategic Business Communications Mar 26 2019 3:00 pm UTC 60 mins
    The telecoms industry is capital intensive, so every dollar and every cent spent on new infrastructure needs to be accounted for. The biggest expense for mobile operators has always been the RAN, accounting for around 60 % of CAPEX (and 65 % of OPEX). Older (2G, 3G) technologies are becoming more expensive to maintain alongside with 4G and soon 5G. The Open Compute model of the data center has the potential to help operators to move away from proprietary hardware to a virtualized network architecture. Some of TIP’s (Telecom Infrastructure Project) initiatives by Facebook) highest-profile activities are aimed specifically at the RAN, where the proprietary nature of several interfaces has stopped operators from using more than one vendor. The software-based approach for older Gs is unheard of where by virtue of the original design, it’s impossible to reconfigure legacy 2G and 3G networks to support newer communications standards such as 4G, and eventually 5G. In this webinar learn how Parallel Wireless Open RAN technology, designed on x86 across baseband processing platform, radio hardware, and radio and core software, simplifies MNOs business models to support ALL current, present, and future Gs for a better service to the end users at much lower cost. We will present recent case studies from TIP Summit from operators like Telefonica, MTN and Vodafone. www.parallelwireless.com
  • 5 Critical Enterprise Cloud Backup Capabilities
    5 Critical Enterprise Cloud Backup Capabilities
    Storage Switzerland, Carbonite Mar 26 2019 5:00 pm UTC 60 mins
    The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.

    Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.

    In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.

    Join us for this live event to learn:

    1. Why switch to the cloud for enterprise backup?
    2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
    3. Why and where most solutions miss the mark
    4. How Carbonite Server delivers the five critical capabilities
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
  • Maximise SAP HANA system uptime with SUSE Linux on AWS
    Maximise SAP HANA system uptime with SUSE Linux on AWS
    Santosh Choudhary, AWS, and Michael Bukva, SUSE Mar 27 2019 3:30 am UTC 60 mins
    In this session you will get an overview of how systems management, live patching and other high availability features provided by SUSE and AWS can help you maximise the uptime of your SAP HANA systems. We will demonstrate Live Patching of the kernel of a SUSE system running SAP HANA in AWS , driven by AWS Systems Manager, and the use of the CVE audit capability of SUSE Manager to identify the patches required to mitigate a serious vulnerability.
  • Complete Your Cloud Transformation - Store Your Data in The Cloud
    Complete Your Cloud Transformation - Store Your Data in The Cloud
    Storage Switzerland, HubStor, Osterman Research Mar 27 2019 5:00 pm UTC 60 mins
    (and live to tell about it)

    Organizations are moving to the cloud but according to a recent Osterman Research study, only 14% of companies have completed that transformation. The study clearly identifies data storage as an area where IT can easily accelerate their cloud transformation journey. Potentially more so than any other component, intelligently moving data to the cloud has the opportunity to significantly lower on-premises storage costs without the threat of impacting day to day operations.

    Join Storage Switzerland, HubStor and Osterman Research for our live webinar where we’ll discuss the results of the Osterman Research study, what it means for IT, and how IT can take advantage of that research to leverage the cloud to alleviate data management and data protection concerns.

    All pre-registrants will receive our exclusive eBook, “Understanding the Difference Between Data Protection and Data Management.” Sign up now and get your copy today.
  • Advanced Analytics and ML: Removing Friction from the Data Pipeline (EMEA)
    Advanced Analytics and ML: Removing Friction from the Data Pipeline (EMEA)
    Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Mar 28 2019 11:00 am UTC 60 mins
    Advanced data science techniques, such as machine learning, have proven to be extremely useful tools to derive valuable insights from existing data. However, they put the pressure on the data scientists to look for the right data and massage it into usable formats – a process that ends up consuming most of their time.

    In this webinar, we want to discuss the use of data virtualization to obtain the information needed in a more efficient and agile manner, show you the value added by this technology via a predictive analytics demonstration, and finally present a customer success story of this use case.

    Join the webinar to find out:

    •How does data virtualization help data scientists accelerate data acquisition and preparation?

    •How does the Denodo Platform for data virtualization integrate with popular tools from the data science ecosystem, like Spark, Python, Zeppelin, Jupyter, etc.?

    •How can you use the Denodo Platform to deal with large volumes of data more efficiently?

    •How is McCormick, a food flavoring giant, using data virtualization to season its machine learning and blockchain landscape?
  • WIN10 & Office 365 Migration and Optimization Strategies
    WIN10 & Office 365 Migration and Optimization Strategies
    Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Mar 28 2019 4:00 pm UTC 51 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • Avoid Data Drift in Your Cloud Data Warehouse
    Avoid Data Drift in Your Cloud Data Warehouse
    Sean Anderson - Director of Product Marketing - StreamSets | Dash Desai - Technology Evangelist - StreamSets Mar 28 2019 5:00 pm UTC 51 mins
    Cloud Data Warehouses are on the rise. As companies aim to make analytics pervasive across their organization, cloud data warehouses and data marts became a logical solution for delivering a familiar analytics experience but without the constraints of managing large DW infrastructure. Cloud Data Warehouses help reduce management and infrastructure costs, offload maintenance and uptime responsibilities, and allow users to simply load data and run queries instead of managing databases.

    However, migrating and streaming data to these new cloud managed services remains a freshman effort with many tools offering only simple ingestion functionality and limited data destinations. StreamSets has built an advanced integration with popular cloud Sw solutions like Snowflake, one of the world’s most popular cloud data warehouses. This level of integration provides fast synchronous and asynchronous ingest, multi-table uploads, and data drift compensation. StreamSets Control Hub helps users then manage a variety of pipelines, on-premise; across public clouds and cloud services.

    In this webinar you will...

    -Take a look at common usage patterns for Cloud Data Warehousing.
    -Understand the core functionality of the Snowflake connector.
    -Get information on the installation and operation of the new tool.
  • Expert Tips on Detecting and Responding to Data Breaches
    Expert Tips on Detecting and Responding to Data Breaches
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks Mar 28 2019 5:30 pm UTC 22 mins
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
  • Enterprise-Wide Kubernetes: Comparing Amazon EKS, Google GKE, and Microsoft AKS
    Enterprise-Wide Kubernetes: Comparing Amazon EKS, Google GKE, and Microsoft AKS
    Jim Bugwadia and Ritesh Patel Mar 28 2019 6:00 pm UTC 60 mins
    All major cloud providers have embraced Kubernetes. Using a cloud provider managed Kubernetes services is an easy way to get started with Kubernetes, as the cluster’s control plane installation and management are taken care of by the provider. There are several similarities in these offerings, but there also are some interesting differences.

    In this webinar, we will compare the managed Kubernetes services from the top 3 cloud providers, discuss when to use managed Kubernetes services, and what else is necessary for enterprise-wide Kubernetes use cases.

    Presenters:
    Jim Bugwadia, CEO at Nirmata
    Ritesh Patel, VP of Products at Nirmata
  • Your Guide to (ISC)² Membership in EMEA: Benefits, Maintenance and Opportunities
    Your Guide to (ISC)² Membership in EMEA: Benefits, Maintenance and Opportunities
    (ISC)² Membership Team Apr 2 2019 12:00 pm UTC 60 mins
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:

    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • DataOps for Digital Transformation
    DataOps for Digital Transformation
    Sheryl Kingstone - VP of Customer Experience & Commerce - 451 Research | Sean Anderson - Dir. of Product Marketing - StreamSe Apr 2 2019 5:00 pm UTC 57 mins
    Every organization wants to know more about its customers. More data can lead to a more comprehensive Customer 360 view—but only if all that data can be captured, managed, and kept safe from unauthorized use.

    Companies today are forced to piece together partial views of customer behavior, managing to the limitations of their systems and not to their analytic goals. When data lives in silos it can create gaps in analytic outputs and poor visibility for business intelligence. StreamSets built a DataOps platform to help manage complex data flows into analytics environments with pre-built connections for popular customer data systems. Join 451’s research director Sheryl Kingstone to discuss how DataOps is fueling digital transformation.

    In this webinar you will learn...

    -How to build Customer 360 in a scalable way to capture customer data—across all an enterprise’s systems, securely and in real-time.
    -How to deliver a unified, complete picture of the organization’s interactions with its customers.
    -Challenges that make it difficult to adequately protect customer data, including personally identifiable information (PII).
  • Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Storage Switzerland and StorONE Apr 3 2019 3:00 pm UTC 60 mins
    Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.

    Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.

    In this webinar learn:

    - The problems with a fragmented approach to storage
    - Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
    - Why consolidating to a single storage system won’t work
    - Why hyperconverged architectures fall short
    - Why Software Defined Storage falls short
    - Why the organization needs a Storage Hypervisor
  • InnovationX2 – Doubling down to overcome multi-cloud complexities
    InnovationX2 – Doubling down to overcome multi-cloud complexities
    Toby Owen, CTO and Don Barlow, COO Apr 3 2019 3:00 pm UTC 60 mins
    The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.

    This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.

    During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:

    Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.

    Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.

    Critical Availability Services: Offering the BEST availability guarantee in the industry.

    Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
  • Securing your SaaS landscape
    Securing your SaaS landscape
    Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman Research Apr 3 2019 5:00 pm UTC 60 mins
    The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.

    Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud

    We will cover the following:
    •Major concerns and issues with SaaS adoption
    •What to look for in a CASB solution
    •Overview of SonicWall Cloud App Security
  • SD-WAN and Security at the Edge on Intel Architecture
    SD-WAN and Security at the Edge on Intel Architecture
    Ramnath D Shenai - VM Ware, Sam Rastogi - Palo Alto Networks, Goker Ozturk - Intel Apr 4 2019 3:00 pm UTC 60 mins
    Enterprises are deploying SD-WAN, at an increasingly faster pace, as an important first step towards building optimized environments that are ready for multi-cloud world. As a platform, SD-WAN is a solid first step in deploying edge security applications and services with additional security functions like next-generation firewall (NGFW), intrusion prevention, SSL inspection, web filtering, DNS security, and malware analysis needed as well. In this webinar, we will discuss how VMware SD-WAN by Velocloud lays the foundation for SD-WAN and how Palo Alto Networks VM-Series and GlobalProtect security products complement and strengthen overall security to help organizations prevent successful cyberattacks. We will also discuss how Intel architecture, network and security specific hardware and software technologies help these workloads operate in a consistent, saleable and high performance way.
  • Making Apache Kafka Dead Easy With StreamSets
    Making Apache Kafka Dead Easy With StreamSets
    Clarke Patterson - Head of Product Marketing Apr 4 2019 5:00 pm UTC 58 mins
    Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.

    In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:

    -How to design any-to-any batch and streaming pipelines into and out of Kafka.
    -How to monitor end-to-end dataflows through Kafka.
    -How to operate continuous data movement with agility as data sources and architecture evolve.
  • Lessons from the Trenches:  Implementing Zero Trust in Reality
    Lessons from the Trenches: Implementing Zero Trust in Reality
    Brian Talbert, Alaska Airlines and Chase Cunningham, Forrester Apr 4 2019 7:00 pm UTC 60 mins
    Zero Trust is a major initiative for many security teams globally. But how do you get started? What pitfalls should be avoided?

    Forrester has published a lot on Zero Trust. In this webinar, Forrester Zero Trust analyst Chase Cunningham interview Brian Talbert from Alaska Airlines to chronicle their lessons and best practices in implementing Zero Trust as they moved to a cloud-based architecture. We’ll discuss implementing Zero Trust in the cloud where many of your old security tools don’t work and dive deep into:
    -Architectural considerations
    -Products and technologies
    -Organizational factors