Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
The “(ISC)² EMEA reacts” are ad-hoc webinars scheduled in reaction to major Information security events and breaches. Here we bring together leading Industry experts to join Adrian Davis, Managing Director, (ISC)2 EMEA to explore the impact, potential responses, and implications for the future, offering professionals much-needed perspective as the dust settles.
This month’s webinar will focus on the mobile ransomware landscape including the evolution of the threat, where we’re seeing attacks occur, and how to protect your devices from this threat. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top mobile ransomware threats observed.
The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.
Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.
And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:
- What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
- How your cloud vendor can support you
- What questions auditors typically ask
- How all this impacts your disaster recovery plans as well as your public cloud use
In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
- What are the most vulnerable areas that cybercriminals look to exploit?
Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.
90% - Organizations who have experienced some form of external threat in the past 12 months.
We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,
Attend this webinar to learn:
•Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
•Key attributes you should be thinking about to make your security plan future-proof
•Where can security automation be applied to better align security with DevOps delivery models
The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?
This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
GPU technology improves Citrix virtual desktops and applications, but to truly deliver an immersive user experience that scales, organizations need to manage the complete GPU deployment lifecycle – from designing the infrastructure, to managing and optimizing a production environment, to responding to user issues dynamically, in real-time.
eG Innovations in partnership with NVIDIA is delivering comprehensive monitoring capabilities that enable IT to better manage all aspects of the user experience, tapping into new GPU-sourced insights that aid in design right-sizing, proactive infrastructure optimization and help desk issue remediation. This new joint solution integrates eG Enterprise with NVIDIA GRID software to provide actionable insights through host-level, guest-level, and application-level analytics.
Attend this webinar to learn how to deliver complete lifecycle management of the end user experience for GPU-powered applications and desktops.
Network functions virtualization (NFV) has promised us many things- lower capital and operational costs, increased interoperability with best of breed vendors, and at the same time decreased vendor lock-in, and lastly, but most importantly, faster time to revenue for new services with enhanced, agile service creation and platform awareness capabilities. But what exactly does a completely automated network with fully orchestrated assurance look like and what are the benefits that programmable service assurance solutions will bring you?
This webinar will describe the challenges and limitations with test and assurance today and one suggested transformation route to achieving a fully programmable, actively assured network, allowing you to take advantage of the operational cost savings and the ability to deploy new services faster promised by NFV.
Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.
The delivery of IT services and applications has historically been a slow, manual, error-prone process. In this session, discover:
- How the VMware NSX network virtualization platform automates your networking and security operations, increasing the speed, agility, and consistency of your business, without compromising on security
- With NSX and vRealize Automation, we’ll show you how to reduce manual operations of network and security services, making it is possible to deliver end-to-end services that include applications, VMs, networks, security policies and load balancers
- We’ll also demonstrate an incident response scenario. In this, we’ll show you how security automation allows the shift away from a very manual ticket driven process to a faster and more efficient automated response
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.
Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
Today, Communications service providers face real challenges in terms of their ability to innovate and deliver new services with greater speed and agility and at lower costs. Software-Defined WAN (SD-WAN) is fast becoming a disruptive intersection of cloud, telco and enterprise. SD-WAN offers an alternative to delivering managed services with centralized configuration, management, and optimization of Enterprise applications across the WAN. According to IDC, SD-WAN is projected to be a $6B market by 2020, with an estimated compound annual growth rate of 100 percent.
In this webinar, viewers will learn about the technologies that enable SD-WAN and the value proposition for enterprises and communications service providers. They’ll also hear about specific deployment options where SD-WAN delivers benefits over traditional methods.
The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
58% experienced issues when failing over IT systems! - The State of IT Disaster Recovery in the UK – 2016 Survey
Find out if you’re ahead or behind on IT Disaster Recovery. In a survey commissioned by iland and conducted by Opinion Matters, 250 IT decision makers in the UK were asked about their DR experiences, challenges and strategies. And, we’re sharing the results!
Learn from your peers:
- The frequency of DR testing – how much is enough?
- The impact of IT outages – how disruptive would it be to your business?
- The trade-offs IT leaders make between downtime, cost and security – what trade-offs make sense for you?
Join iland and Zerto as we dig into the survey findings which will be a useful benchmark for your own DR strategies. Don’t miss it.
Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.
In this webinar you will learn how to….
-Optimize data center resources with virtualization-aware security
-Deliver automated security across environments
-Manage and deploy security efficiently
-Achieve cost effective compliance
VMware, NetApp and even EMC are proponents of using NFS based storage systems to support mission critical workloads like virtual machines, databases and performance sensitive unstructured data. But in comparison to mission critical fibre channel, the tools to monitor and optimize your NFS infrastructure are lacking. In this webinar Storage Switzerland and Virtual Instruments will discuss the five challenges facing IT professionals that depend on NFS-based storage infrastructure for performance-intensive workloads. You will learn how to detect and overcome:
On September 27th, Datera invites you to join an exclusive event where you will hear from leading industry visionaries and experts who will offer executive-level insights into cloud technologies, processes, and solutions needed to keep pace with the speed of business.
Key experts from Comcast, Google and Mesosphere will be discussing the storage for clouds landscape and how it is changing fast and open source solutions, like Ceph, are just not delivering on the promise.
This is the storage breakthrough EMC, NetApp and HP don’t want you to know about. Don't make your next storage infrastructure investment on a legacy solution. Find out how an intent defined, infrastructure aware, API-first Dev/Ops, cloudy approach to storage streamlines application infrastructure operations and dramatically improves storage economics for private cloud operators.
Join this webcast to learn how to seamlessly deploy and orchestrate virtual network functions and services for the branch as both cloud-based and on-premises solutions. You’ll discover how easy it is to operationalize new service offerings and create a path to cost savings, rapid service monetization, and competitive differentiation.
RIFT.io and Brocade have collaborated to integrate the Brocade Vyatta Network Operating System, deployed as a Virtual Network Function (VNF) Platform, with RIFT.ware’s network service orchestration capabilities (NFV-O). This combination creates an on-premises branch services solution (vCPE) and cloud-based service.
The webcast will discuss best practices and feature a demo that will show:
• How Brocade and RIFT.ware jointly deliver a robust and scalable solution for operators to deploy virtualized network services for vCPE in the cloud and customer premises.
• How RIFT.ware and Brocade work together to deploy Vyatta Network OS as a VNF and VNF platform.
• Details on why an open architecture approach to interfaces is critical to ensure interoperability and rapid operationalization of services.
If you’re still spending days to provision infrastructure services, or weeks to deploy applications, it’s time to turn automation on. Join us and learn how you can automate the delivery and management of shared services, infrastructure, and applications.
What you will learn by attending this webcast:
- Tips on managing the dynamic hybrid cloud and providing on-demand infrastructure services
- How the California Department of General Services automated the delivery of virtualized compute, storage, and networking
- Why hybrid cloud capabilities are key to building a unified environment
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Did you attend VMworld 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from VMworld. It’s the next best thing to being there!
Smart Storage for the cloud IT is effortless, efficient and evergreen. In this webinar, learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.
We will cover:
- What is possible with flash?
- What flash solutions are available today?
- How do the costs compare?
- Pure Storage architecture overview
- Demonstration of storage provisioning tasks
The term Software Defined Data Center (SDDC) is making the rounds in the IT world. But while most companies may never actually build an SDDC, it’s important that IT organizations understand what this concept means and what it says about the future of IT infrastructure. In this 30 minute webinar, Evaluator Group Sr. Analyst, Eric Slack will define the software-defined data center concept, give some examples of software-defined products and technologies and discuss what how companies of all sizes can take advantage of this trend.
The only thing you can count on in technology –and life- is change. And change is good! Join this webinar with Nexenta and Western Digital to learn how your options for all-flash software-defined-storage are growing! Learn about the many game-changing technology updates delivering real cost-savings, flexibility and high-performance for customers large and small.
Thomas Cornely, Chief Product Officer at Nexenta and Steve Wilkins, Product & Solutions Marketing at Western Digital will discuss:
* The new features of NexentaStor 5.0
* NexentaFusion 1.0 for simplified storage management and analytics
* The power and cooling savings PLUS high performance with All-Flash SDS
What can Space Invaders teach us about attack path analysis? Mario about defending your users that are the weakest link? Even Pac Man about focusing on the right goals? Join Gavin Millard, EMEA Technical Director, who will explore the lessons to be learned from the games many of us played years ago that are still valid in the reduction of security risks within all of our infrastructures. Key takeaways from the webinar include:
How to game the system to get a high score in security.
How to gain insight into the attack path used by hackers to gain access to your data.
What cheats can be used to reduce the risk of data loss.
Enterprises are increasingly focused on driving automation with the flexibility of private and public clouds and modern application architectures. Legacy application delivery controllers (ADCs) rely on proprietary appliances with custom ASICs to meet performance requirements driving up costs without addressing next generation computing needs. Significant performance improvements achieved on Intel architecture servers now enable industry leading ADC performance on standard bare-metal servers. It is time to rethink L4 – L7 services for today’s applications.
In this webinar jointly presented by Intel and Avi Networks learn how with the right architecture, software-defined application services on standard Intel architectures deliver superior performance at the best price / performance ratio. Learn how you can finally go beyond table stakes load balancing and static hardware appliances to:
- Use Webscale IT principles and software load balancers to achieve the best performance
- Autoscale load balancers and applications on-demand with no manual intervention
- Troubleshoot gnarly application issues within a minute
- Take advantage of multi-cloud environments with central management
- Eliminate overspending on ADCs and lower your TCO by more than 70%
Overall increases in CPU and DRAM processing power are falling behind the massive acceleration in available storage and network bandwidth.Storage management services are emerging as a serious bottleneck.What does this imply for the datacenter of the future?How will it affect the physical network and storage topologies?And how will storage software need to change to meet these new realities?
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
You know the Telco technology landscape is changing, and you don't want to be left behind. So what do you do about it? In this webinar, we'll look at the realities of creating distributed Telco clouds, and what they mean to you today, and in the very near future. You will benefit from this webinar if you: (i) Hear some of these buzzwords: NFV, SDN, ETSI, OPNFV, OpenStack, MANO, Orchestrator, Distributed NFV, ODL, ONOS, CORD, VNF, NFVI, or VIM, (ii) Are puzzled by all the hype, considering the fact that production deployments by Telcos are few and far between, (iii) Wonder if (and how) a Carrier-Grade Cloud OpenStack Solution can be delivered, (iv) Want to know the best way to characterize and run workloads in a Telco Cloud, (v) Want to learn how to characterize, test and size a Telco Cloud using these new buzzwords
[Note: This webinar goes deep into the technical underpinning of an end-to-end solution, so be ready to be drenched with lots of details in a short period of time. We will try to do follow-on single-subject sessions based on your feedback, so come prepared with your questions and suggestions.]
Did you attend Microsoft Ignite 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from Ignite. It’s the next best thing to being there!
Join this webinar to learn how operational simplicity, in-line data efficiency, and predictable performance through the use of flash enables your business to be more competitive in the market at the same cost as your traditional disk infrastructure.
Topics covered include:
- What is possible with flash?
- What flash solutions are available today?
- How do the costs compare?
- Pure Storage architecture overview
- Demonstration of storage provisioning tasks
We are approaching the end of the SLE 12 SP2 Beta Program and will provide a broad overview of the biggest features brought by SLE 12 SP2. We will also show a sneak peak of what's coming next after the release of SLE 12 SP2.
Last but not least we will be at your disposal for a Q&A session about the SLE 12 SP2 products, features and Beta Program.
Tired of the challenges associated with running a data center using traditional infrastructure? Learn how Dell EMC ScaleIO Ready Node combines powerful Dell PowerEdge servers with the software-defined block storage capabilities of ScaleIO to deliver endless server SAN possibilities. Offering All-Flash and Hybrid configurations, the ScaleIO Ready Node is pre-validated, tested and configured to provide the best performance possible – with a single vendor for support. Now, you can meet your business objectives while greatly simplifying the process of procuring and deploying a server SAN.
Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.
During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:
· Move up the maturity curve through better program coordination and technology integration.
· Establish the right metrics to build the business case and showcase continual progress.
· Bolster future success by prioritizing business agility and data mastery as top strategic objectives.
In unserem Webinar erfahren Sie wie sie
- Interne Prozesse zur Analyse sämtlicher Daten signifikant verkürzen und vereinfachen können
- Eine schnellere Ursachenanalyse betreiben können
- Ihre Supportzyklen signifikant verkürzen können
- leichter Routine und Ad-Hoc Reports erstellen können
Following the presentation of Mark Smith on September 21st, Simon Briggs will give a Technical Deep Dive during his demonstration of how SUSE delivers the reality of Enterprise Class OpenStack. He will also talk about what SUSE is working on for the next version of OpenStack Cloud.
Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.
While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.
Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:
• Highlight the trends driving enterprises to move database workloads to the cloud
• Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
• Identify the use-cases that are prime candidates for migrating database workloads to the cloud
• Highlight the critical success factors for database migration to the cloud
Intelligent Workload Management has arrived! VMware vSphere with Operations Management 6.1 delivers several exciting new features that will save you time, optimize your resource utilization, and provide proactive visibility into your data center operations. vSphere with Operations Management delivers a robust virtualization platform with critical capacity management and performance monitoring capabilities.
Join this webcast to learn about new features that enable:
•Intelligent placement and proactive rebalancing of VMs
•Integrated OS and app monitoring.
•Consistent operations management across the Software-Defined Data Center.
Sandvine will be presenting how it's accelerating and facilitating Cloud based business services rollouts with carriers worldwide with the use of Openstack and Enhanced Platform Awareness capabilities to optimize platform utilizations. The webinar will cover the underlying NFV infrastructure design typically seen in production environments, and how individual VNF requirements are provisioned with Enhanced Platform Awareness. The session will cover VNF deployment and orchestration via Openstack, how to address hardware dependencies and asymmetric loading of compute nodes for DPDK usage, and the use of PCI Passthrough when scheduling compute resources.
Today’s data centers have never been more threatened, with an explosion of sophisticated, targeted attacks that lead to costly data breaches, system downtime and lost productivity. Together, GuardiCore and Nutanix enable a secure, software-defined infrastructure for virtualized environments. Virtual machines and applications running on the Nutanix enterprise cloud are protected via Nutanix's security-first design & automation and GuardiCore’s advanced security platform, featuring application-layer visibility and high-interactive threat deception.
Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.
Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.
Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
You'll learn how to:
Deliver value quickly in small increments across work streams
Provide visibility into strategic initiatives that inform the process, from planning through delivery
Support continuous delivery with automation
Solarflare has recently launched a new range of high performance Ethernet network adapters. Join this webinar to learn about the new features and performance enhancements, including the new TCPDirect TCP/UDP stack which has been designed specifically to meet the needs of ultra-low latency applications. The presentation will show which techniques and technologies are best suited to different scenarios, and include practical advice on how to get the best out of Solarflare's technologies.
Many enterprises have leveraged the correlation, visualization and case management of SIEM to drive the workflow of their Security Operations Center and much of the daily activity of the security team. With the introduction of big data scale, machine learning-based analytics and instantly-accessible forensic data, Network and User Behavior Analytics is a terrific complement to SIEM. Intel and Niara will explain how these new capabilities can be seamlessly introduced to SIEM and demonstrate both enhanced attack detection as well as accelerated investigations and response directly from the McAfee Enterprise Service Management (ESM) console.
In the early 2000s, server virtualization was hailed by hypervisor vendors as the key to data center infrastructure consolidation and huge CAPEX cost reductions. In many firms, it didn’t quite pan out that way.
A new generation of thought leaders is arguing that hyper-converged infrastructure will pick up where hypervisor computing left off. The claims of CAPEX and OPEX improvements may sound familiar, but the technology worldview has expanded to include not only application workload and server hardware, but also software-defined networking and storage.
Join us in this webinar for a frank and thoughtful discussion of hyper-convergence and how it might well be the key to hyper-consolidation.
The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
Demonstrating compliance with the new PCI DSS 3.2 is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Join us for this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture.
Common PCI DSS compliance challenges
Questions to ask as you plan and prepare for an audit
Core capabilities needed to demonstrate compliance
PCI DSS 3.2 reporting
How AlienVault Unified Security Management simplifies compliance and threat detection
Still running your databases on underutilized bare metal
servers? Looking to consolidate your databases and reduce license costs, but not create an OS sprawl? If the answers are YES, then join us to see how Linux containers technologies like docker and LXC can help.
We will explore how to use containers to consolidate databases without compromising performance while guaranteeing isolation and no manageability change. We will examine and contrast other prevalent consolidation approaches, along with the roadblocks they present and how containerization helps you overcome those problems.
Additionally, we will show you the following:
1. Configure an Oracle RAC database on LXC
2. Apply IO resource management on your Oracle database running in a container
3. Simplify database lifecycle management tasks with single click clone, time travel.