Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Enterprises and Service Providers are driving down cost, increasing automation, supporting cloud applications and delivering high quality of experience over ordinary broadband networks using a Software-Defined Wide Area Network (SD-WAN). But not all SD-WAN is created equal.
Join this webinar to learn more about the differences in SD-WAN architectures and how Cloud-Delivered SD-WAN with x86-based hardware drives down the cost of wide area networking, increases the automation of deployments and reliably supports cloud-based applications.
No registration required – EMC World 2016 is under way and StorageSwiss is there. Join me as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will do more than just give you the news, we will give you our analysis of what the news means for EMC and for your organization.
Join us live on May 3rd at 9am ET or on-demand afterward. No registration required.
As organizations move into 2nd and 3rd generations of virtualization with VMware, they often experience high latency and unpredictable performance. The traditional disk-based storage they're depending on for their VMware environment is not keeping up. Flash is transforming datacenter cost, performance and capacity to address these challenges.
Join Chris Tsilipounidakis as he examines the benefits of transforming to an All-Flash virtualized datacenter to support virtualized workloads.
As a response to the never-ending bandwidth demand, CSPs are constantly enhancing their networks. Fiber brings superior transport capacity and quality compared to the other broadband media and has therefore become commonplace for CSPs.
This is the first in a series of ‘Winning with Fibre’ webinars. Get a comprehensive outlook on the fibre market and learn how it builds a perfect business opportunity for CSPs. You will gain multiple viewpoints of and hands-on experiences on the topic in the course of the series.
In this joint webinar with Comptel, Analysys Mason and GE Energy Connections, we will discuss the following topics:
-Dean Ramsay, Senior Analyst from Analysys Mason, outlines the fiber market and services as well as how it opens great business avenues for CPS
-James Wheatley, Product Line Manager from GE Energy Connections, shares experiences and lessons learnt from the global CSP market relating to the management of the physical fibre network across the entire plan, design, build, operate and maintain lifecycle
-Simon Osborne, CTO of Comptel Service Orchestration, explains the key principles in the service delivery processes with which CSPs can run healthy business both today and in the future
It’s interesting to see how today, various macro-economic factors are changing the procurement dynamics in the Oil & Gas industry.
The strategic importance of sourcing, procurement and supply management has risen manifold with challenges encompassing; the need for a reliable knowledge and analytics ecosystems to handle vast quantities and scopes of capital project data, multiple risk factors related to workforce scarcity, stakeholder community, cyber-security, regional regulatory stringency and variability and global price volatility and increasing requirements for speed, agility and precision as energy companies compete to extract profits and advantage from the plethora of industry innovation opportunities now underway. Choice of an optimal procurement solution can impact the key operations & profitability of any and every company.
Click here to know more about how Dell's Procurement-as-a-service solutions specifically designed for Oil & Gas industry are pre-empting some of the key trends in the industry to bring to you the future-ready BPO solutions that creates measurable impact to you core business.
Did you know that 31 percent of downtime comes from hardware problems and 13 percent comes from human error? How would you like to minimize or even eliminate these business interruptions?
This webinar discusses what you can do to approach zero downtime for your mission-critical applications. You’ll learn:
•How you can maximize hardware uptime by implementing high availability, geo-clustering, live patching and easy rollback
•How to minimize human error by automating asset management and patch application
•How T-Systems International is using SUSE open source infrastructure to keep its mission-critical systems up and running
Is your company adopting or using cloud this year, but slowed down by security concerns? Our customers have faced the same hurdles you may be grappling with—operational complexity, concerns over encryption, and increasing developer responsibility among them.
Despite these concerns, cloud discussions for our technology and software customers firms have moved from “if” to “how" because of the much-needed flexibility the cloud provides.
In just 30 minutes in our webcast on Wednesday, April 27th, we'll share the challenges our customers are encountering on hybrid cloud and the shape of the solution that will address these. We'll then demo Bracket's agentless security layer as it performs transparent, always-on encryption that your developers can't turn off—and won't even notice.
High Availability doesn’t trump Disaster Recovery and there is nothing simple about creating a recovery capability for your business – unless you have a set of data protection and business continuity services that can be applied intelligently to your workload, managed centrally, and tested non-disruptively. The good news is that developing such a capability, which traditionally required the challenge of selecting among multiple point product solutions then struggling to fit them into a coherent disaster prevention and recovery framework, just got a lot easier.
Join us and learn how DataCore’s Software-Defined Storage platform provides the tools you need and a service management methodology you require to build a fully functional recovery strategy at a cost you can afford.
Regulatory compliance and security breach protection, is complex in today’s organizations, and this job is not getting easier.
One of the major challenges that many organizations and managed security services routinely face is that the sources, numbers and types of attacks being generated are increasing exponentially. When you add the growing unknowns associated with the Internet of Things (IoT) it becomes exceedingly difficult to separate the truly lethal threats from the merely mundane. This results in greater complexity and higher costs in terms of not only the number of security incidents that need to be investigated, it is driving organizations to hire the security expertise needed to maintain these services.
Join us for this webcast to see where state-of-the-art SIEM tools are being used to create a modern managed security service that not only scales to meet the potential threats for organizations, but also allows Managed Service Providers to deliver higher quality managed security services.
Join Ed Cabrera, former CISO for US Secret Service and now VP Cybersecurity Strategy and Jon Clay, Cybersecurity Expert for Trend Micro in a webinar that will give you the latest information you need to know on how to effectively protect you and your organization from ransomware and the more insidious crypto-ransomware. Ed and Jon will share the latest trends being used by cybercriminals into this threat which the FBI recently asked for support from businesses and security organizations due to the invasiveness of the attacks against businesses. Trend Micro will also share best practices you can implement to minimize the risk but also specific advanced detection capabilities available within multiple solutions to block the threat across its entire lifecycle.
As IT managers roll out new applications or upgrade existing systems, it's important that they have a keen understanding of the latest advancements in storage technology so they can recommend the best approach.
In this session, you’ll learn about the latest storage architectures (flash caching, server-side PCIe flash, hybrid, and all-flash) and the pros and cons for each. We’ll also discuss how a well-designed infrastructure can drive IT efficiencies and deliver high availability while meeting your performance SLAs.
In this presentation, learn how you can accelerate the optimization of physical infrastructure, engage vertical system manufactures, distributed customer computing power, create robust networking, and do all of the above in a secure and simple way with the help of Intel® hardware, security software from Clavister, and virtualization.
In today's age of connected devices and 24-hour operations, Data Analytics is a big deal. Every business--big or small--is working on setting up the right infrastructure and software for their data so that the right insights can be gained in a timely manner. Businesses who are able to master this requirement are reaping significant advantages, including an edge over theircompetitors.
This is the 2nd installment of this webinar series and features Fernando Thompson Chief Information Officer of UNIVERSIDAD DE LAS AMERICAS PUEBLA (UDLAP). Universidad De Las Americas Puebla. Fernando’s presentation will centre around:
• the biggest security challenges are that are facing the university,
• what lead him to look for a breach detection solution,
• how he and his team went about researching the best solution,
• if they used third party/industry tools to help validate their decisions on breach detection solutions.
• What other solutions they looked at besides Trend Micro Deep Discovery,
• why they chose Deep Discovery,
• how they deployed,
• the results they have achieved; and
• recommendations on best practices for organizations looking to select a breach detection solution.
The cloud concept originated with the dot.com phenomenon in the early 2000s, but was brought to reality by the large web-based and social media companies in the last half dozen years. However, the requirements companies like Google and Amazon had for their clouds were beyond what traditional IT infrastructures could deliver - so they designed their own. These hyper-scale companies used software-defined, scale-out architectures and commodity hardware to build flexible, yet cost effective cloud infrastructures.
Enterprises are moving towards a cloud-based model to deliver IT services. They see the potential of the hyper-scalers’ approach to creating cloud infrastructures but don’t have the resources or expertise to make that do-it-yourself model work. The Open Storage Platform (OSP) provides these companies with a solution that leverages commercial, off-the-shelf components and a “roll your own” approach to building private clouds.
Join Evaluator Group Sr. Analyst, Eric Slack and learn how companies are using the Open Storage Platform to build private clouds. In this informative webinar you will get the information to:
Organizations today need to employ cloud services in their day-to-day operations, but determining where to start and what works best is not an easy task. To build a hybrid-cloud platform, one must take into consideration a variety of factors including security, location, application requirements, and costs. Join us on April 21st to gain expert advice to help determine what mix of private and public clouds is right for you.
When a company deploys new technology, success depends on effective user education and adoption. This means employees not only need to understand how the technology works, but they need to change their behaviors. This doesn’t happen through osmosis.
From the earliest stages of planning new technology deployments, companies need to think about lines of business workflow. How do people currently work and what role will the new technology play in this work?
In this webinar, you will learn fundamentals of building an adoption plan, including identifying use cases, internal marketing and collecting feedback to evaluate success.
Amy Thacker is a marketing veteran with a graduate degree in teaching. Her experience allows her to meld internal marketing strategies with training best practices.
С помощью программ-вымогателей киберпреступники могут зашифровать ваши данные и не давать возможности использовать ваши системы до тех пор, пока вы не заплатите выкуп. Этот вид вредоносного кода попадает в организацию разными путями - по электронной почте, с помощью фишинговой атаки или вредоносной веб-загрузки. Как и в случаях других сложных угроз, для защиты от вымогателей рекомендуется использовать несколько уровней защиты - конечных точек, шлюзов и почтовых серверов. Программы-вымогатели постоянно развиваются и становятся все более сложными, что делает защиту от них также все более сложной задачей. Примите участие в нашем вебинаре, чтобы получить рекомендации Trend Micro по конфигурации средств безопасности и узнать о лучших практиках для защиты от программ-вымогателей!
The modernization of the data center and move to the cloud—in combination with increasing consumer pressure to protect cardholder information and an expanding corporate focus on data protection—can make the process of PCI compliance daunting. The good news is that help is available and can make things easier for CISOs trying to balance security and compliance with business agility.
Andrew Braunberg and Thomas Skybakmoen of NSS Labs discuss:
• The nature and role of third-party testing.
• Trend Micro Deep Discovery’s results in the 2015 BDS Testing.
• Considerations for decision makers when making security purchasing decisions.
You provision the VMs. They rack and stack. You manage the application. They manage the hypervisor. You pay the bill – and they send it to you. But, who is managing cloud security? Are you the one:
-Installing and maintaining all the security software (or neglecting to?)
-Identifying encryption options?
-Scrambling to collect audit materials?
-Bending to their legal conditions?
-Hoping they’ve done their part?
A great deal of cloud security can ONLY be done by your cloud provider. Much of the compliance paperwork requires their initiative. And, the rest can be time consuming, difficult or tedious for you.
Are you assuming your cloud has security covered? Join the webinar to learn who should own what and make sure no one is dropping the ball.
No registration required – EMC World 2016 is under way. Join me again as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will give you a recap of EMC World day 2 and give you our analysis of the latest news from EMC.
Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.
Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.
With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.
The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
•Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
•Better Security: Helps protect identity, data and devices against modern security threats
•Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications
Watch this webcast to:
•Discover Windows 10 productivity, security and manageability features that new hardware lights up
•Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
•Get additional resources to evaluate when it might be time for new devices and what devices are right for you
The cloud is here to stay. However, that also means more and more companies are realizing that they’ve built two separate IT teams and are struggling to deliver quality services without a unified view. A true hybrid monitoring solution is the answer to this common problem.
Join Jay Lyman, Analyst at 451 Research, and Kent Erickson, Alliance Strategist at Zenoss, as they discuss what is shaping hybrid IT, where it's going, and what to do about it.
As power density is rapidly increasing in today’s data center, provisioning the right amount of power to the rack without under sizing or over provisioning the power chain has become a real design challenge.
Managing the current and future power needs of the data center requires Cap-Ex to deploy a flexible power infrastructure: safely handling peak power demands, balancing critical loads and easily scaling to meet growing power needs.
In this webinar you will learn:
> How to create Long term power flexibility and improved availability for your operation
> How to increase energy efficiency and improve SLAs through a comprehensive set of best practices.
Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
In this interactive webinar we will also discuss:
- Why your data is wanted
- The new data Protection paradigm
- Live Hacking demo
- What’s next and what to do now to remain on the safe side
Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
As the Internet of Things encourages businesses to embrace big data, IT professionals turn to online resources to house and manage applications. However, cyber attacks are increasingly becoming a matter of “when,” not “if,” leading IT professionals to seek robust security solutions. Still on the fence about whether your small to medium sized enterprise really needs that much protection? Join Tricia Pattee, Product Manager at HOSTING, for a 30 minute webinar about scary facts about online security you need to know. Bring your questions – we’ll host a Q&A at the end of the presentation.
Caringo’s Jonathan Ring is the CEO on our latest MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. Jonathan will discuss how Caringo’s software is the foundation for simple, bulletproof, limitless storage solutions. We will also discuss the company’s goals and what Jonathan sees as his role for the company and the company’s future goals. Join us to learn about Caringo and get some new insight.
Microservices is one of the hottest technology trends for 2016. Join us to learn what microservices mean for your business, as our technical experts take you on a journey through microservices best practices and implementation using Anypoint Platform.
The successful adoption of NFV depends on the ability of a virtualized cloud infrastructure to deliver sufficient performance comparable to today’s proprietary network appliances.
Enterprise/IT cloud hardware specifications and configurations are not optimized to handle heavy NFV dataplane workloads needed by Communications Service Providers. In order to achieve this kind of performance, you need advanced processor and networking technologies embedded in silicon and in PCIe devices, but even so, you need to ensure your VNFs are ultimately able to leverage these capabilities.
In this talk, we'll show how NFV throughput performance varies depending on proper VNF workload placement configuration, by declaring what the VNF requires from the hardware (SR-IOV, DPDK, etc) and ensuring proper matching and configuration in NFVI. We will see how Enhanced Platform Awareness and intelligent orchestration are enablers for such extreme performance.
Join us for our live webinar on May 11th at 1 p.m.ET and 10 a.m. PT when Storage Switzerland and Tegile Systems will discuss how the acquisition and operating costs of flash make it feasible to build a private cloud that is responsive to the needs of the business and cost effective.
Learn how flash storage and VMware Virtual SAN 6 can help drive IT infrastructure consolidation for better business outcomes.
Mission-critical databases and business applications serve as the lifeline of many organizations. Therefore, performance is tantamount. In this webinar we’ll review a recent ESG study that confirms running VMware Virtual SAN cluster with SanDisk SSDs easily accommodates the performance and cost requirements of an enterprise-class virtualized OLTP database environment and delivers a better price/performance at the same time. Join Patric Chang, SanDisk Technical Marketing Manager, Jack Poller, ESG Analyst and Jase McCarty vExpert from VMware to learn:
1. Key features, highlights and benefits of VMware Virtual SAN 6
2. Hybrid and All-Flash Virtual SAN Configurations with SanDisk SSDs
3. Performance results (NOPM) of Hybrid and All-Flash VSAN
4. Price/performance and comparisons between Hybrid and All-Flash Virtual SAN configurations
Join Ray Gillenwater, host of the "Work Smart" podcast, ex-corporate executive and current co-founder of enterprise collaboration company, SpeakUp, as he discusses the biggest challenges remote teams face. Learn how to be as efficient and effective as possible, even when the team can't sit together in the same room. Find out about the latest tech in this category and how some of the smartest companies on earth are adapting in 2016.
Highly-publicised data breaches – like the 70 million US citizens affected by the Anthem health insurer hack in 2015 – are symptomatic of the increased attention paid by hackers of every stripe to the valuable data held in organisational IT infrastructure, both in-house and outsourced. Demonstrating the worrying results of compromised third party access to your network, this webinar will show that once a breach occurs, how it can escalate and the potential devastating consequences to data integrity and infrastructure uptime. Attendees will come away with a solid understanding of where and how attackers look to break in and, more importantly, what to address to ensure third parties entering your organisation are correctly controlled, monitored and secured.
Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
Johan and Cliff will answer your cloud security questions including:
•What are key challenges that IT leaders face when planning for a cloud migration?
•What security factors should you consider when considering a hosted vs. on-premises solution?
•As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
•How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
Join Storage Switzerland and Caringo on Thursday, May 12th at 1 p.m. ET/10 a.m. PT for a live webinar event, “Designing Storage to Enable Data Monetization”. Our experts will discuss unstructured data monetization use cases, how organizations are trying to band-aide legacy storage infrastructures to work in those cases and how a modern storage system can provide the answer IT is looking for.
Phishing has been well established as the top entry method for hackers attempting to breach corporate networks and proliferate data. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
Those investments are failing while organisations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence. But it begs the question – do you know how to properly protect your employees and your organisation’s assets? What motivates employee behavior to fall for such attacks?
In this webinar, PhishMe’s Jim Hansen and John “Lex” Robinson will discuss:
•The current state of phishing
•The success and failure of technology systems and how human systems can protect the last mile
•How conditioning – not training – empowers employees to identify and report phishing attacks
•Factors that impact an employee's susceptibility to fall victim to an attack
•Keys to building a successful Human Phishing Defense
Moderator: Adrian Davis, MD, (ISC)² EMEA
Speakers: Jim Hansen, COO, PhishMe; John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe
The movement away from electro-mechanical devices for primary storage to solid state technology continues. Flash technology has been immensely successful and continues to advance with greater density and less cost. It is also driving changes in the interfaces and protocols for storage from disk-based to memory-based. Additional solid state technology is entering the market and will create a hierarchy of different performance and cost storage. This presentation will discuss some of these changes and their potential impacts.
Computing models in today’s dynamic data centers and clouds are changing dramatically. Application-centric enterprises are finding that they need to develop nimble operational models for infrastructure, networking, and application services. Application delivery controllers (ADCs) are an important part of the networking and application services considerations for software-defined data centers.
New software-defined load balancers are significantly improving the way that application services are delivered and scaled, while freeing IT from repetitive tasks through intelligent automation. Application developers and lines of business are benefiting from better APIs that align with their goals for continuous integration and delivery (CI/CD) and cloud-native applications.
In this webinar, you’ll learn:
– How to eliminate the overprovisioning and overspending that is typical with traditional hardware-based load balancing solutions?
– How to scale not just load balancers but also applications, elastically and predictively based on real-time traffic patterns?
– How to take advantage of x86 servers, VMs, or containers to deliver application services close to individual applications?
– What are the best ways to support multi-cloud deployments and cloud-native applications?
– Ways to troubleshoot applications in minutes with the ability to record and replay traffic events, security and client data.
– How to accelerate application services for SDN environments such as Cisco ACI and private clouds such as OpenStack or for container-based microservices applications?
– The move to agile infrastructure and operations is already happening and it is now reaching critical networking components in the stack such as ADCs.