Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.
What You Will Learn:
1. you can achieve a deeper level of security by being aware what is happening on your network.
2. be aware of how you access the games, use secure connections
3. Keeping your applications and firewall up to date can help you keep secure.
Erfahren Sie im Rahmen dieses Webcasts, wie Sie den zunehmenden Bedrohungen für die IT-Sicherheit und den Anforderungen Ihres Unternehmens mit den Firewalls der nächsten Generation (NGFW) begegnen können.
Lernen Sie darüber hinaus die McAfee Next Generation Firewall und deren konkurrenzlosen Schutz sowie Herausstellungsmerkmale kennen:
• Vollständiger und einfacher Überblick mithilfe des zentralen Management
• Einsatzszenarien als NGFW, IPS, IDS, L2FW
• Kostensenkung durch Virtualisierung
• Hochverfügbarkeit auf Node- sowie Netzwerkebene
• Sichere Standortvernetzung dank Multi-Link-VPN
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?
Join this webinar on Data Protection and learn about:
•How easy it is to keep your data safe from attacks and theft.
•Encryption performance and why your end-users won’t even notice it’s working
•How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
•How DLP Endpoint can help you protect IP and ensure regulatory compliance
•Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies.
•New Mac OS support.
We invite you to join us on Tuesday, March 4 at 9 a.m. PT for a webcast on the next generation of our OneCore Storage™ Software Development Kit (SDK)! OneCore Storage 5.0 (OCS 5.0) is a comprehensive solution for independent hardware and software vendors to create target side drivers in a custom, high efficiency environment for storage applications that require low latency and high performance. The webcast will focus on how the next generation of the SDK adds new features including support for of the new Emulex OneConnect® OCe14000 family of 10Gb Ethernet (10GbE) Network Adapters and Converged Network Adapters (CNAs)
Sign up for the webcast now for a chance to win Beats Tour In-Ear Headphones!
ICT Enterprise architecture is the backbone of corporate IT systems, the question is are they or can they be sustainable?
Join the MD of Carbon 3IT and Vice chair of the BCS Green IT SG John Booth and his guests Alex Bardell of Deloitte, Richard Lanyon Hogg of IBM, Bob Crookes from DEFRA and Chair of the BCS Green IT SG and IT4s Consultant Gary Thornton as they answer the core questions for sustainable enterprise architecture:
- What is sustainable enterprise architecture?
- Will it require additional skills or money to achieve?
- Will enterprise architecture be superseded by cloud technologies?
The best infrastructure for an app or a service increasingly requires both public and private cloud environments. As enterprise IT teams build private clouds behind their firewall to deploy hybrid IT and leverage the capabilities of elastic public clouds, they will have to contend with profound changes to the network. Innovations promise to make the modern network more automated and dynamic to provide connectivity on-demand in a highly secure fashion.
Today organizations require a flexible IT infrastructure that can spin up resources on demand and securely segment traffic. Virtual private clouds (VPC) allow you to provision a logically isolated section of the public cloud where you can launch resources in a virtual network that you define. The VPC feature set also allows you to easily customize the configuration.
Join Cloudscaling and Juniper to learn from their first hand experience with enterprise customers deploying network virtualization to speed time to market for new apps and services by automating the creation of virtual networks that interconnect private, hybrid and public clouds. They will demonstrate the integrated Cloudscaling OCS and OpenContrail solution that offers a simple to deploy and agile platform based on open source technologies. These experts will also provide insight into:
- Why OpenStack is becoming the de facto cloud open source software for building private and public clouds.
- The importance of orchestration and APIs in the software defined data center
- How virtual networks can seamlessly integrate with physical networks
- How to ease the transition to the private cloud by using service chaining to virtually insert services into the flow of network traffic
Register today and start moving your network into the modern, cloud era.
With SAP HANA, you can do more things that you might not think before. Based on Twitter data, we might be able to find more. Let’s go through this flu prediction example and demonstrate how you can quickly build this type of application on SAP HANA. It will show you the capability of SAP HANA to process the social media data.
In this webinar, we invited Sam Bhat, President and CEO, Rohit Patwardhan, GM & VP of Technology, Rahul Joglekar, Chief Architect from United Software Associates to share their experience of how they built an applications on HANA, they will also share how to build similar applicaiton using HANA platform. From this example, we will explain how SAP Idea Incubator can support you for application development on SAP HANA.
Key points of this webinar:
• Analyze & Predict Health Related Data in real-time using SAP HANA
• Build similar application using SAP HANA as a development platform
• Find solutions to real world problems using the power of SAP HANA
For more information about customer expectations, please visit SAP Idea Incubator website at incubator.saphana.com.
This 30-minute webinar will discuss how the Sayers Cloud can be an off-premise extension of your existing IT infrastructure. Now in its second year, Sayers Cloud has proven success in helping our customers scale IT services flexibly and cost-effectively, whether for production compute, test/dev or disaster recovery needs.
Our State and Local Government and Education markets continually face resource challenges in regards to managing their highly distributed infrastructure. Join us to discuss SDN as a means to lower costs and improve agility for campus and branch operations. We’ll also discuss how Juniper can help you reduce network complexity and help you achieve a flexible, future proof infrastructure. Register now.
•Where are my Virtual Machines, what are they doing and how are they protected?
•How to secure the hypervisor?
•As the data centre has evolved, how have my security solutions changed to reflect this?
Join this webinar on Data Centre Security and find out:
•What are some of the new challenges in securing a modern data centre?
•How can I balance the needs of performance, flexibility and security?
•Hear about how hardware features can be used to detect attacks to hypervisors?
•What new technologies are available to secure a modern data centre?
Jason Brown is an Enterprise Solutions Architect specializing in Endpoint and working within EMEA. He is responsible for ensuring that optimal solutions are provided to customers within the enterprise market segment. Previously, as Principal Sales Engineer, he has assisted in delivering solutions in both a presales and post-sales capacity to many of the FTSE 100 companies and authored best practice white papers. He has created and executed partner training across EMEA and delivered many customer training courses. He has worked within the security industry for the last 15 years. Prior to joining McAfee, Jason worked at a defense contractor after completing a bachelor’s degree in computer modelling for business and master’s degrees in both Operational Research and Finance. He is CISSP certified and a Cisco Certified Network Professional.
The data centre has evolved massively to encompass a complex hybrid environment of virtual endpoints, servers and infrastructure, involving both public and private clouds. Before securing virtual machines, challenges now include locating these transient and often invisible systems and securing the hosts upon which these virtual machines are running. Learn how to evolve your approach to protecting the Data Centre using McAfee solutions.
Se kort introduktions video på Dells nye sammensmeltning af server,storage & netværk. Den er designet til at kører i almindeligt kontormiljø, hvilket betyder den er ekstremt strømsvar og kan drifte ved 35 grader celsius
Are you experiencing users wanting to use devices other than BlackBerry? Is a migration to BES 10 too costly? Are you looking to migrate to iOS or Android but are concerned about security? This webinar will explain how to securely migrate to or add a new platform, and how Cortado Corporate Server can make this transition easy.
Cortado boosts your mobile productivity while keeping your business as secure as when using BlackBerry.
We will also show you the new features and functions Cortado brings to your mobile environment.
You’ve spent a lot of money and time purchasing and implementing software that’s expected to solve critical business problems and make your business more competitive. Make sure you do not lose all that value by being out of compliance or overspent. And no, it’s not easier said than done…
Join this web event to hear how SAP optimizes Software Asset Management with best practices, tools and powerful employee responsibility initiatives. You will learn how SAP rationalized the use of software assets and licenses, reduced expenses and demonstrated to the auditors that their compliance methods are serious and trustworthy. We will also demonstrate the HP Software Asset Management solution.
Cisco introduces VMDC DCI solution which provides validated design to ensure high availability and performance for applications across Metro and Geo data centers. This solution unlocks Business continuity and stateful workload mobility which is top of mind for both public and private cloud providers to connect multiple data centers to support Business Critical operations.
More and more IT organisations are facing the challenge of undertaking data center consolidation, transformation and migration due to the pressures from the business to reduce costs and improve agility, along with enabling technologies and solutions such as virtualisation and cloud. But how do we achieve this effectively?
Join Malcolm Orr for a discussion of the ideal strategies and tips, utilising the Rackspace transformation framework, to let you you easily identify the applications that can help start your business transformation and begin your journey to the Hybrid Cloud today!
Workload Automation (WA) evoluiu de uma disciplina desenvolvida isoladamente, focada na visão de Jobs Batchs estáticos, para uma abordagem de controle central e proativo das atividades das empresas com uma visão de negócios orientada a serviços e aplicações. As cargas de trabalho são agora parte do catálogo de serviços das empresas, trabalhando em conjunto com soluções de automação de gestão e soluções de automação, fazendo com que as aplicações existentes executem de forma mais eficiência, acelerando a entrega de novas aplicações atendendo com maior agilidade as necessidades de negócios.
A ascensão das necessidade de "Cloud Computing", abre um novo mundo de possibilidades para o Workload Automation. Soluções de nuvens privadas, públicas e híbridas, são opções novas para execução de trabalho das empresas de forma mais eficiente, flexível e confiável. Mudando dinamicamente as cargas de trabalho para o lugar onde possam ser executadas de forma mais eficiente e em qualquer lugar, constituindo um passo significativo em direção a otimização de recursos.
WA não pode mais ser visto como uma simples ferramenta de infra-estrutura, constitui um ativo estratégico importante. A solução de automação da CA Technologies, possui todos os componentes necessários para tornar os processos de WA um verdadeiro diferencial para sua empresa.
The word cloud is much over used, and the debate continues as to whether it should be cloud, or cloud computing. In either case, the main focus is on how the cloud computing market is evolving and where should enterprise customers invest their money? Ovum has conducted many surveys and the results indicate the move toward hybrid cloud computing is fast becoming the top choice for many enterprise customers.
Join Roy Illsley for this webinar and discover why cloud computing is evolving and how it fits in with a wider IT transformation agenda. Roy will share the results of Ovum's latest global adoption survey and discuss the importance of the findings. The key adjacent technologies and the impact on cloud computing will also be explored. Attend and learn how you can put IT transformation and cloud computing in to context.
Today’s security challenges demand a unique perspective to protection. Zero-day attacks and customized malware are challenging the security industry in ways previously unimaginable.
With current security solution struggling to stay ahead, and the average IT organization inundated with volumes of security alerts, a new approach to security and network protection is needed.
Join this webinar to understand what Signature-less IPS inspection is and how it can benefit you:
•What technologies McAfee uses for signature-less IPS inspection
•How signature-less inspection is transforming IPS security
•How McAfee’s IPS can increase your security posture against Advanced Malware
The Open Data Center Alliance Cloud Maturity Model (CMM) provides an end-to-end visualization for how the use of cloud in the enterprise develops over time (adoption roadmap) and how the enterprise’s ability to adopt cloud-based services within defined governance and control parameters increases.
As it matures, the use of cloud becomes more sophisticated, comprehensive, and optimized. The CMM plots the progression of structured cloud service integration from a baseline of no cloud use through five progressive levels of maturity.
This presentation will walk attendees through the maturity model that the ODCA has developed and how they can apply this model to their organization creating a comprehensive plan to fully integrate cloud into their operations.
Hybrid cloud technologies are transforming the way we deliver applications to customers and employees, but organisations continue to have challenges connecting customers to applications and content. Global customers suffer from network latencies and bottlenecks which impact the user experience. Furthermore, in the race to build out high-performance applications, enterprises often buy more compute capacity than they need, because it is difficult to predict the rate of customer adoption, leading to high costs and inflexible infrastructure.
Join Paul Wallace of Riverbed Technology, and learn how to:
* Right-size your cloud resources and keep control of your costs
* Turn distance and location into a competitive advantage
* Mobilise your cloud with the industry's first ADC-as-a-Service solution
Learn why benchmarking your current network and server virtualization infrastructure is vital to your organizations long-term Cloud Infrastructure-as-a-Service (IaaS) success. Benchmarking will yield your IT organization the knowledge needed for solid planning, effective execution and post-migration performance validation.
With both CIOs and CFOs challenged to deliver efficiencies and reduce costs, the quickest routes to results always seems the easiest and trending toward Cloud Services, but few understand how this affects software Governance, Risk and Compliance.
Moving to Hybrid IT environments and the complexities of evolving licensing terms, organisations need to review the basics across the distributed IT landscape: establish Governance, measure Risk and maintain Compliance, in order to keep control of costs and drive vendor performance
Join Martin Prendergast, Chair of the CIF GRC Special Interest Group and CEO of Concorde Solutions for a discussion of the governance, risk and compliance practicalities of moving to a hybrid IT environment in your organisation.
IBM® SmartCloud® Orchestrator makes complex cloud services easy to manage. Built on OpenStack, IBM SmartCloud Orchestrator provides common cloud services for multi tier application environments on top of compute, network and storage while supporting multiple hypervisors and multi-vendor platforms. It’s designed to simplify and speed the creation and execution of process workflows that then help shorten deployment and change processes in the cloud. With standardization and automation of cloud services through a flexible orchestration engine, IBM SmartCloud Orchestrator (SCO) provides ongoing service lifecycle management and the flexible platform to automate assets that most organizations are already using.
IT Departments are pressured into using cloud services, but they face challenges in delivering these services, should they move into new build cloud, legacy cloud or internal cloud via a retrofit of their existing facilities?
Join John Booth and guests Bob Crooke of BCS Green IT Special Interest Group, Richard Barrington of ICEOTOPE, Vic Smith of Colt and Gary Thornton of AET4IT for a discussion of the benefits and pitfalls of all 3 and takes a quick peek into the data centre of the 2025.
As organizations move to virtualize their environments they must rethink how the secure their data. Encryption will play a key role in protection of data as perimeter defences become less relevant and traditional security mechanisms struggle to keep threats at bay.
Join your fellow professionals for a best practice session, to first learn the detail on how encryption is expanding as organizations or all shapes and sizes, and from a wide range of industries, migrate to virtual environments. Then discuss several key management best practices to complete "the keychain" for organizations considering a move to the cloud. Finally we look at specific use cases to demonstrate the use of these best practices for encryption and key management in the enterprise.
To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.
McAfee DLP leverages TITUS Classification metadata to set active DLP policy and improve policy inforcement. Join TITUS and McAfee for a discussion about:
•Why it is crucial to include users as the first line of defense
•How DLP, NDLP, and ESM leverage TITUS
•And the role of TITUS Classification in the DLP architecture
Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.
Join us to explore:
•NSS Labs Intrusion Prevention System testing methodology
•Security effectiveness, performance, and total cost of ownership
•Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results