Hi [[ session.user.profile.firstName ]]


  • Is Network Performance Haunting Your Productivity? Is Network Performance Haunting Your Productivity? Industry analyst Zeus Kerravala, Silver Peak Vice President of Product Marketing, Derek Granath Live 60 mins
    Is network performance haunting your decision to build an SD-WAN with broadband? Does using the internet for business critical applications scare the living daylights out of you? Silver Peak has a powerful performance potion that will dispel your fears and pique your curiosity!

    Join our live webinar featuring industry analyst Zeus Kerravala and Silver Peak Vice President of Product Marketing, Derek Granath to learn how you can solve network performance challenges with Silver Peak’s performance-centric SD-WAN solution, Unity EdgeConnect.
    Our SD-WAN experts will discuss how to turn any combination of private and broadband connections into powerful virtual overlays that deliver secure private-line like performance. All while shrinking network and equipment costs as much as 90%.

    What we’ll cover
    •High performance at any scale, using any transport combination, including consumer broadband
    •Driving performance through multiple WAN connections
    •Consistent performance through transport interruptions or brownouts
    •Optimal performance over distance – driven by integrated WAN optimization
    • Application prioritization and performance based on business intent
    • Business-class Quality of Service (QoS) even over broadband

    The spirits have spoken: not all SD-WANs are created equal. Join us and learn how to peak your network performance productivity.
  • The Future of Incident Response: What You Need to Know The Future of Incident Response: What You Need to Know Mike Rothman, Securosis Analyst/President; Faizel Lakhani, SS8 COO/President Recorded: Oct 27 2016 75 mins
    What happens when you combine increasingly effective adversaries, data dispersing to the clouds, and a significant lack of skilled security practitioners? You get the future of incident response.

    Despite having a bigger budget and better tools than ever before, the underlying way incident response happens within enterprises must evolve with the times.

    Join Mike Rothman, an analyst at Securosis & Faizel Lakhani, COO at SS8 as they discuss trends in cyber attacks and incident response. Learn what you can do today to ensure your organization is ready for the changes already in motion, and how network visibility plays a crucial role in accelerating breach and incident response.
  • How to Ensure Your Backups Are Not Held Ransom by Ransomware How to Ensure Your Backups Are Not Held Ransom by Ransomware Jason Leiva Solutions Architect, Veeam & Stephane Estevez Product Marketing, Quantum Recorded: Oct 27 2016 47 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, 2016 is the year of ransomware!

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Intel NVMe SSD Supercharges Windows Server 2016 Hyper-Converged Intel NVMe SSD Supercharges Windows Server 2016 Hyper-Converged Howard Lo, ViP Sales & Marketing, DataOn; Subodh Bhargava, Sr. Program Manager, Microsoft, Vivek Sarathy, Solution Architect, Recorded: Oct 27 2016 55 mins
    DataON and Intel maximize the performance of Windows Server 2016 thanks to Intel’s NVMe SSD and DataON’s Hyper-Converged Cluster Appliance platform. NVMe SSD based storage offers 3X read and 1.5X write performance when compared to traditional SSDs, making it an innovative choice for those looking to push the bounds of their data centers. Intel’s latest enterprise NVMe SSD offering empowers high IO performance for EVGA’s IOP intensive enterprise applications demanding in-memory applications, such as virtualization using Hyper-V*, Microsoft Hekaton* for analytics, Microsoft SQL*, large Exchange* installations, and other I/O intensive applications.
  • Technology to Rock Every Workload: The All-Flash Data Center is Now a Reality Technology to Rock Every Workload: The All-Flash Data Center is Now a Reality Rob Commins, VP of Marketing, Tegile Systems Recorded: Oct 27 2016 20 mins
    There is no question - flash arrays have made a dramatic impact to high performance enterprise applications. But what about all the rest of the data? There are use cases that require cold data be stored for long term compliance and simple “keep everything forever” company cultures. There are also heavy bandwidth applications that need much more capacity than what's needed to accelerate a database redo log.

    Come hear about how flash array technologies are advancing to finally deliver on the promise of an All-Flash data center. Tegile 's Rob Commins will discuss these advancements and identify key points for IT leaders to consider as they develop their digital transformation strategy.
  • 5 Steps to Simplify Security in the Modern Data Center 5 Steps to Simplify Security in the Modern Data Center Brian Morris, Worldwide Solutions Architect, vArmour Recorded: Oct 27 2016 60 mins
    Legacy security architectures and traditional security platforms are ineffective at securing modern data centers. Modern data centers need a security solution that is software-based, distributed, and simple: making security better, faster, and cheaper. vArmour is the leader in software-based segmentation and micro-segmentation that protects critical applications and workloads in the data centers and cloud.

    Join this webinar to learn more about the simple steps to securing the modern data center with vArmour.

    Step 1: Understand the behaviors of applications and workloads (with deep visibility) for more informed decisions
    Step 2: Streamline segmentation policy creation and management
    Step 3: Flatten and secure your infrastructure without a network redesign
    Step 4: Utilize proper control placement for better security and more efficient resource utilization
    Step 5: Scale out independent controls with automation
  • The Evolution of VMware’s Private Cloud Network Using NSX The Evolution of VMware’s Private Cloud Network Using NSX John Tompkins, OneCloud Network Architect, VMware Recorded: Oct 27 2016 49 mins
    VMware’s Private Cloud network relies heavily on the Software Defined Networking features provided by NSX today: however; it all started with a very traditional network topology. In this session we will discuss the evolution of VMware’s Private Cloud Network and how it evolved into one of the world’s biggest NSX for vSphere deployments. We will discuss design considerations and challenges, how we were able to achieve a scalable, multi-tenant security model and the technical and operational benefits that VMware’s Private Cloud team has garnered from adopting NSX.
    •Design considerations for large-scale, multi-tenant NSX environments
    •Overcoming technical and operational challenges with VMware’s Private Cloud and NSX
    •Benefits of transforming your traditional network to a software-defined one
  • Should you keep your On-Premises NAS: Upgrade, Pay Maintenance or Public Cloud? Should you keep your On-Premises NAS: Upgrade, Pay Maintenance or Public Cloud? Kevin Brown, Solutions Architect, SoftNAS Recorded: Oct 26 2016 52 mins
    The maintenance bill is due. It’s hundreds of thousands or millions of dollars, and you know you will need to purchase more storage capacity:

    -Do you pay your maintenance and commit to another 3-5 years?
    -Do you upgrade your data center architecture?
    -Do you shift to the public AWS cloud?

    In this webinar and demo, we covered:
    -Pros/Cons: on-premises SAN/NAS vs. hyperconverged infrastructure vs. AWS cloud storage
    -Demo: “Lift and shift” on-premises storage to AWS without re-architecting applications
    -How to fund a move to public cloud storage with existing budget
    -TCO analysis
    -Other public cloud use cases
  • Take 20 Series- Ep 3: Understanding the Availability Features of Virtual SAN Take 20 Series- Ep 3: Understanding the Availability Features of Virtual SAN GS Khasla, Sr. Tech Marketing Manager Storage and Availability VMware Recorded: Oct 26 2016 22 mins
    Application uptime and resiliency to failure are key factors with any hyper-converged infrastructure (HCI) storage solution. This technical discussion will focus on the availability features of Virtual SAN and why it's the best HCI platform.
  • DR Strategies For Hyperconverged Architectures DR Strategies For Hyperconverged Architectures Curtis Preston, Storage Switzerland Recorded: Oct 26 2016 60 mins
    Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
  • Flash Storage: Virtualization Unleashed Flash Storage: Virtualization Unleashed Joel McKelvey, PMM Infrastructure Solutions - Pure Storage Recorded: Oct 26 2016 35 mins
    With today's massive influx of data, storage demands are increasingly on the rise. From flash, disk, solid state drives, persistent memory, software-defined and more, how do you decide which storage technology is right for your organization? Join this webinar to learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.

    In the Webinar we will cover:

    -What is possible with flash?
    -What flash solutions are available today?
    -How do the costs compare?
    -Pure Storage architecture overview
    -Demonstration of storage provisioning tasks
  • Netflix: The Journey to Efficiently Securing Your Video Stream Netflix: The Journey to Efficiently Securing Your Video Stream Jonathan Stern, Applications Engineer at Intel & Scott Long, Sr. Software Engineer at Netflix Recorded: Oct 26 2016 53 mins
    Netflix engineers were faced with a challenge: how do you protect the privacy of your customers while serving over a third of all internet traffic in the US? Intel and Netflix engineers discuss the scale of the challenge and how it was solved using Intel® software ingredients and the latest Intel® Xeon® processors. This session includes details of the analysis performed, the software ingredients used, and the record setting results of this collaboration.
  • How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric Recorded: Oct 26 2016 28 mins
    Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

    In this webinar, you will learn critical aspects to securing data in a variety of ways:

    1) Three approaches to securing data-at-rest
    2) How software-defined policies can ease security management
    3) The role that key management plays in securing data-at-rest
    4) How real-time alerting can take your security posture to the next level
  • Use Cases for Software-Defined Storage Use Cases for Software-Defined Storage Rick Walsworth, Vice President of Marketing, Formation Data Systems Recorded: Oct 26 2016 61 mins
    Join us for this presentation which includes an in depth look at a number of case studies regarding customers that have successfully deployed the FormationOne software-defined storage platform. This interactive presentation will include a number of specific use cases with performance and ROI results to demonstrate the value and benefits of moving away from hardware based arrays and towards software based architectures.
  • Digital Transformation with HPE Cloud Management Digital Transformation with HPE Cloud Management Marc Bernis, Danny Cavion HPE Recorded: Oct 26 2016 57 mins
    Your IT plays a key competitive role: embracing the digital economy and bringing the business, optimizing applications, data, developers and infrastructure together as one is core. To compete in today’s digital world, customers need a 100% programmable IT.

    Cloud has brought to companies better user satisfaction, faster application release, new business ideas. But where do you start? How can your IT department become value creator while bridging traditional and new applications.

    Join us to learn about how HPE has built out software cloud capabilities across private & public cloud to automate applications, middleware and infrastructure.

    Learn how we integrate and work with environments like Microsoft Azure, AWS, and VMWare, as well as new open source and cloud native tools like Docker, Chef, - enabling developers and IT operations to be more productive and to automate tasks.
  • eSummit 3 Cyber-Forensics - an Overview of Intrusion Investigations eSummit 3 Cyber-Forensics - an Overview of Intrusion Investigations Dr. Gareth Owenson, Senior Lecturer, University of Portsmouth, Christopher Laing,(ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 41 mins
    Dr Gareth Owenson is the course leader for the Forensic Computing programme at the University of Portsmouth. He teaches extensively in forensics, cryptography and malware analysis. His research expertise is in darknets, where he is presenting working on alternative approaches that may lead to novel applications of the blockchain. Gareth also has a strong interest in Memory Forensics, and undertakes work into application-agnostic extraction of evidence by using program analysis.

    Gareth has a PhD in Computer Science (2007) and has taught at several Universities throughout the UK.
  • eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong? eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong? Matthias Maier, Security Evangelist EMEA, Splunk, Christopher Laing, (ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 46 mins
    Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.
  • eSummit 1 - How I learned to stop worrying and love forensics eSummit 1 - How I learned to stop worrying and love forensics Simon Biles, Digital Forensic Analyst, Forensic Equity Limited, Christopher Laing, (ISC)2 EMEA Advisory Board Member Recorded: Oct 26 2016 49 mins
    There is no such thing as a "secure" system - we do our level best to design them as well as we can, to put controls and measures in place - but, at the end of the day, things can and do go awry. Today we are going to talk about Forensics, and how it is the opposite side of the coin from security. What can we do in advance to aid in forensic investigation? What do we do at the point of a compromise to allow us to preserve as much evidence as is possible? And, ultimately, how to we take a forensic analysis and learn from it to create a better system the next time?
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Recorded: Oct 25 2016 53 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Recorded: Oct 25 2016 62 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Recorded: Oct 25 2016 61 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Securing Hyperconverged Infrastructure Securing Hyperconverged Infrastructure Rohit Goyal, Nutanix Security PMM Recorded: Oct 25 2016 38 mins
    Security in the modern datacenter requires an evolved mindset and approach. In this technical webinar, Nutanix will provide deep insight into the latest security advancements engineered into the Nutanix enterprise cloud platform, and explain how these advancements can be leveraged to build the most secure environments for your applications and data. Join this webinar to learn security best practices and ask questions relevant to your organization.

    Nutanix offers defense in depth by embracing a security-first approach to platform design and development. The Nutanix enterprise cloud platform combines powerful features, including two-factor authentication and data at rest encryption, with a Security Development Lifecycle that is integrated into product development to help customers meet the most stringent security requirements. The Nutanix solution is certified across a broad set of evaluation programs to ensure compliance with the strictest standards.