Browse communities
Browse communities
Presenting a webinar?

Virtualization

Community information
Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • Network Managers have a tall order in IT organizations today. Typically, they are tasked with two conflicting business directives:

    1. Deliver optimal end-user experience for networked applications

    2. Reduce the operational cost of the network, or reduce the IT budget

    But the knee jerk approach of “throwing bandwidth at the problem” while potentially improving end user experience, is hardly the answer to cost management and network optimization.

    In this webinar, Chris Greer will discuss the challenges that result from the common approaches utilized today in capacity planning and, outline a new way, comprised of 4 actionable steps to optimizing the bandwidth you may already have.
  • Mobile Edge Computing (MEC) provides a new ecosystem and value chain in mobile networks. The Open-RAN ecosystem enables Mobile Operators to open their Radio Access Network (RAN) edge to authorized third-party applications and services. By transforming proximity, context, agility, rapid response time and speed into value for mobile users, mobile operators, network equipment vendors, and third-party providers can improve the customer experience and monetize mobile broadband. The MEC trend is gaining momentum with the establishment of an ETSI MEC Standardization group led by Intel, Nokia, Huawei and other major players.

    In the Webinar, we will present the MEC architecture within the mobile network and demonstrate a number of use cases
    -Leveraging the Open-RAN ecosystem to bring 3rd party applications like Content Delivery Networks (CDNs) to the Radio Edge;
    -Demonstrating the value of real-time network awareness for optimized content delivery;
    -And presenting advanced RAN-based technologies that further accelerate content delivery
  • User Environment Management (UEM) technologie zorgt ervoor dat alle gebruikers naar tevredenheid kunnen werken op ieder device, terwijl het de IT-omgeving en daarmee het beheer minder complex maakt. Vooral ook in een omgeving met een mix van fysieke en virtuele devices of een combinatie van meerdere devices, locaties of delivery methodes.

    Wil je weten of een UEM-oplossing toegevoegde waarde heeft voor jouw IT-omgeving? Schrijf je dan nu in voor de 5 technische webinars gehost door onze Pre Sales Consultants. Zij gaan in op de vijf belangrijkste redenen om de gebruikerservaring in jouw organisatie naar een hoger niveau te brengen en hoe je dat technisch gezien voor elkaar krijgt.

    Tijdens dit webinar wordt ingegaan op reden #1: Gebruikers willen overal en op ieder device dezelfde goede ervaring. Naast het bespreken van de techniek, laten onze pre-sales door middel van een demo met name zien hoe gebruikers op ieder device dezelfde look-and-feel kunnen ervaren. Door UEM krijgen gebruikers een context-afhankelijke omgeving toegepast op hun behoeften, in lijn met het beleid van de organisatie waarvoor ze werken. Ook met het oog op de komst van Windows 10 is het belangrijk ervoor te zorgen dat gebruikers hun eigen omgeving behouden.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • This webinar discusses the potential pitfalls when cable operators begin upgrading their networks for IP video delivery. Delivering IPTV is more economical than cable TV and offers a higher quality of service to end customers, but a key challenge is to maintain an excellent customer experience during the transition period in order to deliver an increasing bottom line.

    This webinar will give a structured and cost-efficient approach to assuring network and service quality for IPTV and Cable TV.

    We will share insights and best practices around:

    * Pre-assessment of new network deployments to reduce service calls

    * A system approach that pinpoints problems along the entire service delivery chain

    * Remote troubleshooting to quickly eliminate customer issues to reduce churn

    * 24/7 customer quality insight vs. isolated measurements with handheld tools
  • Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Join us as Sumit Dhawan, SVP and GM of VMware Desktops, unveils the next wave of application and desktop innovations:

    - Six key new enhancements to Horizon 6
    - Features that help you deliver unlimited access to desktops and apps at lower costs, with better performance (think 3D!) - and at unprecedented scale
    - New technology demonstrations that bring together virtual networking, storage, desktops and apps
  • Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Cybercriminals are bypassing conventional security tools and increasingly using DNS — a business-critical but rarely protected service — to execute APTs, infect devices, and exfiltrate data. In 2014, according to Ponemon Institute, data breaches cost an average of $159 per record, impacting companies like eBay, JPMorgan Chase, and Sony Pictures. Can you afford to be next? Find out why you should be worried about APTs that exploit DNS — and how to defend your network.
  • Join us for this informative 60 minute roundtable as we discuss how private and hybrid clouds fit into the modern datacenter. This panel includes top luminaries from major private and hybrid cloud providers. Some of the questions we will be asking include: Why use private and hybrid clouds instead of public clouds? Are all workloads suitable for these types of clouds? What are the economic factors that play into these types of clouds? Are they a transitional technology or the new normal?

    Panelists:
    Steve Wilson, VP Cloud Software, Citrix
    Burzin Patel, Director of Product Marketing, Microsoft
    Bryan Che, General Manager, Cloud Product Strategy, Red Hat
    Mathew Lodge, VP Product Marketing and Management, Cloud Services, VMware
  • This webinar will provide an overview of Intel’s contribution and engagement portfolio to the Software Defined Networking (SDN) and Network Functions Virtualization (NFV) open source community. In detail it will discuss how Intel is accelerating network transformation to SDN and NFV specifically through the Open Network Platform (ONP) Server program. Attend the webinar to discover various SDN/NFV open source engagement opportunities to drive SDN/NFV adoption in telco, cloud, and enterprise IT markets.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • This is the third in a series of webinars about the benefits of open source in the NFV market. In our first webinar, we discussed the increasingly prominent role open source is playing in NFV and SDN, and how Intel Network Builders partners can leverage open source. The second webinar focused on the wide variety of options partners have to integrate with open source in the NFV market.

    In this webinar we'll show you how Brocade, an Intel Network Builder partner, is working with Red Hat and Intel to integrate their market-leading technology with NFV open source infrastructure software. Join us to hear from Brocade discuss how they use open source technology to their business advantage, and lessons learned along the way.
  • Het Roelof van Echten College in Hoogeveen is ontstaan na een fusie in 2001 van verschillende Christelijke scholen. Momenteel zitten er 2.100 leerlingen op de 5 locaties van het college.

    Na de fusie werd de vernieuwing van de IT-infrastructuur ingezet, omdat er een mengelmoes van technologie was ontstaan. Ook werd een eerste stap gezet naar de digitalisering van de lesomgeving door het verstrekken van iPad’s aan docenten.

    In eerste instantie konden bestanden alleen lokaal worden geopend, maar na de virtualisatie van de servers besloot men dat bestanden tevens via meerdere apparaten beschikbaar moesten zijn. Er werden meerdere oplossingen bekeken, maar het was moeilijk om een softwareleverancier te vinden die de juiste functionaliteiten kon bieden. Daarom werd ICT-Partners gevraagd een advies uit te brengen.

    Tijdens dit technische webinar vertelt Corne van Ginkel van ICT-Partners u alles over de keuze die het Roelof van Echten College uiteindelijk heeft gemaakt. Bas Bremmer van AppSense laat u door middel van een demo de werking van de oplossing zien.

    Na het volgen van dit webinar weet u hoe alle docenten bij deze school in ieder lokaal, maar ook thuis, toegang hebben tot de bestanden die ze nodig hebben.
  • Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?

    Panelists:
    David Glynn, Technical Solutions Engineer, Dell
    Eric Siebert, Worldwide Solutions Marketing Manager; HP
    Joel Kaufman, VMware Technical Director; NetApp
    Ben Bolles, VP Products; NexGen Storage
  • Would you ever consider leaving your house for the day without locking your door? Of course not!!
    It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.

    Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.

    In this presentation, Vormetric will demonstrate:
    • How to complete database security, to assure that back door entry is as locked down as the front door
    • How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers
  • Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.

    Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.

    In less than an hour, David will tell you:
    • Why simply reinforcing perimeter defenses was not the right approach for UNB
    • How they were able to gain better security visibility and intelligence—and use it effectively
    • Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
    • And more…

    Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
  • As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services, they are searching for solutions that allow them to quickly identify and isolate noncompliant data sharing and prevent unauthorized access to sensitive information.

    Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze and share documents from a mobile device or a cloud computing platform.

    Learn how:
    •Secrata deployed with McAfee provides a unified file sync and share experience with military-grade security, to address this need.
    •McAfee Enterprise Security Manager enables businesses with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring.
  • Sayers and House of Brick are hosting a webinar reviewing successful processes for virtualizing SQL and Oracle databases.
  • The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • Most organisations are investigating moving some internally hosted services to cloud service providers such as Amazon Web Services, Colt, Sungard, Century Link, to increase agility and reduce complexity. The key to this for all service providers is data centre automation. OpenStack is a Cloud Operating System that can help you quickly build and automate your own Cloud Infrastructure and gain the benefits of automation and agility it brings.

    There are many choices to make when building your OpenStack environment. Andy will introduce OpenStack, then review in detail the storage choices that need to be made. He will look at how SolidFire Agile Infrastructure for OpenStack simplifies and dramatically reduces OpenStack project deployment times.
  • Join our Webinar to learn about two new software appliances in 6WIND’s Speed Series family: Turbo Router and Turbo IPsec. Based on 6WINDGate™ packet processing software, which is deployed in Tier 1 networks worldwide, Turbo Router and Turbo IPsec can be installed quickly onto standard x86 servers within bare metal and virtual machine (VM) environments. The new Speed Series Turbo Appliances are designed to benefit Service Providers, Cloud and Content Providers and Enterprises with the best price/performance ratios when transitioning from hardware to software based appliances for flexibility, efficiency and cost savings. Compared to competing software routers, 6WIND’s Turbo Router can deliver up to twice the performance at ¼ the price. Compared to hardware-based IPsec Gateways, 6WIND’s Turbo IPsec can save 80% of the cost per gigabit of IPsec throughput.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • User Environment Management (UEM) technologie zorgt ervoor dat alle gebruikers naar tevredenheid kunnen werken op ieder device, terwijl het de IT-omgeving en daarmee het beheer minder complex maakt. Vooral ook in een omgeving met een mix van fysieke en virtuele devices of een combinatie van meerdere devices, locaties of delivery methodes.

    Wil je weten of een UEM-oplossing toegevoegde waarde heeft voor jouw IT-omgeving? Schrijf je dan nu in voor de 5 technische webinars gehost door onze Pre Sales Consultants. Zij gaan in op de vijf belangrijkste redenen om de gebruikerservaring in jouw organisatie naar een hoger niveau te brengen en hoe je dat technisch gezien voor elkaar krijgt.

    Tijdens dit webinar wordt ingegaan op reden #2: Gebruikers willen niks merken van veranderingen in de IT-omgeving. Naast het bespreken van de techniek, laten onze pre-sales door middel van een demo met name zien hoe je ervoor kunt zorgen dat gebruikers gewoon door kunnen werken als er een verandering wordt doorgevoerd in de IT-omgeving. Door UEM worden gebruikers losgekoppeld van het onderliggende systeem en kunnen gebruikersprofielen en gegevens moeiteloos naar nieuwe devices en besturingssystemen worden gemigreerd. Dit vermindert de tijd en complexiteit van een migratie. Door zero-downtime migraties zorg je ervoor dat de productiviteit van gebruikers niet wordt verstoord. En dat scheelt een hoop telefoontjes naar de helpdesk.
  • Virtualization drastically changes how datacenters are designed and operated, from storage to networking, server and inventory management. Yet all-too often, endpoint security such as antimalware is overlooked. This leads to major performance problems due to the architecture of traditional security products.

    Bitdefender will detail these challenges, and cover solutions to the problems, including leveraging VMware vShield Endpoint technology.
  • Do you have network performance monitoring tools, but you still can’t figure out what the problem is? Are you experiencing VERY expensive downtime, resulting in customer churn? Do your IT organizations spend all their time pointing fingers? Do you want it to end? Attend this webinar on how to accelerate the mean-time-to-repair for network performance problems, without an actual war in the war room.
  • Start delivering on your key datacenter initiatives with peak efficiency, agility, and lower costs. Join our panel of experts as they discuss the transformative technologies that are putting datacenters on the fast track to fitness.

    Join the panel discussion and learn:
    - How Empire Life lowered their infrastructure costs by 60% and reduced their datacenter footprint by 16:1
    - The questions you should be asking to assess your environment’s current fitness level
    - How technologies like server virtualization, hyperconverged architectures, and hybrid cloud strategy can help
  • Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • HP’s new Automation solution offering for the mid-market is an excellent way for customers to manage their day-to-day tasks and operations with ease, all from a single virtual appliance.

    Register for this webinar to hear more about HP Data Center Automation Appliance and how the new virtual appliance combines HP’s market leading Data Center Automation strengths from HP Server Automation (SA) and HP Operations Orchestration (OO), into a production-ready virtual appliance that can be easily personalized.

    During this webinar we will also highlight key use cases behind the new virtual appliance, such as:
    • Powered change management using industry leading out of the box content
    • Process IT Operations made easy
    • Frontline defense (control access to servers as well as securing exploits or open server and application vulnerabilities in the datacenter)
  • ​Do you have network performance monitoring tools, but you still can’t figure out what the problem is? Are you experiencing VERY expensive downtime, resulting in customer churn? Do your IT organizations spend all their time pointing fingers? Do you want it to end? Attend this webinar on how to accelerate the mean-time-to-repair for network performance problems, without an actual war in the war room.