Hi [[ session.user.profile.firstName ]]

Virtualization

  • Facing up to Mobile Security Challenges Facing up to Mobile Security Challenges Stephen McCormack, Mobile Security Leader, IBM MaaS360, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Feb 28 2017 62 mins
    Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
  • SUSE Container as a Service Platform - Grow your Technical knowledge SUSE Container as a Service Platform - Grow your Technical knowledge Rob Knight Recorded: Feb 27 2017 29 mins
    Get some excellent technical details on Container as a Service in only 15 minutes!
  • Do You Really Mean ‘I Need a SOC’? Do You Really Mean ‘I Need a SOC’? Andy Herrington, Fujitsu Services UK Ltd, Paul McEvatt, Fujitsu Services UK Ltd, Adrian Davis, (ISC)² EMEA Recorded: Feb 27 2017 62 mins
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Recorded: Feb 23 2017 53 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Recorded: Feb 23 2017 35 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Reduce the Complexity of OpenStack Neutron Reduce the Complexity of OpenStack Neutron Charlie Gutierrez - Midokura, Frank Rego - SUSE Recorded: Feb 23 2017 37 mins
    Midokura’s award-winning Midokura Enterprise Management (MEM) technology provides a software layer directly within existing physical network hardware, turning physical machines into a virtual platform that can scale to hundreds of thousands of virtual ports. The MidoNet integration with SUSE OpenStack Cloud provides an integrated solution for rapid OpenStack deployment. Now, customers can enjoy the very best possible deployment experience with leading technology from Midokura and SUSE, built to scale right out of the box.
  • DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows Howard Lo, DataON Storage; Cosmos Darwin, Microsoft; Peter Plamondon, Western Digital Recorded: Feb 23 2017 58 mins
    With the launch of Window Server 2016, new storage enhancements bring revolutionary new features within reach of every organization with its software-defined feature setup. With Microsoft Storage Spaces Direct (S2D) and using Microsoft certified and turnkey platforms, customers now have the ability to deploy highly available and scalable software-defined storage deploy converged or hyper-converged cluster storage architecture. DataON’s new MUST infrastructure visibility and management tool provides SAN-like storage monitoring features for customers deploying Windows Server 2016 SDS. The ability to easily view real-time dashboard level metrics for IOPS, latency, throughput on cluster, nodes and volume levels in a single pane of glass, helping you keep your hyper-converged system up and running.

    Join speakers from DataON, Microsoft and Western Digital as they show you how to deploy a Windows Server 2016 S2D hyper-converged solution with DataON MUST.

    The webcast will explore the following topics:

    • How DataON MUST visibility and monitoring tool helps you manage your Windows Server 2016 software-defined storage

    • How Storage Spaces Direct in Windows Server 2016 allows you to build software-defined storage using Microsoft-certified industry-standard servers with local storage

    • How Western Digital storage solutions support Windows Server 2016

    Presented by:
    Howard Lo, VP of Sales and Marketing, DataON Storage
    Cosmos Darwin, Program Manager II, Microsoft
    Peter Plamondon, Director, Strategic Partner Ecosystems (Microsoft), Western Digital
  • Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Recorded: Feb 23 2017 11 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: Networking and Security for Virtual Desktops and Mobile Devices
    Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources.

    In this session, we will discuss:
    •Using intelligent networking and micro-segmentation to make VDI environments more secure
    •Minimizing your attack surface with rules and policies for dynamic virtual desktops
    Extending security from mobile devices and applications to the data center
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Recorded: Feb 23 2017 62 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • The 5 Essentials of Unified Endpoint Management for Windows 10 The 5 Essentials of Unified Endpoint Management for Windows 10 Jason Roszak, Director, Product Management, VMware Recorded: Feb 23 2017 50 mins
    Keep your endpoint devices, apps and data securely managed on or off the domain. With VMware unified endpoint management, you’ll remediate vulnerabilities faster, deploy patches instantly and install Win32 software quickly, reliably and consistently.
    Topics include:
    •Consolidate Windows management across devices on or off the domain
    •Deliver and install Win32 software reliably and quickly
    •Deploy security patches instantly and remediate vulnerabilities faster
    •Unify endpoint management functions across desktops and mobile devices
    •Find out how other organizations are using unified endpoint management for Windows 10
  • HPE ITSM Automation and Containers – Accelerating Deployment and Time to Value HPE ITSM Automation and Containers – Accelerating Deployment and Time to Value Michael Pott, Scott Knox, Greg W. Morrison, HPE Recorded: Feb 23 2017 53 mins
    More IT and computing is moving to public networks such as Amazon Web Services (AWS) and Microsoft Azure. Increasingly, internal/private IT is being restructured to provide similar services. Along with this are changes in the ways applications are being built, deployed, and maintained reflected by the rapid adoption of containers and microservices. What does this mean to IT Service Management and the service desk organization?

    Join this webinar to learn w HPE Software and our ITSM Automation (ITSMA) solutions are doing to both take advantage of these trends and also help support these trends. We’ll discuss the benefits to the service desk team of faster deployments, quicker time to value, and reduced administration and maintenance. Please join us to learn more about what HPE ITSMA provides today and what’s coming soon.
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Recorded: Feb 23 2017 16 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 2/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • Moving on with Salt and SUSE Manager Moving on with Salt and SUSE Manager Donald Vosburg Recorded: Feb 23 2017 28 mins
    When was the last time you looked at SUSE Manager? Are you running an older version? Are you running Satellite 5.X or Spacewalk?

    SUSE Manager has powerful capabilities that you may not know about, especially as SaltStack integration progresses.

    In this webinar we will highlight some of the great integrations that has already been done. Then, our focus will turn to getting there from where you are: migrating from existing SUSE Manager, Satellite, or spacewalk. We will show how to migrate your server to SUSE Manager, and clients to SaltStack minions with practical tips.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Recorded: Feb 22 2017 34 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud John Meadows - Talligent, Frank Rego - SUSE Recorded: Feb 22 2017 36 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Recorded: Feb 22 2017 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Recorded: Feb 22 2017 46 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies Recorded: Feb 22 2017 58 mins
    In the application economy where traditional business is being disrupted, velocity, agility, quality and customer experience is critical for enterprises to drive differentiation to remain competitive. While many believe that DevOps is only for startups and unicorns, forward-thinking organizations are focusing on unlocking the potential of their mainframe investments to drive their Business Technology culture, leveraging DevOps practices including agile development, automated CI/CD pipelines, testing and release automation, to deliver differentiated products and services.

    Join guest speaker Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies, for an in-depth discussion on how bringing DevOps to the mainframe can challenge traditional development methodologies, delivering code faster with greater quality in responding to escalating market demands.
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Recorded: Feb 21 2017 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources Silvia Siqueria, HPE, Mohammed Wahab, HPE Recorded: Feb 21 2017 61 mins
    Struggling to manage time, cost and resources across your business applications? Are you missing real-time critical information to make the right investment decisions at the right time? Then join us as we hear how industry practitioners standardize, manage and capture execution of their projects, resources and operational activities.

    Examine best practices by your peers who are using HPE Project and Portfolio Management to provide the business both visibility and data consolidation as they govern and collaborate across application projects and portfolio. Learn how they have differentiated their application delivery through speed and agility, while at the same time reducing costs for quality IT operations.

    Explore out-of-the-box methods for tracking project time, cost and resources
    Learn easy ways to establish standardization for your HPE PPM environment
    Hear customer-proven methods for project governance and collaboration through HPE PPM
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Recorded: Feb 21 2017 64 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • How to Leverage Application Monitoring for Enterprise Cloud Infrastructures How to Leverage Application Monitoring for Enterprise Cloud Infrastructures Bala Vaidhinathan, CTO of eG Innovations Tommy Gustaveson, Alliance Manager, Nutanix Recorded: Feb 21 2017 59 mins
    With comprehensive end-to-end network monitoring and an industry-leading Enterprise Cloud Platform, learn how you can elevate IT making the hyper-converged infrastructure invisible and empower your organization to focus on what matters most – application performance.

    Together, Nutanix and eG Innovations offer a fully validated, hypervisor-agnostic platform designed to optimize the deployment, management, and scale of virtual desktop infrastructure environments. The goal? To avoid performance degradation and deliver the best user experience.

    In this webinar, you will discover how eG Innovations and Nutanix are collaborating to:

    - Make Citrix VDI more simple, cost-effective, and hypervisor-agnostic
    - Correlate application and virtualization performance to pinpoint and solve the root cause of performance problems
    - Deliver optimal VDI User Experience using enhanced monitoring and management for Citrix VDI deployments
    - Get insights to optimize and right-size your Nutanix infrastructure, avoid downtime and improve datacenter efficiency, invest wisely and reduce the cost and complexity of IT operations management
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Recorded: Feb 21 2017 61 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Key Considerations for Migrating Graphics Workloads to the Cloud Key Considerations for Migrating Graphics Workloads to the Cloud Alex Herrera, Sr. Analyst, Jon Peddie Research & Ziad Lammam, Teradici Feb 28 2017 6:00 pm UTC 45 mins
    Moving to “The Cloud” is becoming a norm these days as it now provides better security and flexibility that enterprises are looking for in today’s ever growing “Big Data” landscape! Organizations with graphics workloads and interactive applications are looking for ways to consolidate their workstations to decrease CapEx and OpEx while ensuring data security for a disperse and mobile workforce.

    Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will talk about on how enterprises can collocate their graphics intensive applications and workstations in the cloud to increase productivity and enhance collaborative working environment for creative professionals and design engineers in various verticals like: Media & Entertainment, Automotive & Manufacturing, Architecture, Engineering, Construction.

    This webinar will introduce key considerations in moving high-performance workstation to the cloud and provide valuable insights including:

    • Physical workstations vs. virtual workstations in the cloud
    • Choosing among cloud workstations - Private, Public or Hybrid
    • What to consider when moving to the cloud

    Teradici’s CTO Randy Groves will share how Cloud Access Software and PCoIP technology can enable you to securely migrate graphics intensive workloads and applications to the cloud while providing a seamless and “workstation-like” end user experience.

    Those who attend the webinar will receive a copy of the slide deck.

    Q&A will follow at the end of the session.
  • Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Bich Le, Co-founder and Chief Architect, Platform9 Feb 28 2017 6:00 pm UTC 45 mins
    Container technology is hot and evolving every day by leaps and bounds. Just why are containers so attractive and how are they different from VMs? To add to the confusion, complex container environments need orchestration solutions, such as Kubernetes, to be managed effectively. There are a few different ways to deploy these solutions, each with their own drawbacks and benefits. In this BrightTALK session, we'll take a look at containers, container orchestration, and walk through a real-world application that shows why containers are leading the way.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Getting Started with Hyperconverged Infrastructure Getting Started with Hyperconverged Infrastructure Sushant Rao, Sr. Director Product & Solutions Marketing, DataCore Software Feb 28 2017 7:00 pm UTC 45 mins
    Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.

    But, is HCI right for you? What use cases make sense for HCI?

    Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:

    - Use cases suitable for HCI
    - Criteria to evaluate HCI products
    - Pros and cons of different vendors’ HCI
    - Avoiding the missteps of early adopters
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Feb 28 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • Operatonal Simplicity in the Datacenter with Containers Operatonal Simplicity in the Datacenter with Containers Cody Hill, Lead Systems Engineer Platform 9 and Ashok Rajagopalan, Head of Product Datera Mar 1 2017 6:00 pm UTC 60 mins
    Join Platform9 and Datera to learn how their software solutions can provide the DevOps agility, and operational simplicity of the cloud for containers. Mainstream adoption of stateful applications have been foundational for containerized applications to get widely deployed.

    With Datera Elastic Data Fabric and Platform9 Managed Kubernetes, customers can manage any application on Containers.

    You will learn:

    How to automate provisioning
    How this solution simplifies operations and management
    How to save costs with elasticity
  • Test di Performance come parte integrante del ciclo di sviluppo software. Test di Performance come parte integrante del ciclo di sviluppo software. Domenico Maracci Mar 2 2017 10:00 am UTC 45 mins
    Con la Digital Transformation le performance applicative e la User Experience sono diventati fattori determinanti per il successo di un’iniziativa digitale. Allo stesso tempo l’adozione di metodologie Agile impone un approccio “as-a-code” nella gestione di tutte le fasi del ciclo di vita del software. È per questi motivi che risulta fondamentale indirizzare la verifica delle performance già dalle prime fasi dello sviluppo software, abilitando l’esecuzione dei Test di Performance già nei cicli di build di una nuova release.
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • CTO PoV: Enterprise Networks CTO PoV: Enterprise Networks Khalid Raza, CTO & Co-Founder, Viptela Mar 2 2017 6:00 pm UTC 45 mins
    Rapidly changing enterprise application requirements, the cloud, and mobile computing are placing stress on traditional wide area networks (WANs). Enterprises are being challenged to rethink network architectures to meet present and future business requirements.

    Khalid Raza, CTO and Co-Founder at Viptela, will discuss why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging approaches can help organizations adapt to these changes.

    In this webinar, we will cover:

    - Key applications molding enterprise network requirements
    - Impact on current WAN architectures & shift in present and future business needs
    - How enterprise network teams and service providers can adapt the traditional WAN to support new traffic patterns
  • How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving Storage Switzerland, Panzura Mar 2 2017 6:00 pm UTC 60 mins
    Join Storage Switzerland and Panzura in a live webinar on March 2nd as we cover why you should really want to aggressively archive data, what the challenges are to an aggressive strategy and, most importantly, how to use cloud storage to overcome them.
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.

    Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.

    Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Going Beyond with Arcserve UDP Hardware Snapshots Going Beyond with Arcserve UDP Hardware Snapshots Gary Sussman, Kervin Myrtil Mar 2 2017 7:00 pm UTC 60 mins
    Software-based snapshots for VMware & Hyper-V host servers can significantly burden virtual machine performance. The solution, utilize Arcserve UDP hardware storage snapshot copies for high-performance backup without sacrificing virtual machine performance.
  • F5 Herculon Security Overview  F5 Herculon Security Overview  Renuka Nadkarni, Director of Product Management- Application Protection, Joe Peck, Director of Product Management- Access F5 Mar 7 2017 4:00 pm UTC 60 mins
    The new Herculon product family combines the strength of F5’s proven security offerings with dedicated, purpose-built hardware and a simplified, security-focused user experience, allowing security operations teams to quickly and easily deploy solutions that protect against evolving application and network vulnerabilities and attacks. The initial entries in the Herculon portfolio being introduced today are Herculon SSL Orchestrator and Herculon DDoS Hybrid Defender

    The F5 Herculon SSL Orchestrator improves insight into the blindspots and gaps created by the growing use of encryption for applications and their data. The F5 Herculon DDoS Hybrid Defender delivers a multilayered DDoS defense across network, session and application layers.

    In this session, we will discuss how to engage every customer to discuss how they currently address SSL visibility and DDoS challenges.
  • Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Chris Grossmeier, Director of Product Management Mar 7 2017 6:00 pm UTC 45 mins
    Clear the fog around Google Cloud Platform (GCP) hybrid cloud costing. See how to save costs in a hybrid cloud or GCP cloud migration as CloudPhysics rightsizes, and then calculates costs for your running infrastructure. Segment workloads based on real performance and configurations—then map into Google options for greatest savings. Evaluate hosting scenarios: on-premises vs. hybrid cloud vs. dedicated cloud hosting. We’ll address asset utilization, rightsizing, and licensing for migration. Be the company hero with rich operational and cloud costing analysis.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Damia Gilner, Marketing Manager, DataCore Software Mar 7 2017 7:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Is Hybrid IT the new grail? Is Hybrid IT the new grail? Adam Levine, Chief Commercial Officer, Data4; Stephen Worn, DatacenterDynamics Mar 8 2017 5:00 pm UTC 60 mins
    How do you make the right decisions as to how and where to host and manage your IT assets? Cloud added not just a whole new set of choices to the decision, it has changed the way that IT is consumed and paid for, and how IT delivery can be aligned with business needs.

    To make hybrid IT work effectively requires a level of computing capacity, connectivity, efficiency and resilience that most enterprise data centers simply cannot reach without prohibitive investment.

    Join us on 8 March and let DATA4, explain how they have used these increasingly common IT pain points to shape their philosophy and their offering.
  • How to Ensure Your Backups Are Not Held Ransom by Ransomware How to Ensure Your Backups Are Not Held Ransom by Ransomware Ronn Martin, Solution Architect - Veeam and Eric Bassier, Sr Director Datacenter Solutions - Quantum Mar 8 2017 7:00 pm UTC 60 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • vCPE Solution: A Software Defined Virtualization Platform for Diverse Networking vCPE Solution: A Software Defined Virtualization Platform for Diverse Networking SUBHAS MONDAL, DMTS, Chief Architect, Karuppusamy Marappagounder, Principal Architect Mar 9 2017 3:30 pm UTC 60 mins
    vCPE- Software defined virtualization platform for realizing diverse networking functions like branch routing and IoT gateway with a click of a button, powered by open source software on Intel platform.
  • Mobile World Congress 2017: 5 Trends to Watch Mobile World Congress 2017: 5 Trends to Watch TIA, David Heard, John Jacobs, Susan Schramm, Brenda Boehm, Limor Schafman Mar 9 2017 4:00 pm UTC 60 mins
    Sights and Insights from TIA @ MWC17

    The TIA Team will be attending Mobile World Congress 17, one of the leading annual events showcasing the latest in mobile and wireless technologies. TIA hosted its CTO Council Meeting on the Internet of Things [http://www.tiaonline.org/events/cto-council-meeting-barcelona-spain-february-26-2017] on February 26 in Barcelona.

    Join TIA for a post-event webcast on sights and insights from the MWC17 show floor, including discussions between TIA executives, members and communications leaders from around the world highlighting the growing international movement toward 5G, the expansion of Internet of Things (IoT) applications and the proliferation of Smart Communities projects.

    Speakers:

    > David Heard, Chairman of the Board, TIA

    > Brenda Boehm, Chief Strategy Officer and Executive Vice President of Technology and Products

    > Susan Schramm, Chief Marketing Officer & Senior Vice President of Membership and Marketing

    > John Jacobs, Vice President, Market Intelligence and Research
  • "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range Ramzi Zabaneh Mar 14 2017 5:00 pm UTC 60 mins
    “The Wire Can’t Lie”: From packet data to network management wisdom, empowered by Solarflare’s new SolarCapture product range

    This webinar will cover:
    - Consolidated network monitoring can be used to rapidly identify, isolate and solve application and business problems in finance, service provider and government networks, with typical use cases

    - Both ROI and flexibility can be optimized through the powerful feature set of the new SolarCapture turnkey solution, with 40 GbE lossless-to-disk packet capture provided in an open platform

    - SolarCapture is special, key products, functionality and options in the SolarCapture family, as well as details on upcoming product features
  • Tech Talk: Improving App Performance Across All WAN Transports Tech Talk: Improving App Performance Across All WAN Transports Derek Granath and Chris Rogers Mar 14 2017 6:00 pm UTC 60 mins
    Increase the performance of your wide area network and worker productivity with key features that allow you to condition your connectivity, bond different links together to improve application performance, and define QoS profiles based on business policies to ensure that receive the priority, performance and availability they require.
  • Collective Security – Prairie Dogs vs Humans Collective Security – Prairie Dogs vs Humans Jim Hansen, Chief Operating Officer, PhishMe, Adrian Davis, Managing Director, (ISC)² EMEA Mar 16 2017 12:00 pm UTC 60 mins
    As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, Jim Hansen will discuss:
    •Why the cyber security industry is broken
    •How to reduce susceptibility to human-targeted attacks
    •How to empower users to become human sensors to recognize and report suspected attacks
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Mar 16 2017 5:00 pm UTC 30 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Mar 20 2017 12:00 pm UTC 60 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.
    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.
    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:
    - CSIRT playbooks and automation methods
    - The importance of timely CSIRT data access, correlation & visualisation
    - CSIRT staffing approaches
    - CSIRT threat intelligence management
    - Driving CSIRT operational efficiency
    - The importance of CSIRT collaboration across the business during investigations
    - How CSIRT functions can increase business relevance
    - Learn about the importance of understanding your environment
    - Learn about the importance of having the right data
    - Learn the critical success factors for building a CSIRT Team and capabilities
    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues
    - Learn how to justify adding more resources to an incident response team
    - Learn how to introduce consistency into your security team for approaching and solving security problems.