Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Nov 15 201855 mins
Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.
External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.
Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata,Recorded: Nov 15 201860 mins
Ready to learn how to manage persistent storage for containers in the multi-cloud environment?
Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.
In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.
Anubhav Sharma, VP, Business Development, Nirmata
Michael Ferranti, VP, Marketing, Portworx,
Paul Nashawaty - Product & Solution Marketing at HYCU | Devon Helms - Marketing Strategist at NutanixRecorded: Nov 15 201841 mins
Scaling out your file-based data storage just got easier. Never again do you have to sacrifice protection of an on-premise deployment with a seamless public cloud experience.
Your Enterprise Cloud brings a common software layer to eliminate the complexity of deploying and managing separate infrastructures.
Join this webinar and learn how to increase capacity dynamically while enhancing the protection and recovery of files and scaling on-demand.
Throughout the webinar we will walk you through:
-Recovery leveraging snapshots for impact-free backups
-Reduction of incremental backups by up to 90% with Change File Tracking (CFT)
-Protection of your files with agentless backup and recovery
Storage Switzerland, Micro FocusRecorded: Nov 15 201857 mins
The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.
Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.
By attending this webinar you’ll learn how to:
* Implement service levels like RPO and RTO throughout the data center
* Establish NEW service levels for copy management and recovered performance
* Fix the disconnect between service levels and data protection applications
Charles Milo, Nic Bellinger, Narasimha Valiveti, Bill Borsari, Sailesh MitalRecorded: Nov 15 201861 mins
Have questions on how to automate your data environment at scale and want answers? No presentations, no scripts, no marketing gimmicks, just your questions answered straight up without intervention by corporate hacks. Special guest, Charles Milo, Senior Solutions Architect at Intel joins our senior team of geeks from Datera to answer your questions on how to massively scale and automate a high-performance data environment using applied machine learning to achieve a software defined data infrastructure. You'll learn about what works and doesn't work with a 100% software-driven infrastructure used to power cloud-native applications, get the most out of new technologies like new flash drives and NVMe and not just what Datera does, but why we built the system the way we did and how it operates to powers your data.
Bring your questions, and challenge Nic Bellinger, Chief Architect, Bill Borsari, Field Technical Leader, Shailesh Mittal, Senior Software Architect, and Narasimha Valiveti, our Head of Engineering and Charlie will sit down, geek out with you and get all your questions answered on data today.
Brandon Dunlap, Moderator, (ISC)², Jason Garbis, Vice President Cybersecurity Products, CyxteraRecorded: Nov 15 201860 mins
There are a large proportion of business critical legacy applications unable to accept modern forms of authentication.
Refactoring legacy applications is costly and sometimes virtually impossible. Yet these applications are accessing highly valuable data across networks and they are a data breach ready to happen.
Join us as we discuss how to secure legacy applications with modern Zero Trust security.
Brandon Dunlap, (ISC)² Moderator and Jason Garbis from Cyxtera will discuss:
-Problems with how legacy applications are secured today
-Options for security without refactoring these applications
-Simplicity and speed to security that reduces operational complexity and scope of audits
-A process for gradual end-of-life legacy assets, while still operating day-to-day normal business
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Nov 14 201843 mins
A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).
In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:
- Business drivers for a SIEM
- What is/is-not included in a SIEM
- SIEM deployment options
- Outsourcing considerations – MSSP vs MDR
John Kim, Mellanox; Saqib Jang, Chelsio; Fred Zhang, IntelRecorded: Nov 14 201844 mins
Scale-out storage is increasingly popular for cloud, high-performance computing, machine learning, and certain enterprise applications. It offers the ability to grow both capacity and performance at the same time and to distribute I/O workloads across multiple machines.
But unlike traditional local or scale-up storage, scale-out storage imposes different and more intense workloads on the network. Clients often access multiple storage servers simultaneously; data typically replicates or migrates from one storage node to another; and metadata or management servers must stay in sync with each other as well as communicating with clients. Due to these demands, traditional network architectures and speeds may not work well for scale-out storage, especially when it’s based on flash. Join this webinar to learn:
•Scale-out storage solutions and what workloads they can address
•How your network may need to evolve to support scale-out storage
•Network considerations to ensure performance for demanding workloads
•Key considerations for all flash
Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, CitrixRecorded: Nov 14 201857 mins
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Christine Quan and Caitlan Yu, solutions engineers at Periscope DataRecorded: Nov 13 201816 mins
In a more aggressive competitive landscape than ever, data analysis is proving to be the key differentiator between winners and losers. But simply collecting information is not enough to get ahead; companies have to be able to blend data and build effective visualizations in order to optimize their business intelligence.
To create a dashboard that can be used as single source of truth, there are many steps that need to be taken. Join Christine Quan and Caitlan Yu, two solutions engineers at Periscope Data, as they discuss the process to create this common data resource, such as:
- Nurturing cross-team partnerships between chart creators and consumers
- Sharing knowledge of data sources and connecting them to business value
- Choosing the right chart type for an insight
- Building advanced charts in R and Python
This is part one of a two-part “One Dashboard to Rule Them All” webinar series. Make sure you keep an eye out for the companion webinar, “One Dashboard to Rule Them All: The Business Impact,” presented by Greg Strickland, COO at Periscope Data.
Storage Switzerland and Pluribus NetworksRecorded: Nov 13 201861 mins
Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can be confusing, and migrating away from legacy infrastructure can seem fraught with peril. Is the journey worth it?
Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
• What are the benefits of open networking and SDN in the data center?
• How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
• How do I deploy SDN in my data center and do I need a full hardware refresh to do it?
Register before November 9th and receive an exclusive copy of Storage Switzerland's newest eBook "Virtualizing and Automating the Network - A Guide to White Box Switches, Network Operating Systems and Software-Defined Networking."
Stacey Miller, Product Marketing Manager, SUSE Global Services & Jeff Loomis, SUSE Services Director, North AmericaRecorded: Nov 13 201826 mins
The digital economy is here and you are under tremendous pressure to transform your IT department to meet the new normal of delivering exceptional customer experiences. At the same time, you have to continue to meet the needs of everyday business and maintain core legacy IT systems. With skills scarce and in high demand, how do you do both?
The answer is partnering with a trusted open source provider with a strong services arm. One who can jumpstart your transformation and stand by your side as an advocate for your business.
SUSE Global Services has flexible consulting delivery solutions and premium support services options to maximize value from open source solution investments.
Lindsay Drabwell, Head of Membership EMEA, (ISC)², Malcolm Murphy, Chief of Staff EMEA, InfobloxRecorded: Nov 13 201858 mins
Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into:
•The level of visibility these organizations have, especially in today’s complex network deployments
•Their use of threat intelligence and the effectiveness of threat intelligence
•The efficiency of their security operations
Adrian Rowley, Technical Director EMEA, Gigamon, Lindsay Drabwell, Head of Membership Services EMEA, (ISC)²Recorded: Nov 13 201858 mins
Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
Radha Manga Sr. Director Customer Solutions at Pure Storage & Pratik Chava,Technical Sales leader, CohesityRecorded: Nov 13 201841 mins
Its no secret that data quantities are increasing relentlessly, well expectations for fast performance are making Flash memory more prevalent than ever. At the same time, organizations of all sizes are relying on coming to the cloud to augment their IT Infrastructure. In this challenging environment, data protection technologies have never been more important
Experts from Pure Storage and Cohesity will discuss the industry’s first all-flash, scale-out file storage, purpose-built for high-performance and immediate access to mission critical file and object data.
Pure Storage FlashBlade provides unparalleled performance across a broad range of environments. Cohesity, the leader of hyperconverged secondary storage makes your data work for you by consolidating secondary storage silos onto a web-scale data platform that spans both private and public clouds.
Louis Evans, Product Marketing Manager - Arctic Wolf NetworksRecorded: Nov 8 201832 mins
There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?
In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.
We’ll discuss how:
- Human-AI hybrid solutions deliver security that’s more than the sum of its parts
- SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
- Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies
To see how you can beat the big threats of 2018, register now!
Storage Switzerland, KeepItSafe, VeeamRecorded: Nov 8 201862 mins
Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as well as endpoint need inclusion into the organization’s disaster recovery plan.
Today disasters like ransomware and other cyber-threats can impact both data center servers and user endpoint. And, both endpoints and data center servers are susceptible to “minor” disasters like hardware failure and software bugs, which at the time seem major to those impacted. Endpoints, unlike servers also face another type of disaster loss or theft.
Register now for our upcoming webinar where experts from Storage Switzerland, Veeam and KeepItSafe discuss how to create a disaster recovery plan that covers all of the organizations digital assets.
Sam Kumarsamy, Senior Product Marketing Manager, GigamonRecorded: Nov 8 201838 mins
Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.
To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to Next-Generation Network Packet Brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:
• Delivers complete network-wide visibility across physical, virtual and cloud environments.
• Scales metadata extraction for improved forensics.
• Isolates applications for targeted inspection.
• Gives you visibility into encrypted traffic for threat detection.
See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:
• Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
• Scale to speed of the network without “rip and replace” by load balancing across tool groups.
• Remove single points of failure and increase availability of both the tools and the network.
• Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.
Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
Brandon Dunlap, (ISC)², Nick Trigg, BitSight Technology, Thomas Born, Vodafone Group ServicesRecorded: Nov 8 201860 mins
In the last (ISC)² and Bitsight webinar we covered good reasons for utilising security ratings, covering the big topics of visibility, collaboration and agility.
Join us for this session where Nick Trigg, BitSight’s Risk Consultant, will share real life examples and use cases. Alongside Nick, we are pleased to welcome Thomas Born, Chief Security & Privacy Officer from Vodafone Automotive at Vodafone Group Services who will share his topical experiences.
To catch up on Part 1 in this series, copy and paste the following link in your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=336859
Lionel Meoni, Systems Enginee Manager, Rubrik FranceNov 20 20189:00 amUTC33 mins
Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise
Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, CitrixNov 20 201811:00 amUTC48 mins
Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.
Discover how Citrix Workspace:
• Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
• Extends the perimeter into cloud apps and across multiple devices and networks
• Automates image management and provisioning to move workloads from datacenters to any cloud
• Enables choices of devices from a single endpoint management solution
• Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
• Improves the experience of mobile apps with secure email integrated with Slack
Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Richard Archdeacon, Duo, Daniel Cuthbert, Banco SantanderNov 20 20182:00 pmUTC60 mins
As early as 2003 the Jericho Forum was created to tackle "de-perimeterisation" and later in 2014 Google released their "BeyondCorp" paper detailing how they made it happen. However, have Zero-Trust security models been adopted in the enterprise and what challenges do organisations face when considering de-perimeterisation?
Join the discussion between Richard Archdeacon from Duo Security and Daniel Cuthbert from Banco Santander in Part 2 of the Zero Trust series and learn about Zero Trust deployments within the enterprise.
Richard Archdeacon, Advisory CISO, Duo Security
Daniel Cuthbert, Global Head of Cybersecurity Research, Banco Santander
For Part 1 in the Zero Trust Series, copy and paste this link into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part2
George Anderson, Director of Product Marketing at WebrootNov 20 20183:00 pmUTC60 mins
Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.
We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.
• Understanding Machine Learning (ML)
• How ML can stop zero-day and never-before-seen threats
• The importance of contextual analysis and predictive analytics
• Real-world results from the “new” ML technology
• How ML Directly Benefits your Customers
Shawn Meyers, Principal ArchitectNov 20 20185:00 pmUTC60 mins
So you have your Availability Groups (AG) configured and everything reports green. Learn how to measure for Service Level Agreement (SLA) compliance! Know when replication is delayed! Get notified when a failover occurs! In this session, we will teach the attendee how to implement proper monitoring and alerting. We will also show you what metrics and reports you should be reviewing regularly to ensure there are no surprises, such as pauses replication or unacceptable delays. For example, we will look at the DMVs, extended event sessions, perfmon counters, SQL agent jobs and alerts. We will show what to monitor in your AG, and how to setup alerting so you know when to take action.
Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, CitrixNov 21 201811:00 amUTC53 mins
Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.
Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.
This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:
• UEM and how it fits into a Digital Workspace
• Managing endpoints through Citrix UEM
• The future of Citrix UEM
Brandon Dunlap, Moderator, (ISC)², Karl Lankford, Lead Solutions Engineer EMEA, BomgarNov 22 20181:00 pmUTC60 mins
Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). Our own research backs this up with the 2018 Privileged Access Threat Report revealing organizations using automated PAM technology experience far fewer serious breaches than those that did not. Karl Lankford, Lead Solutions Engineer EMEA at Bomgar will discuss what ‘privilege’ means to your business and how implementing a PAM solution can drive significant improvements across the organisation. You will learn:
•Why organisations should make PAM their top 2019 investment
•Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success
•Help you to prepare the business case for your PAM project and to get Executive Leadership buy in
Tom Gempe und Terence Canaday, Systems Engineers bei Pure StorageNov 23 20189:00 amUTC60 mins
"Im ersten Teils dieses Webinars werden wir einen Architekturvergleich zum „standortübergreifenden synchronen Spiegel“ mit Blick auf die Verwendung von VMware vSphere beleuchten. Dabei gehen wir abgrenzend zu anderen Herstellern und Lösungen auf die Vorteile des Pure Storage ActiveCluster detailliert ein, um den automatischen transparenten Failover der ESXi Server in den einzelnen Szenarien zu würdigen.
Im zweiten Teil des Webinars geht es um VVOLs mit Pure. Was sind VVOLs, was machen VVOLs eigentlich und wie gehen wir mit VVOLs um. Eine kurze Darstellung, was sich VMware bei VVOLs gedacht hat, und warum wir die besten dafür sind."
Michael Bill & Michael Jonas, SUSE Linux GmbHNov 23 20189:00 amUTC60 mins
Im September hat SUSE die Version 5.5 von SUSE Enterprise Storage vorgestellt. Die skalierbare, zuverlässige und fehlertolerante Storage-Lösung auf Basis von Ceph wurde bereits mehrfach ausgezeichnet, zuletzt mit dem Storage Insider Award in Platin. Mit einem innovativen Subskriptionsmodell, einem umfassenden Hardware-Zertifizierungsprogramm und technischem Support hat es SUSE geschafft, dass sein Enterprise Storage-Server die niedrigsten Gesamtbetriebskosten (TCO) aller softwaredefinierten Storage-Lösungen am Markt aufweist.
Die neue Version SUSE Enterprise Storage 5.5 bietet zahlreiche Neuerungen wie openATTIC-Erweiterungen und Open-Stack-Integration. Erfahren Sie im Webinar mehr über die neuen Funktionen und Einsatzmöglichkeiten.
Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Ollie Sheridan, Principal Engineer, GigamonNov 27 20181:00 pmUTC60 mins
In this webcast Ollie Sheridan, Principal Engineer at Gigamon talks about the benefits of moving your SOC into the Cloud and how this differs from the challenges of creating a SOC yourself by combining monitoring tools and integrating them into an onsite SIEM.
During this presentation you will learn:
•How the security market is changing
•The paint points of implementing and managing your own SOC
•How and why you would put security into the cloud
Michael Tabron & Jay Kruemcke, SUSE Linux for Arm Experts, SUSENov 27 20183:00 pmUTC60 mins
The Arm server market is finally starting to take off.
We have seen the first HPC clusters based on Arm processors hit the TOP500 HPC list and how customers have started to use SLES for Arm to move their manufacturing lines into the future.
This webinar will review what is new with the Arm industry and how SUSE Linux for Arm can address customer needs from IoT to HPC.
Mory Lin, DIrector, Embedded System Product, SupermicroNov 27 20184:00 pmUTC60 mins
Accelerate and transform computing convergence at the edge using software-defined networking (SDN) hardware and infrastructure solutions from Supermicro and Intel. Universal customer premises equipment (uCPE) is an emerging category of network functions virtualization (NVF)-based edge computing and service provisioning systems. This new generation of systems provides network platform suppliers, systems integrators and software vendors the ability to quickly deliver managed services using software-driven and virtual network functions (VNFs). Intel® Select Solutions are verified hardware and software stacks that are optimized for specific software workloads and are designed to be easy to deploy. Join us on this webinar to learn how Supermicro’s verified Intel® Select Solutions for uCPE are enabling customers in their deployments.
Johna Till Johnson, CEO & Founder, Nemertes ResearchNov 27 20184:00 pmUTC60 mins
Enterprise Architecture is dead. Long live Enterprise Architecture!
In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed, inflexible architecture.
Next-generation Enterprise Architecture needs to be fast, flexible, and as adaptive as next-generation development methodologies. It needs to encompass the radical changes in infrastructure, from virtualization to cloud- and mobile-first.
And it's absolutely essential for enterprises who want to align their technology investments with their fast-moving business goals.
This webinar reviews the fundamentals of enterprise architecture and provides a blueprint for a next-generation EA that encompasses DevOps, cloud, mobility, virtualization, microservices, and more!
Paul Moxon, VP Data Architecture and Chief Evangelist, DenodoNov 28 20181:30 amUTC60 mins
Market research shows that around 70% of the self-service initiatives fare “average” or below. Denodo 7.0 information self-service tool will offer data analysts, business users and app developers searching and browsing capability of data and metadata in a business friendly manner for self-service exploration and analytics.
Attend this session to learn:
- How business users will be able to use Denodo Platform integrated google-like search for both content and catalog
- With web based query UI how business users can refine queries without SQL knowledge
- With tags and business categorization, how to standardize business / canonical views while decoupling development artifacts from the business users
- The role of information self-service tool
- Product demonstration
- Summary & Next Steps
Chris Marsh of 451 Research & Matt Crawford of CitrixNov 28 20181:00 pmUTC55 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMwareNov 28 20184:00 pmUTC75 mins
To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
Storage Switzerland, Caringo, Cloudian, ScalityNov 28 20186:00 pmUTC60 mins
Join Storage Switzerland, Caringo, Cloudian and Scality, for a live roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts will discuss what object storage is, what is better/different about object storage than other types of storage and what are the use cases enterprises should consider.
Our Object Storage Panel will provide specific details on how to get started with object storage, what use cases pay the most immediate return on the investment and where object storage fits in an organization's overall storage strategy. The panel will also discuss what is coming next in object storage. Each expert will also give a brief overview of their company's object storage solution. We will close out the roundtable by taking questions from our live audience.
By attending one webinar, you’ll learn everything you need to know about object storage, provide actionable information in developing an object storage strategy and hear from three top vendors about how their products will fit into those plans.
W. Curtis Preston, Chief Technical Architect, DruvaNov 29 20183:00 pmUTC44 mins
Momentum of cloud adoption for virtual workloads continues to grow, but it’s not without challenges. While there are a variety of motivations driving this transition, one thing is clear: organizations are still figuring out what the best approaches are. No matter where you are on your journey to the cloud, understanding the role the cloud plays with your virtual environment has become an integral part of your IT initiatives.
Join us for this presentation by W. Curtis Preston where he will discuss the recent findings from Druva’s “2018 State of Virtualization and the Cloud Survey,” such as:
- Cloud adoption trends for virtual workloads
- The challenges organizations face on their journey to the cloud
- The motivations - and risks - associated with these IT initiatives
- How organizations globally are approaching moving virtual workloads to the cloud
Storage Switzerland and HitachiNov 29 20186:00 pmUTC60 mins
Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them to not only protect data but also organize it so it can be found and deleted on request. Traditional backup and archive are ill-equipped to help organization adhere to these new regulations.
In this live webinar join Storage Switzerland and Hitachi Vantara for a roundtable discussion on the meaning of these various regulations, the impact of them on traditional storage infrastructures and how to design a storage architecture that can meet today’s regulations as well as tomorrows.
Rob Arnold, Industry Principal, Connected Work, Frost & SullivanNov 29 20187:00 pmUTC60 mins
Is your workforce built for disruption and a rapidly ever-changing future of work?
Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.
• Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
• Discover the devices and applications that will support the workplace of the future.
• Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
Sam McLane, CTSO, Arctic Wolf NetworksNov 29 20187:00 pmUTC37 mins
Cybersecurity is the biggest risk law firms face, and they can expect to face greater scrutiny from clients on how they use, store and protect client data. An effective cyber risk program often requires advanced threat detection and response capabilities that can challenge even a well-resourced internal IT team. While many recreations and online exploits are presented from the attacker's point of view, what do these attacks look like on the defender's side?
In this webinar, top security operations center (SOC) expert, Sam McLane, will share war stories on how attacks appeared in targeted organizations, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.
After attending, we will help you answer the following key questions:
- How can law firms demonstrate to their clients the effectiveness of their cybersecurity programs?
- What are the key risk factors that law firms face and how can they be mitigated?
- Why are law firms particularly vulnerable to the new cyberattacks that are becoming more prevalent?
- What is the right way to manage a cybersecurity breach?
Register now to hear from this security expert!
About our key speaker:
Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
Steve Hunt, Dir. Product Management - DataCoreNov 29 20187:00 pmUTC60 mins
IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.
This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.