Virtualization

Community information
Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
  • Michael DePetro, Sr. Technical Delivery Manager, Americas PIM Practice, Informatica, brings 15+ years’ experience to the table in successful Master Data Management projects. Implementing a Product Information Management solution is not just installing an IT tool. PIM is a program enabler for information transformation in the enterprise for both Business and IT.

    In this webinar, Michael will share his expertise on key agilities when implementing PIM in order to drive business goals like omnichannel ready experience, faster time to market, operational efficiencies or regulation ready data.

    - Expectations
    - Change Management
    - PIM Enterprise Approach
    - Time Lines
    - Core Team Utilization
    - Partners in Implementation
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
  • Smaller companies and enterprises face the same challenges when it comes to attracting top talent. Both need to offer the flexibility to work anywhere, anytime while retaining control of sensitive data and intellectual property. Desktop and application virtualization can solve this problem, but until now it had been too costly and complex to justify smaller deployments.
    Join experts from Cisco and discover how the Cisco UCS Mini with Nimble Storage offers a small business-ready infrastructure with enterprise power. You will learn how you can quickly and easily deploy 500 virtual desktops with XenDesktop/XenApp.
  • Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • Willbros, a leading infrastructure contractor serving the oil and gas industry, leverages Amazon Web Services (AWS) and Trend Micro Deep Security to quickly design and deploy agile, secure cloud solutions to protect their vital data. Moving to AWS allows organizations to leave their infrastructure behind and start fresh – architecting for flexibility and scalability. However, bottlenecks are created when traditional on-premises security approaches and tools are used. Learn how Willbros unleashed innovation in the energy industry by taking a greenfield approach to security in AWS. Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share their experience on how they achieved building robust and secure pipeline management systems in the cloud.

    In this webinar you’ll learn how to:
    - Architect a secure application using a combination of AWS services, Trend Micro services, and configurations
    - Understand how host-based protection improves application security, as well as agility and flexibility
    - How to protect workloads from attack, without hampering performance
  • Cloud and data center security can be dauntingly complex, and selecting the right vendor to engage with is a critical decision for any enterprise. However, cloud and data center security can be a difficult market to navigate. Are vendors backing up their marketing claims? How do different approaches stack up next to each other? What factors need to be taken into consideration when comparing products? Trend Micro has teamed with analyst firm ESG to sort these questions out, and encourage organizations to think differently when it comes to cloud and data center security.

    ESG conducted an independent economic evaluation to investigate the differences between Trend Micro and traditional security approaches, and are conducting a live webinar to present their findings. ESG and Trend Micro will give insight into the cloud and data center security market, ESG’s Economic Value Validation methodology, and the conclusions that were reached about the value Trend Micro is providing to their customers. Join us to learn more!
  • The Top Five Best Practices for Controlling Third-Party Vendor Risks.

    Target, Home Depot, eBay — look at almost any of the seemingly never-ending string of mega-data breaches, and you’ll find a common thread. Stolen or compromised user credentials, belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack path. Often — in as many as two-thirds of cases — those credentials belonged to a third-party; a vendor or business partner who’s been granted internal access to your network. With those credentials in hand, attackers are free to roam about your IT infrastructure, seeking out and exploiting their ultimate goals. It’s a frustrating — and dangerous — challenge. You have to provide access to vendors, contractors, and business partners — but doing so often introduces unacceptable security risks.
    But these risks are manageable. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches. In this webcast, we’ll discuss:
    • The identity, access, and security governance processes needed to protect your network
    • How to ensure positive user identification to prevent credential theft and misuse
    • Techniques to limit access to only those resources required to satisfy work or business requirements
    • Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    • Establishing monitoring procedures that flag violations and speed forensic investigations
  • Chris Tsilipounidakis gives you an overview of the Tegile IntelliFlash dashboard and user interface. Explore the various widgets, learn how to gain additional insight into storage performance and capacity, and see how you can simplify storage administration with a Tegile Intelligent Flash Storage Array.
  • Do you run mission critical applications in the cloud? If the answer is yes, then you already know how important it is to have visibility into all aspects of your infrastructure. An alert telling you your application is down is no longer sufficient. Today’s IT managers need to be made aware of potential problems before they arise.

    Join me, Dan Waymire, Sr. Account Manager at HOSTING, for a webinar on May 28th at 3 p.m. EST to learn how Hosting can provide unprecedented visibility into your infrastructure, allowing you to be one step ahead of service impacting events. Leveraging the industry leading ScienceLogic platform, I will cover the following:
    •A demonstration of how you can build real-time dashboards showing availability, utilization, and performance of your entire IT infrastructure
    •A walk-through of an Executive dashboard showing your leadership team the application availability in real time
    •IT manager dashboards capable of showing utilization & performance of web servers, database servers, switches, and firewalls all in a single pane of glass
  • User Environment Management (UEM) technologie zorgt ervoor dat alle gebruikers naar tevredenheid kunnen werken op ieder device, terwijl het de IT-omgeving en daarmee het beheer minder complex maakt. Vooral ook in een omgeving met een mix van fysieke en virtuele devices of een combinatie van meerdere devices, locaties of delivery methodes.

    Wil je weten of een UEM-oplossing toegevoegde waarde heeft voor jouw IT-omgeving? Schrijf je dan nu in voor de 5 technische webinars gehost door onze Pre Sales Consultants. Zij gaan in op de vijf belangrijkste redenen om de gebruikerservaring in jouw organisatie naar een hoger niveau te brengen en hoe je dat technisch gezien voor elkaar krijgt.

    Tijdens dit vierde webinar gaan we in op reden #4: Gebruikers willen gewoon dat het werkt. Naast het bespreken van de techniek, laten onze pre-sales door middel van een demo zien hoe je door middel van een UEM-oplossing de ervaring die gebruikers hebben als ze werken op hun systeem versnelt, waardoor de gebruikersacceptatie verbetert en de productiviteit wordt verhoogd. Door een efficiëntere distributie van het profiel- en applicatiebeleid, hoeven gebruikers niet meer te wachten op het laden van die delen van hun omgeving die ze (nog) niet nodig hebben. Daarnaast worden CPU-, geheugen- en schijfruimte op een slimme manier gealloceerd, user density verhoogd en de hardware-eisen verlaagd zodat de algehele kwaliteit van de IT-dienstverlening wordt verbeterd.
  • Even though users and application owners are demanding it, the Always-On Data Center seems unrealistic to most IT professionals. Overcoming the cost and complexity of an Always-On environment while delivering consistent results is almost too much to ask. But the reality is that data centers of all sizes can affordably meet this expectation. The Always-On environment requires a holistic approach, counting on a highly virtualized infrastructure, flexible data protection software and purpose built protection storage.

    Listen in as experts from Storage Switzerland, Veeam and ExaGrid architect a data availability and protection infrastructure that can meet and even exceed the Always-On expectations of an Always-On organization.

    Key Takeaways:

    1. The Criticality of Virtualization
    2. Availability is more than Backups
    3. Disk Backup needs to be production ready
  • In these days of always-on IT, agile provisioning of processing and networking resources, and mobile systems of interaction and engagement, what is missing from the next generation data center is highly available data. Without careful attention to the design of storage infrastructure and how it fits the current meme of active-passive server clustering for high availability, are businesses realizing the potential of software-defined everything?

    Absent a high availability data infrastructure,

    - Critical workload and data are at elevated risk
    - No meaningful gains are made in the reduction of scheduled downtime
    - Storage costs remain high and capacity remains isolated behind proprietary hypervisor software stacks

    Stop rearranging deck chairs on the Titanic! Join Jon Toigo of the Data Management Institute and Sushant Rao of DataCore Software as they discuss the problem of data infrastructure availability and what can be done to address it. It will be time well spent for anyone who is endeavoring to realize the dream of agile, available and resilient IT operations.
  • The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
    * Protect and secure your Windows 2003 Servers after EOS
    * Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
    * Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
  • Hyperscale infrastructure — like that used by Amazon, Google, and Facebook — delivers performance in aggregate and extreme high density — leading to enterprise IT managers incorporating commodity off-the-shelf servers, networking, storage, and a do-it-yourself (DIY) approach.

    While the divergence approach is gaining momentum, so too is the opposite convergence trend. The current convergence fashion has several names: hyper-convergence, engineered systems, appliances, and software-defined compute/networking/storage that are shrink-wrapped in hardware.

    View this on-demand webinar as industry experts Marc Staimer, President & Chief Dragon Slayer, Dragon Slayer Consulting; Enrico Signoretti, Gigaom Research Analyst; and David A. Chapa, Chief Technology Evangelist for Seagate Cloud Systems and Solutions discuss the pros and cons of DIY versus hyper-converged solutions.. Moderating the discussion will be Caroline McCrory, Sr. Director, Gigaom Research.

    Here’s what you’ll learn:

    - Compare and contrast the DIY and Hyper-convergence approaches
    - Processes and procedures for utilizing either
    - Pros and cons of each
    - Systematic methodology (including checklists) in determining which approach works best for a given data center, project, department, location, or application workload
  • Caching is a simple concept, but there is some complexity in implementation. And like everything else in IT, it seems to have it’s own language filled with esoteric terms that don’t always mean what you think they mean. In this webinar we’ll give a quick primer on the two most common caching methods in Enterprise Storage. And we’ll debunk two of the biggest myths while demonstrating some surprising benefits when write-back caching is done right.
  • Chris Tsilipounidakis discuss the ease of provisioning storage on a Tegile Array. In addition, the HA page is discussed, as well as some of the benefits of using Tegile in an Active-Active configuration.
  • Support for Windows Server 2003 ends July 14, 2015. Remaining on this operating system means security risks, high support costs and the end of compliance with payment card industry standards.
    Migrating server data can be a lengthy and complicated process that most IT teams cannot afford to manage alone in parallel with daily operations.
    Learn in this webcast how Dell can help you migrate to a modern cloud operating system, such as Windows Server 2012.
  • The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
    * Protect and secure your Windows 2003 Servers after EOS
    * Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
    * Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
  • Upgrading legacy data centres to handle ever-increasing social media, mobile, big data and Cloud workloads requires significant investment. Yet over 70% of managers are being asked to deliver future-ready infrastructure with reduced budgets.

    But what if you could square the circle: optimise your centre’s design beyond industry standards by incorporating the latest innovations, while achieving a significant increase in efficiency and still maintaining the required availability?
  • Multi-national businesses must have an endpoint backup strategy that goes beyond simple laptop backup and restore capabilities. Organizations with employees in different regions, under different legal jurisdictions, face more complex and complicated challenges to manage and secure data while enabling user productivity. Policies for privacy, security and governance and flexible assignment of regional data storage access are but a couple of unique needs of enterprises that span borders. Join Druva to learn best practices around rolling out a global endpoint backup strategy. Uncover critical points to consider as well as hints and tips to successfully protect laptop and mobile device data using global policy.
  • Dropbox, Salesforce, NetSuite, WebEx… your business keeps adding cloud apps. Everyone high-fives as the server racks are emptied out but then, one day, the overhead of choosing and managing all these apps reaches a tipping point. Finance starts complaining about managing all the vendors. Users tire of remembering complex passwords and take insecure shortcuts. IT tackles endless integration issues. The IT guys feel like crying, but they no longer have a server room to cry in.

    The more apps you add, the harder it becomes to manage your cloud—and to keep it secure.

    Join Alex Smith as he explores the challenges that come with embracing the cloud, or multiple clouds, and gives you solutions that can save you from “Death by 1000 Cloud Apps”.
  • Hear the latest research and trends on the wholesale ethernet services market. Discover why CE 2.0 certification is becoming more important in the RFP process and how to position your services in this growing market. Learn how to strengthen your brand and demonstrates compliance with Ethernet standards, an important consideration for customer quality requirements.