Hi [[ session.user.profile.firstName ]]

Virtualization

  • Everything You Wanted To Know About Storage-Turquoise: Where Does My Data Go
    Everything You Wanted To Know About Storage-Turquoise: Where Does My Data Go Rob Peglar, Symbolic IO, Scott Shadley, Micron, J Metz, Cisco, Chad Hintz, Cisco Aug 1 2017 5:00 pm UTC 75 mins
    In this, the seventh entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into the mysticism and magic of what happens when you send your data off into the wilderness. Once you click “save,” for example, where does it actually go?

    When we start to dig deeper beyond the application layer, we often don’t understand what happens behind the scenes. It’s important to understand multiple aspects of the type of storage our data goes to along with their associated benefits and drawbacks as well as some of the protocols used to transport it.

    In this webcast we will show you more about the following:

    •Volatile v Non-Volatile v Persistent Memory
    •NVDIMM v RAM v DRAM v SLC v MLC v TLC v NAND v 3D NAND v Flash v SSDs v NVMe
    •NVMe (the protocol)

    Many people get nervous when they see that many acronyms, but all too often they come up in conversation, and you’re expected to know all of them? Worse, you’re expected to know the differences between them, and the consequences of using them? Even worse, you’re expected to know what happens when you use the wrong one?

    We’re here to help.

    It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.

    Please join us on August 1st for another edition of the “Too Proud To Ask” series, as we work towards making you feel more comfortable in the strange, mystical world of storage.
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Aug 1 2017 5:00 pm UTC 45 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Tara Callan, Marketing Manager, DataCore Software Aug 1 2017 6:00 pm UTC 60 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Top Use Cases for Deploying and Modernizing your Infrastructure
    Top Use Cases for Deploying and Modernizing your Infrastructure Alan Hsia, Product Line Marketing Manager, VMware Aug 2 2017 3:00 pm UTC 30 mins
    Learn how users are deploying their modern infrastructure and the best projects to target for your modernization project. We’ll discuss best practices for modernizing your infrastructure and results from real-world deployments. We’ll also give you the top uses cases for a modernized infrastructure, including hybrid cloud, enhancing existing applications and enabling new apps, edge computing for disaster recovery and remote offices/branch offices, and for IaaS deployments.
  • The Next Step to Getting NFV on the Fast Track
    The Next Step to Getting NFV on the Fast Track Chandresh Ruparel, Director, Ecosystem Strategy and Intel Network Builders, Network Platforms Group Aug 2 2017 4:00 pm UTC 15 mins
    The industry is experiencing success in deploying NFV technologies to improve the efficiency and agility of their networks. But the rate of deployments is often held back by the complexities of profiling, sizing testing and configuring workloads and even the basic system infrastructure to run them. This session will provide an introductions to a new Intel Network Builders initiative to help resolve some of these complexities and enable a more stable foundation for ramping NFV deployments. Learn about the offerings available through the program and how to participate
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • 5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time
    5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time Alex Berger, Product Marketing Manager, VMware Aug 3 2017 3:00 pm UTC 30 mins
    Cybercrime is growing fast—and traditional security solutions aren’t up to the task of slowing it down. Organizations are pouring huge amounts of time and money into perimeter-centric security, but that’s not adequate on its own anymore. It’s time for a new solution—one that starts with network virtualization and extends to enabling micro-segmentation for data center protection that can handle modern threats.

    In the webcast, you’ll learn:
    - Just how fast cybercrime is growing
    - Why a secure application infrastructure is the answer to today’s security challenges
    - What micro-segmentation is, and how it enables new levels of security
    - How micro-segmentation reduces costs, enables business agility, and supports simplicity
  • Marrying DevOps and Virtualization for Better Deployment Automation
    Marrying DevOps and Virtualization for Better Deployment Automation Jon Benedict, technology evangelist, Red Hat; Moran Goldboim - senior technical product manager, Red Hat Aug 3 2017 4:00 pm UTC 45 mins
    Virtualization configuration management should be an easy and automated process that allows your team to continuously deliver innovation. Furthermore, you need to be able to provide speed, efficiency, and security for the DevOps and virtualization administration teams with simple architecture and management tools.

    In this webinar, you'll learn how Red Hat® Virtualization and Ansible Tower by Red Hat can help your organization to:
    > Quickly and easily provision, deprovision, take inventory, and manage your virtual infrastructure.
    > Empower your non-administrative users to confidently and securely request and manage virtual resources using provided playbooks.
    > Provide flexibility and control while speeding up development.
    > Add new capabilities to your continuous integration, improving the cycle times and agility of your application teams.
  • How to Achieve Converged, Integrated Application & Infrastructure Monitoring
    How to Achieve Converged, Integrated Application & Infrastructure Monitoring Srinivas Ramanathan, CEO, eG Innovations Aug 8 2017 6:00 pm UTC 60 mins
    Troubleshooting slow application problems is one of the toughest challenges that IT organizations face in today's web-based, cloud-driven and dynamic environments. Given the distributed and inter-dependent nature of application frameworks, tracking just the application up/down status and basic CPU and memory utilization metrics is not sufficient anymore. IT administrators need visibility of the real user experience, code-level insights into transaction processing and real-time analysis of the health of the supporting infrastructure.
    Historically, IT organizations have been using different tools for monitoring the application and infrastructure tiers. Lack of integration, need for manual analysis, and expert-intensive troubleshooting have been some of the drawbacks of such a multi-tool strategy. Join us for this webinar to discover how converged application and infrastructure performance monitoring can be achieved to:

    -Provide a one-stop solution for unified and integrated performance visibility of the application and infrastructure tiers
    -Proactively detect user experience issues before online business is impacted
    -Trace business transactions and isolate the exact cause of application slowness
    -Get code-level visibility to identify inefficient application code and slow database queries
    -Automatically map application dependencies within the infrastructure to pinpoint the root cause of the problem
  • Understanding Data Placement, Movement & Availability in your HCI
    Understanding Data Placement, Movement & Availability in your HCI Jeff Hunter, Staff Technical Marketing Architect at VMware Aug 9 2017 3:00 pm UTC 60 mins
    This session builds on foundational understanding of high-level vSAN architecture such as disk groups, fault domains, and cache and capacity tiers. We will begin with some examples of how vSAN distributes data in the cluster to preserve data integrity and availability and how rules in a storage policy affect data component placement. Infrastructure lifecycle management commonly requires hardware maintenance, firmware upgrades, and software patches. A hyper-converged infrastructure (HCI) powered by vSAN is no exception.

    This session will provide technical details on how to verify the health of a vSAN cluster and remediate configuration issues. We will cover the use maintenance mode options to help ensure virtual machines remain online during planned host downtime. The session will conclude with discussion on how vSAN effectively handles the availability of data when a disk or host goes offline temporarily or permanently with little or no warning.
  • SD-WAN Managed Service Use Cases, Challenges and MEF Standardization Work
    SD-WAN Managed Service Use Cases, Challenges and MEF Standardization Work Stan Hubbard - MEF; Peter Agnew - Colt; Ralph Santitoro - Fujitsu Network Communications Aug 9 2017 3:00 pm UTC 75 mins
    SD-WANs have become very popular because they solve current business challenges while leveraging new SDN, NFV, orchestration and cloud technologies. Enterprises have been building SD-WANs for several years but prefer to have a service provider manage the service for them rather than build and operate it themselves. Service providers are challenged to quickly introduce new SD-WAN managed services due to the lack of standardization of service definitions and architectures. Today, SD-WANs come in all types and flavors. In this webinar, you will learn about the MEF's SD-WAN standardization work and different use cases from the perspective of two SD-WAN managed service providers (MSPs) with different delivery models. The webinar will discuss the market drivers and business benefits for SD-WAN managed services and how MEF standardization of SD-WAN services using the LSO reference architecture could address current operational challenges to accelerate service delivery.
  • 3 Reasons Why Flash is Changing Back-Up and Recovery
    3 Reasons Why Flash is Changing Back-Up and Recovery Jack Hogan, CTO and General Manager, Lifescript Brian Reagan, CMO, Actifio, Vaughn Stewart, VP of Technology, Pure Storage Aug 9 2017 5:00 pm UTC 60 mins
    Attend this webinar to find out why and how Lifescript, one of the world's largest women's health care websites serving 10 million customers and a half billion emails monthly have transformed their data centers with AppFlash from Actifio and Pure Storage.

    In this webinar you will learn about:

    - AppFlash, an all flash, enterprise backup appliance improving Business Resiliency & availability
    - How the solution improves internal SLA’s while reducing cost, risk, & complexity of backup & DR
  • Securing Kubernetes Environment
    Securing Kubernetes Environment Liz Rice, Technology Evangelist and Michael Cherny, Head of Security Research Aug 9 2017 5:00 pm UTC 45 mins
    The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.

    In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.

    Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
  • Making Sense of NVMe Flash and Policy-based QoS in SDS
    Making Sense of NVMe Flash and Policy-based QoS in SDS Justin Wheeler, Storage Architect, Intel Data Center NVM Solutions, Mike Beevor, Sr. Technical Marketing Engineer, Pivot3 Aug 15 2017 1:00 pm UTC 60 mins
    Much is being written about how advances in flash, including NVMe, may impact an organization’s storage strategies. In addition, technologies such as storage Quality of Service (QoS) are promising an easier way to provision performance. Not all implementations of these technologies are the same, so how do you determine what best fits your specific applications and business needs?

    In this session, experts from Intel and Pivot3 discuss how combining NVMe flash and advanced, policy-based QoS enables organizations to confidently consolidate multiple mixed application workloads, including performance- and latency-sensitive ones, on a hyperconverged platform using SDS. We’ll discuss the impact of this new solution and what it means to applications, datacenter design and operations.
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sacha Dawes, Principal Product Marketing Manager, AlienVault Aug 15 2017 5:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.

    We'll cover:

    What core security capabilities you need to demonstrate compliance
    The top challenges in meeting and maintaining compliance with PCI DSS
    Best practices to help you plan and prepare for an audit
    How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Aug 15 2017 5:00 pm UTC 45 mins
    What is Docker? What are containers? And why are they so popular?

    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Five Ways to Improve Software-Defined Storage Performance
    Five Ways to Improve Software-Defined Storage Performance George Wagner, Sr. Product Marketing Manager, Pivot3, Juan J. Fernandez, Storage Architect, Intel Data Center NVM Solutions Aug 15 2017 6:00 pm UTC 60 mins
    Consolidating multiple mixed data center application workloads on a Software-Defined Storage (SDS) platform can sometimes feel like rocket science. To confidently consolidate these workloads, including those deemed mission-critical, you need a platform that delivers predictable and low latency performance where and when it counts.

    In this webcast, join Intel and Pivot3 as we share five ways to transform SDS into a workhorse for your traditional data center applications. We’ll discuss the impact on applications and operations, as well as ways to manage your SDS with ease. No PhD in storage performance required!
  • What is "Software-Defined" & Why Should You Care? (It’s More than Just SDS)
    What is "Software-Defined" & Why Should You Care? (It’s More than Just SDS) Eric Slack, Sr. Analyst, Evaluator Group Aug 15 2017 7:00 pm UTC 60 mins
    The term “Software-Defined" sounds like marketing hype but this technology is behind much of current IT systems’ advanced features and functionality - really. And, it didn’t start with software-defined storage. In this webinar Evaluator Group Sr. Analyst, Eric Slack, explains where software-defined came from, how it’s shaping IT infrastructure and what you can expect from this technology.
  • Best Practices Using Software-Defined Storage Management for Database Workloads
    Best Practices Using Software-Defined Storage Management for Database Workloads Shawn Meyers, Principal Architect, House of Brick Technologies Aug 15 2017 9:00 pm UTC 60 mins
    Software Defined Storage is quickly becoming mainstream and not having to deal with all of the headaches of storage management can be a wonderful thing. Placing your tier 1 database workloads onto Software Defined Storage is possible, but it needs to be done correctly. Tier 1 database workloads are typically the most I/O intensive systems in an environment. Consequently, there are additional considerations that need to be taken into account in order to ensure performance and redundancy for these critical workloads. It doesn’t matter if your workload is SQL Server or Oracle, or if you are running Hyper-V or VMware, the concepts are the same. In this session, we will walk through SDS, and cover topics including: sizing your workload, validating performance characteristics, and following recommended best practices for placing your most important applications on SDS.
  • How To Leverage Cloud Storage for Hybrid VMware
    How To Leverage Cloud Storage for Hybrid VMware Storage Switzerland, ClearSky Data Aug 16 2017 5:00 pm UTC 60 mins
    Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
  • Reduce Security Vulnerabilities in Enterprise Applications
    Reduce Security Vulnerabilities in Enterprise Applications Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA Aug 17 2017 11:00 am UTC 60 mins
    Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
  • Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software
    Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software Storage Switzerland, Maxta Aug 17 2017 5:00 pm UTC 60 mins
    In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.

    Attendees will learn how each deployment model overcomes these challenge:

    1. Ease of initial evaluation and testing
    2. How to transition to hyperconvergence while having current servers
    3. How to avoid hypervisor lock-in
    4. How to build a future proof hyperconverged architecture
  • Monitor with Discipline: Software-Defined Professionals
    Monitor with Discipline: Software-Defined Professionals Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Aug 17 2017 5:00 pm UTC 60 mins
    Software is eating the world. It is the catalyst that is driving disruptive innovation and has led to marketing-ease such as software-defined data centers, software-defined storage, software-defined networks, and software-defined anything.

    In this session, we will discuss how IT professionals can successfully add value to the software-defined ecosystem as they continuously integrate and continuously deliver application services that meet and exceed any customer’s expectation.

    Join this webinar to discuss:
    - What are the key tenets of software-defined constructs?
    - How do I apply a foundational set of skills like monitoring as a discipline to guarantee success as a software-defined professional?
  • The Foundation for Data Center Modernization and Cloud-Future IT
    The Foundation for Data Center Modernization and Cloud-Future IT Dan Courcy, senior product marketing manager, Red Hat Enterprise Linux, Red Hat Andre Pitanga, service delivery mangr, Red Ha Aug 17 2017 6:00 pm UTC 45 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services Aug 21 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session