Hi [[ session.user.profile.firstName ]]

Cloud Storage: Determining Its Worth – Panel Session

With everyone talking about cloud storage, you would think it would be the end-all solution for many organizations wanting a better storage strategy for their infrastructure. However, is it a strategy you should be looking at? Join this panel of storage experts as they jump into the cloud to see whe
With everyone talking about cloud storage, you would think it would be the end-all solution for many organizations wanting a better storage strategy for their infrastructure. However, is it a strategy you should be looking at? Join this panel of storage experts as they jump into the cloud to see when cloud storage is worth it and when it isn't.

This presentation will cover topics such as:
- the definition of cloud storage
- security and legal issues
- management problems by incorporating cloud into your storage strategy
- the future of cloud storage and new technologies
Recorded Jun 13 2012
59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Judge, TechWeek Europe; Alex McDonald, SNIA; Ben Woo, formerly of IDC; Hillel Kolodner, VISION Cloud
Presentation preview: Cloud Storage: Determining Its Worth – Panel Session
Recommended for you:
  • Date
  • Rating
  • Views
  • May Monthly Threat Webinar: Go From Hunted to Hunting May Monthly Threat Webinar: Go From Hunted to Hunting Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: May 31 2016 48 mins
    Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
  • How to build an awesome customer experience How to build an awesome customer experience Brian Boroff, Asana Recorded: May 31 2016 63 mins
    Speakers:
    * Brian Boroff, Head of Customer Success and User Operations, Asana
    * Jon Ferrara, CEO/ Founder Nimble
    * Stewart Rogers, Director Marketing Technology, VentureBeat


    Customer experience is a tough one -- we all have seen those businesses who think they're building a great scalable customer experience, but have customers who might not have the same opinion. And it's not enough to build a great product -- we define ourselves in the marketplace through each and every interaction we have with the customer.

    You might understand that the reason you're doing something is for a very valid business reason, but the customer may interpret that action entirely differently. And your world class customer service can sometimes start to falter as your startup organization adds more resources and more layers -- good for your growth but sometimes risking the very people who made your company successful. Ouch.

    Customer engagement doesn't take costly tools and high priced business analysts -- but it's also not always intuitive. We're going to show you some no-nonsense ways to keep customers loyal and driving growth while also building amazing customer experience that scales along with your business. Our panel of experts will share tactics and strategies that will help you kick start and refine your approach to delivering service -- and helps your company grow even faster.

    In this webinar you'll:

    * Understand what your customer wants and needs throughout the product lifecycle.
    * Learn strategies for rethinking the role of customer service within the organization
    * Create a new process for empowering employees to retain a top tier customer experience
    * Identify potential obstacles that may be causing customer attrition

    SPONSORED BY: Desk.com
  • The Challenge for the VNFM – How to Deliver on the NFV Promise The Challenge for the VNFM – How to Deliver on the NFV Promise Aidan Molloy, Senior Evolution Product Manager, and Gerry Donohoe, Openet Recorded: May 31 2016 38 mins
    The webinar explores how the selection of a VNF manager impacts two significant challenges in deploying NFV:
    1. How the use of a generic VNF manager helps ensure deployments remain open and vendor independent.
    2. How managing VNF lifecycle management impacts the ability to ensure Carrier-Grade Operations.

    The success of any NFV solution is how the system is managed in production after virtual function components are initially instantiated and operating. The need to manage carrier-grade production solutions across distributed systems at scale is operationally complex and particularly so when managing multi-vendor deployments. To date, VNF managers typically manage VNFs only at the virtual machine level, needing to fully stop and restart the complete virtual machine to carry out any update or upgrade procedures. Deployments that manage VNFs only at the VM level provide only infrastructure management, and they not only operate with coarse control and significant blind spots, they also make it difficult to ensure in-service upgrades, i.e., the ability to carry out updating or upgrading without impacting production traffic.

    This webinar will discuss how to support efficient in-service VNF management. The VNF manager should provide VNF orchestration and management on two levels: software and infrastructure. Upgrading software and/or configurations within the existing VM instead of simply creating new VM instances greatly reduces the operational time and complexity by providing much better fine grain control and visibility over the deployed VNFs, resulting in maintenance procedures that are not only faster but also more robust and less error prone.
  • Empower your mobile workforce: Enterprise Mobility Management made simple Empower your mobile workforce: Enterprise Mobility Management made simple Alex Shteynberg Technology Architect; David Hansford Technology Architect, Microsoft Corporation Recorded: May 31 2016 45 mins
    Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.

    Join this webcast to learn:

    What components make up EMS
    How to get up and running with EMS
    How to provide secure access to corporate data
    Protect everything—across devices, operating systems and applications
  • Outthink Mobile Malware: Learn how to protect your mobile devices Outthink Mobile Malware: Learn how to protect your mobile devices Adrian Davis, MD (ISC)² EMEA, Kaushik Srinivas, Strategy & Product Management for IBM Security Recorded: May 31 2016 61 mins
    The popularity of the smartphone and the bring your own device (BYOD) phenomena has given way to a new era in cybercrime – the era of mobile in which cybercriminals increasingly target phones and tablets as an attack vector. In fact, at any given time, mobile malware is infecting millions and millions of mobile devices globally, enabling criminals to get their hands on your personal information and money.
    2015 was witness to the largest and most notorious mobile malware attacks in history. Considering that the number of smartphone users worldwide will surpass 2 billion in 2016 (emarketer), mobile app downloads will have increased to 268 billion (Gartner) by 2017, and that most companies have dedicated very little resources towards mobile application security, the industry is ripe for even bigger malicious attacks. Mobile malware will continue to grow, being destructive and costly to corporations and users.
    Join (ISC)² EMEA and IBM as we demonstrate the effects of mobile malware and how to arm organisations to protect themselves against this growing concern.
  • Cloud on your terms: make the most of your infrastructure investments Cloud on your terms: make the most of your infrastructure investments Tyler Cooper Technology Architect; Albert Wolchesky Senior Technology Architect, Microsoft Corporation Recorded: May 27 2016 32 mins
    Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.

    You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?

    Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:

    - Expanding your options without adding complexity
    - Easily moving workloads from your datacenter
    - Building hybrid applications that leverage both on-premises and cloud resources
    - Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
  • Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Keith Vidal, Microsoft; Jessica Devita, CHEF; and Jeffrey Westphal, Senior Sales Engineer Trend Micro Recorded: May 26 2016 39 mins
    Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.

    You will learn how to:
    • Automate your security posture within Azure
    • Use Chef to build compliance and resiliency into your Azure workloads
    • Take security automation to the next level
  • Using Data Security to address HIPAA and HITECH Regulations Using Data Security to address HIPAA and HITECH Regulations Derek Tumulak, Vormetric VP of Product Management and Tricia Pattee, HOSTING Product Manager Recorded: May 26 2016 38 mins
    Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • Storage on Your Terms: Nexenta Software-Defined Storage with Intel Storage on Your Terms: Nexenta Software-Defined Storage with Intel Michael Letschin, Field Chief Technology Officer at Nexenta; Shawna Meyer-Ravelli, Product Marketing Engineer at Intel Recorded: May 26 2016 34 mins
    Today’s technology leaders need to tackle the big trends—cloud, big data, the Internet of Things, mobility, social media—while lowering IT spend year over year. That’s a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs. This enables you to deliver software- defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more—all while maintaining the freedom to choose which platform to run on.

    In this session you will learn more about the main kinds of software-defined storage technology landscape you’ll likely deploy:

    • Scale-up
    • Scale-out
    • Containerized

    Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.
  • Intel & F5: Enabling Highly Agile, Fast and Secure Network Transformation Intel & F5: Enabling Highly Agile, Fast and Secure Network Transformation Benito Lopez, Senior Business Development Manager, and Ryan Davis, Senior Solution Architect Recorded: May 26 2016 48 mins
    Innovation continues to accelerate at a breakneck pace. Smart cities, Connected Vehicles, smart sensors and devices are driving the transformation of networks such as 5G. New types of service providers need to support smart infrastructure and applications that drive more throughput, enhanced network intelligence and an evolving security landscape. F5 Networks is collaborating with Intel to deliver a network infrastructure design to scale and secure the Gi-LAN using the F5 BIG-IP platform and Intel® Architecture.

    The need for a secure, extremely agile, fast, scalable, and standardized architecture to support new usage models, new services with low latency and error apps is vital in a 5G world. Together we provide the flexibility and capability to ensure that services and apps run smoothly, reliably and securely. Intel and F5 are working together to realize the vision of 5G by transforming networks and service models.

    In this seminar, attendees will learn how F5’s Carrier class security and traffic steering platforms are helping SP’s transform their network around innovative around new services and F5’s virtualized platforms enable SP’s deploy, highly agile, secure and fast networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Storage: Determining Its Worth – Panel Session
  • Live at: Jun 13 2012 2:00 pm
  • Presented by: Peter Judge, TechWeek Europe; Alex McDonald, SNIA; Ben Woo, formerly of IDC; Hillel Kolodner, VISION Cloud
  • From:
Your email has been sent.
or close
You must be logged in to email this