Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
This session will walk you through the new and exciting features in our latest release- CA Service Virtualization v10.3 and offer some pointers on how to upgrade & stay current.
Hear from our expert on tips and tricks to best upgrade to the latest version of CA Service Virtualization. Our experts will be at hand to take all of your questions on the new version and the upgrading process.
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Customers need the ability to optimize the placement of applications and data workloads to ensure both performance and availability. These challenges are further complicated when applications, data, and people are spread across multiple storage platforms, data centers, and remote office locations.
As a fileserver built for the cloud era, Peer and Nutanix Acropolis File Services (AFS) work in concert to conquer the toughest challenges. Featuring a globally-distributed Active-Active file services fabric, the combined solution seamlessly weaves AFS clusters and existing storage systems together with real-time synchronization and distributed file locking. Data can now be made local to users and applications, ensuring optimal performance, integrity, and high availability.
Key use cases include:
- Active-Active Global File Sharing and Collaboration
- Active-Active Continuous Availability and Load Balancing for VDI Implementations
- Extending the Reach of Nutanix Across Multiple Storage Platforms
Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.
But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.
Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?
Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!
Register for free!
Attend this webinar and learn:
* How to tell if your marketing and IT departments are AI-ready
* The fundamentals of an AI-driven infrastructure
* The role of clean, definable data goals in successful AI implementation
* How to scale the AI workload
* Andrew Malinow, PhD., Principal Data Scientist, Zylotech
* Rolf Schromgens, CEO, Trivago
* Sherif Mityas, Chief Experience Officer, TGI Friday's
* Michele Goetz, Principal Analyst, Forrester
* Rachael Brownell, Moderator, VentureBeat
Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
- Current threats and how they are evolving
- Comprehensive threat protection for the cloud
- Unified security for detecting threats and responding to incidents
As organizations continue their digital transformation to capitalize on the benefits of big data, many have already discovered that the key to success lies in selecting the right infrastructure solution that also enables economic transformation. INFINIDAT’s InfiniBox, based on a software-defined storage architecture, delivers the performance, availability, and continuous data protection at an exceptional value necessary to support both goals.
In April 2018, INFINIDAT commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to illustrate the economic benefits of implementing the InfiniBox for high performance, high capacity use cases including virtualization, analytics, cloud services and backup. Forrester uncovered some remarkable results and shares them with you in this comprehensive presentation.
The study revealed the following business benefits:
• Payback in less than six months
• A 125% Return on Investment (ROI)
• An investment with a very positive Net Present Value (NPV) of $10.2M
• A total benefit of $18.4 million over three years
• Downtime cost savings of over $1.1 million
Give customers, staff, and contractors a Wi-Fi experience that makes them want to stay around. Join us for a joint webinar with Verizon, Mist Systems, and Phunware to discover how sticky, deep customer engagement drives clear and compelling business outcomes.
We’re increasingly in a multi-cloud environment, with potentially multiple private, public and hybrid cloud implementations in support of a single enterprise. Organizations want to leverage the agility of public cloud resources to run existing workloads without having to re-plumb or re-architect them and their processes. In many cases, applications and data have been moved individually to the public cloud. Over time, some applications and data might need to be moved back on premises, or moved partially or entirely from one cloud to another.
That means simplifying the movement of data from cloud to cloud. Data movement and data liberation – the seamless transfer of data from one cloud to another – has become a major requirement.
In this webcast, we’re going to explore some of these data movement and mobility issues with real-world examples from the University of Michigan. Register now for discussions on:
•How do we secure data both at-rest and in-transit?
•Why is data so hard to move? What cloud processes and interfaces should we use to make data movement easier?
•How should we organize our data to simplify its mobility? Should we use block, file or object technologies?
•Should the application of the data influence how (and even if) we move the data?
•How can data in the cloud be leveraged for multiple use cases?
Innovation driven by cloud, NFV, IOT, video content and virtual reality is compelling the delivery of increasingly distributed computing options. These environments will need to support technical requirements such as latency, connectivity and power management while adhering to regulator factors such as HIPPA data security. Distributed computing will require a number of infrastructure form factors such as HCI, private cloud and embedded computing paired with a myriad of operational environments process such Nutanix, Azure and OpenStack. All these are delivered in diverse partnerships and business models.
In this presentation, we will discuss automation opportunities that allow all stakeholders to effectively deploy and monitor the underlying infrastructure while orchestrating and managing individual functions that make up the distributed computing services - all with minimal and often remote support staff.
Why a chameleon? The rich enterprise features, robustness, and adaptability of HPE Nimble Storage arrays is sometimes unknown or misunderstood. This overview summarizes product value while positioning HPE Nimble Storage as the bulletproof and flexible enterprise product that it is. Yes, InfoSight is key, but is only half of the benefit provided by the new next-gen platform HPE Nimble Storage platform.
Summary bullet points:
•Predictive, cloud ready, and timeless benefits
•What’s new in the next-gen platform?
•Unspoken benefits of the predictive flash platform
•Data protection for the data loss paranoid IT manager
•App-centric and scale-to-fit benefits
This Vivit SIG Talk session will feature a thought leader who will share his vast knowledge and experience with OpenStack Cloud. Join us to hear a customer story on how a full OpenStack solution increased productivity and its implementation from start to finish.
Speaker: Dr. Kenneth Tan
How to build an OpenStack cloud in Academic sector: University of Edinburgh: University of Edinburgh: The popularity of private cloud adoption even in the academic sector is rapidly rising. Today, OpenStack in academia is not just a subject we discussed at summits or conferences anymore. But how can you successfully adopt OpenStack when even log management and monitoring seems to be piecemeal for operators? It is clear that full OpenStack solution would be beneficial for efficient, automated, and cost effective cloud computing solutions, without requiring large OpenStack operations teams. Not all operators have the luxury of having teams dedicated to operate OpenStack.
During the presentation we will talk about how University of Edinburgh is more productive than ever with a full OpenStack solutions - Deploy, Operate, Upgrade, about how we put into production in 8 weeks the research services department of one of the UK’s largest academic private cloud system, and what is still missing for OpenStack to make the adoption of cloud computing more flexible and self-served.
With Pure Service Orchestrator, customers can now extend their shared infrastructure beyond existing scale-up and virtualised applications to support containerised, persistent applications – all on Shared Accelerated Storage infrastructure.
Join Principal Systems Engineer, Jon Owings for this overview and demonstration.
To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.
In this short webinar, you'll learn:
> Why Red Hat Insights might be of interest to your team.
> How to quickly and easily get your team started with Red Hat Insights.
> How to use Red Hat Ansible® Automation to streamline large and small deployments.
> The answers to your question from Red Hat experts.
> Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
Ransomware is the universal threat. No matter an organization's data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something that ransomware is particularly adept. In case of a breach, an advanced backup and disaster recovery solution can ensure safe and timely recovery of data without paying ransom.
In this live webinar join experts from Storage Switzerland and Micro Focus as they discuss the impact of ransomware and the core features of a backup solution that can mitigate the associated risks.
Roger Thornton, Chief Technology Officer of AlienVault, discusses why it is so important to start with cyber security basics and master that before adding all the latest shiny objects available in the InfoSec industry.
- Detection and response of a breach is key to effectively mitigate risk for organizations of all sizes.
- Democratizing data sharing through Open Threat Exchange to find the bad actors more quickly.
- There are different strategic imperatives based on company size, industry and skilled resources.
- The AlienVault approach: unified, simplified, democratized.
To learn more about AlienVault, go to http://ow.ly/LMKB30kVijd. To join the AlienVault Open Threat Exchange, go to http://ow.ly/MuLJ30kVinb.
Chief Technical Officer, AlienVault
Roger Thornton is the Chief Technical Officer for AlienVault. Roger’s career has been dedicated to the development of technology and new business ventures based on technical innovation. Over 25 years in the Silicon Valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investor/advisor.
Are you sold on the idea of hybrid cloud but questioning how to bring your strategy to life? This webcast will offer insights into Intel architecture benefitting the business value and primary use cases of Microsoft® Azure Stack.
Intel Select Solutions for Azure Stack deliver an optimized, hyper-converged platform, with the Intel® Xeon® Scalable Processors, Intel® DC SSD, Intel® Optane™ SSD, and Intel® Ethernet Connections featuring iWARP that improve your Azure “on-premise” model for Microsoft’s Hybrid Cloud. Tune in to learn more about the reference design, the featured products, and solution configurations in this Intel-optimized, Microsoft Hybrid Cloud platform to enable you to go further into your hybrid cloud journey.
W ramach Letniej Akademii SUSE 2018 organizowanej on-line poznasz najnowsze rozwiązania open source. Przedstawiamy krok po kroku najbardziej interesujące funkcje rozwiązań SUSE oraz pokazujemy, jak zacząć z nich korzystać.
W ramach tych zajęć Akademii prezentujemy najnowszą wersję SUSE CaaS Platform 3 – kompletne rozwiązanie do zarządzania kontenerami, do budowy którego wykorzystano technologię Kubernetes. Z pomocą SUSE CaaS działy zajmujące się rozwijaniem aplikacji oraz DevOps mogą znacznie łatwiej wdrażać, zarządzać i skalować aplikacje oraz usługi oparte na kontenerach.
With massively growing data sets and expectations of 100% uptime with long term retention, companies are struggling to meet data protection and disaster recovery demands. These problems are prevalent, no matter the size of the organization. To compound that, IT organizations simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data protection.
In this webinar you'll learn:
-How Cohesity provides enterprise-grade data protection
-How we're solving legacy data protection challenges
-Customer use cases & success
As organizations adopt cloud computing, the perimeter moves into unprotected territory within these new environments. Where IT sees the cloud as an opportunity, security sees a new attack surface. Most companies have heavily invested in traditional multi-layer, security appliances—like firewalls and intrusion prevention systems which help with “north-south” protection. But, these controls are less effective in securing lateral or “east-west” traffic where the new perimeters sit. Worse, they were not designed to handle the sheer volume of cloud traffic--a significant operational hurdle.
Join this interactive webinar to learn more about:
- The latest cloud attack methods every security team should understand
- Anatomy of specific attack types including cross cloud, cross workload, cross data center, cross tenant, as well as, orchestration and serverless attacks
- Best practices on how to guard your enterprise
Meet Cohesity CloudSpin, a new feature on our DataPlatform that accelerates your test/dev initiatives in the cloud!
In this on-demand webinar you will learn how Cohesity CloudSpin is used in VMware infrastructures to:
-Make on-premises backup data easily reusable in the public cloud
-Deliver on the promise of application mobility for test/dev
-Ensure that format conversion need no longer be a cumbersome process
Software-defined storage, built on the open source Ceph project, offers a cost-effective way of addressing largescale storage challenges. SUSE and Lenovo are working together to build fully supported software-defined storage solutions that maximise performance and availability for a range of commercial and high performance computing applications, while offering the assurance of reliable SES-based backup. In this co-hosted webinar, Joao Almeida (CTO for Lenovo in ANZ) and Michael Bukva (SDS SME at SUSE) will take an in-depth look at how software-defined technology is driving the storage market.
Hundreds of companies, both old and new, are providing technology designed to improve customer engagement, ultimately raising customer experience scores. Everything from contact center to CRM to user sentiment to in-app contextual communications to many more areas are part of the customer engagement movement.
This first episode of our Digital Customer Experience series serves as a tutorial of technology categories and providers assisting in any customer interaction and analytics to evaluate success.
Unauthorised access is the leading cause of breaches today, whether it comes from external threat actors or insider activity. To mitigate this risk, Okta and CyberArk have integrated technologies to provide a comprehensive solution for unauthorised access protection. In this webinar, Daniel Harris of Okta and Przemek Dybowski of CyberArk will discuss how to:
•eliminate identity sprawl and prevent privileged access abuse
•enable strong authentication and reduce the attack surface
•identify and respond to account compromise.
When your applications slow down, you’ve hit the app-data gap. This session will go beyond what’s new with HPE 3PAR StoreServ flash arrays to highlight how HPE 3PAR can close that gap. With predictive analytics and cloud-ready flash, HPE 3PAR delivers fast and reliable access to data both on-premises and off. Hear from a HPE 3PAR user on how all-flash improves business operations and addresses requirements such as risk mitigation and operational simplicity, making the all-flash data center a reality.
Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.
To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to next-generation network packet brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:
• Delivers complete network-wide visibility across physical, virtual and cloud environments.
• Scales metadata extraction for improved forensics.
• Isolates applications for targeted inspection.
• Gives you visibility into encrypted traffic for threat detection.
See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:
• Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
• Scale to speed of the network without “rip and replace” by load balancing across tool groups.
• Remove single points of failure and increase availability of both the tools and the network.
• Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.
Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.
Attend this webinar and learn about:
• Top cyberthreats facing financial institutions
• Financial services compliance evolution, security monitoring and incident response
• Differences between SIEM, SOC, and SOC-as-a-service
• Monitoring on premises and cloud resources without adding headcount
To gain insights on these challenges and how to solve them, save your seat now!
For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.
Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.
We'll then see what's happening with the IR Pulse and our caseload trends, followed by:
The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.
Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.
Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder.
Please join George Crump, Lead Analyst at Storage Switzerland and our guest speaker W. Curtis Preston, Chief Technical Architect at Druva, for a discussion on the new challenges with VMware backups, and how to address them successfully.
The Top 5 Reasons VMware Backups Still Break
* Lack of Auto-Discovery
* Lack of Full Cloud Support
* Too Much Backup Infrastructure
* Expensive and Complicated Disaster Recovery
* No VMware on AWS Support
Az OpenStack Pike kiadására épülő SUSE OpenStack Cloud 8 az első olyan verzió, amely integrálja a SUSE OpenStack Cloud képességeit és a SUSE által tavaly megvásárolt HPE OpenStack technológiákat. A megoldás felgyorsítja a szoftveresen vezérelt infrastruktúrák bevezetését, emellett továbbfejlesztett interoperabilitása, skálázhatósága és rugalmassága révén támogatja a nagyvállalatokat az IT-rendszer modernizálásában, és ezen keresztül az éles piaci versenyben jelentkező, új üzleti kihívások legyőzésében is. A webinárban bemutatjuk a termék legfontosabb újdonságait, valamint a legfontosabb felhasználási területeket, beleértve a szoftver alapú hálózatokat (SDN) és a konténereket. További információ a termékről: https://www.suse.com/products/suse-openstack-cloud/
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.
In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.
Join us for this webcast to learn:
- The most common challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- The core security capabilities you need to demonstrate compliance
- How AlienVault Unified Security Management can simplify the compliance process
VP of Product Marketing at AlienVault
Qualified Security Assessor (QSA) with Terra Verde
Sales Engineer at AlienVault
As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
Suas aplicações SAP são a base de sua transformação digital!
Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:
- Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
- SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
- SUSE Manager permite que você gerencie várias distribuições Linux.
When your virtual Evolved Packet Core (vEPC) solution needs deep packet inspection (DPI) as a key enabling feature, highly reliable and accurate real-time identification of network traffic and applications is an important requirement.
Whether it is for analytics, policy enforcement, tiered pricing, web and video optimization, content filtering, parental control or security services, DPI is a crucial technology to implement virtualized network equipment solutions.
vEPC vendors looking at the business case can decide to build DPI software in-house, use open source solutions or to license software from a DPI specialist. Within this webinar, we will do a deep dive explaining the different sourcing options and the respective evaluation criteria, which should be considered.
The real-life vendor scenario of a vEPC vendor will be used to illustrate the different aspects of a realistic use case.
By the end of this session, attendees will have learned:
•How DPI has become a crucial technology for vEPC solutions
•How the scope of needed know-how has changed for vEPC vendors
•What the benefits of DPI for vEPC use cases are
•What the sourcing options for DPI solutions are
•How to evaluate and answer the important aspects of the build or buy DPI decision
Network-intensive applications, like networked storage or clustered computing, require a network infrastructure with high bandwidth and low latency. Remote Direct Memory Access (RDMA) supports zero-copy data transfers by enabling movement of data directly to or from application memory. This results in high bandwidth, low latency networking with little involvement from the CPU.
In the next SNIA ESF “Great Storage Debates” series webcasts, we’ll be examining two commonly known RDMA protocols that run over Ethernet; RDMA over Converged Ethernet (RoCE) and IETF-standard iWARP. Both are Ethernet-based RDMA technologies that reduce the amount of CPU overhead in transferring data among servers and storage systems.
The goal of this presentation is to provide a solid foundation on both RDMA technologies in a vendor-neutral setting that discusses the capabilities and use cases for each so that attendees can become more informed and make educated decisions.
Join to hear the following questions addressed:
•Both RoCE and iWARP support RDMA over Ethernet, but what are the differences?
•Use cases for RoCE and iWARP and what differentiates them?
•UDP/IP and TCP/IP: which uses which and what are the advantages and disadvantages?
•What are the software and hardware requirements for each?
•What are the performance/latency differences of each?
Join our SNIA experts as they answer all these questions and more on this next Great Storage Debate
Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds, it is often well behind schedule and well over budget.
The first step in creating a great disaster recovery plan is creating one that isn't bad at the very least. In this live webinar join Storage Switzerland, Veeam, and KeepItSafe as we discuss how to go from a bad disaster recovery situation to a great disaster recovery plan for better business continuity.
Tape is as relevant as ever, but it may not be for the reasons that you think. In fact, as part of delivering hyper-availability, one best practice is to use tape as an “offline” storage copy to protect against ransomware and malware, which is a key part of a comprehensive data protection strategy.
In this webinar, join experts from Veeam and Quantum to learn about tape’s role in tomorrow’s infrastructures, best practices for tape in a Veeam environment, and to introduce Quantum’s new converged tape appliance for Veeam – which makes it easier to create tape to protect against ransomware.
Business continuity, especially across data centers in nearby locations often depends on complicated scripts, manual intervention and numerous checklists. Those error-prone processes are exponentially more difficult when the data storage equipment differs between sites.
Such difficulties force many organizations to settle for partial disaster recovery measures, conceding data loss and hours of downtime during occasional facility outages.
In this webcast and live demo, you’ll learn about:
• Software-defined storage services capable of continuously mirroring data in
real-time between unlike storage devices.
• Non-disruptive failover between stretched cluster requiring zero touch.
• Rapid restoration of normal conditions when the facilities come back up.
Attend live for a chance to win a $200 Amazon gift card!*
*Gift card will be sent within 10 days of the webinar date. Void where prohibited.
Security, data privacy, and data protection represent concerns for organizations that must comply with policies and regulations that can vary across regions, data assets, and personas.
Attend this session to learn how to employ data virtualization for:
- Customizing security policies in the data abstraction layer,
- Centralizing security when data is spread across multiple systems residing both on-premises and in the cloud, and
- Controlling and auditing data access across different regions.
- DV for Security and Governance
- Product Demonstration
- Summary & Next Steps
Containers offer enterprises substantial gains in application deployment speed and portability. However, these benefits are often countered by the operational complexities of infrastructure configuration and management, especially when employing a mix of cloud and on-premises container environments.
This webinar is for IT Operations and enterprise platform teams interested in driving business agilities using cloud-native technologies. You will learn how modern cloud-native technologies can help streamline complex processes, eliminate the need for network and storage overlays, and ensure reliable performance with granular controls for developers and operators.
In this webinar, Diamanti and Nirmata teams discuss how Nirmata’s federated approach to Kubernetes cluster deployment and application management integrates with the Diamanti platform, seamlessly bridging on-premise bare-metal and hybrid cloud container environments.
You will learn how to:
- Deploy an on-premises container stack in minutes
- Incorporate Diamanti into your multi-cloud environment using Nirmata
- Simplify application management and governance across on-premises and public cloud environments
Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasiingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.
Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.
•Trends affecting your attack surface
•Need for vulnerability management program
•What should you look for in an external vulnerability scan report
The vast amount of data assets generated by Networks, Users, Traffic and Devices has generated monetization opportunities in the Telco Domain. Daily human interaction with telecommunication networks and services of all kinds contain unconnected gems of information which, when correctly interpreted, reveal how people behave and interact. Machine Learning technologies can be put to good use to reveal how all this information fits into relevant patterns.
In this session you will learn about the following:
> Brief Overview of AI and ML
> Different types of ML Techniques and how to apply them
> A look at projects such as Jupyter Notebook and Tensorflow and relevance to IoT
The integration between Nutanix and Zenoss enables enterprises to ensure the highest levels of performance and availability for applications and services that power their businesses. Zenoss and Nutanix subject matter experts will discuss and showcase how Nutanix uses Zenoss to monitor their HCI and other critical environments at Nutanix data centers. Zenoss enables IT organizations to eliminate blind spots across hybrid IT environments, predict impacts to critical services, resolve issues faster, and operate at any scale the business requires.
The session will include a demonstration of the Zenoss and Nutanix environments working together via the Nutanix ZenPack. Both teams will answer questions about Zenoss, the Nutanix ZenPack integration and future roadmap.
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution