Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.
By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.
Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
In this webcast, Intel’s Director of Data Center Security Marketing highlights why blockchain is such a transformative technology and how Intel is working to solve the privacy, security, scalability, and trust challenges that will help drive enterprise adoption and accelerate blockchain deployments. Tune in to learn more about what products and services look like in a blockchain-enabled world moving forward.
Por que uma abordagem de software para Enterprise Storage?
A lógica dentro dos dispositivos de armazenamento corporativos sempre foi escrita em software. Mas somente nos últimos anos, o hardware avançou o suficiente de modo que o software e o hardware de storage podem agora ser separados. Está é a nova proposta de valor!
Seguir a abordagem adequada para o storage definido por software deve fornecer a você uma solução altamente escalável que reduz drasticamente os custos de armazenamento em termos de capital e despesas operacionais.
Conheça neste Webinar o SUSE Enterprise Storage, a solução de armazenamento inteligente definida por software, com a tecnologia Ceph, que permite transformar a infraestrutura de armazenamento de sua empresa para reduzir custos enquanto fornece escalabilidade ilimitada. Uma solução simples, robusta e flexível.
Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
How should you respond?
What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
Why is Crisis Comms so different from all other types of PR?
What things do you need to demonstrate that will limit the damage?
Do you have a tried and tested Crisis Comms plan?
Does everyone know who is on the Crisis Comms team?
What they have to do?
Who they need to inform?
What they can and cannot say, and how they should say it?
What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.
In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:
- Develop an automation strategy that includes network discovery and configuration auditing.
- Adopt a holistic approach to configuration and workload management.
- Automate new network device provisioning.
- Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
- Provide a better way for teams to deploy and manage their own workloads.
It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.
Join us to see:
Product in action including the new simplified portal for compliance use cases
New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center
In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.
In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks. Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.
Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.
Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:
•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
Transformational. Impactful. Defining. All of these words have been used to describe service virtualization – a technology so powerful that software engineering teams across the globe rely upon it to help protect their brand and their business.
At 10 years old, service virtualization is now an established technology that has proven its value by:
•Giving software engineering teams unrestricted access to incomplete or unavailable services to complete their tasks in the software lifecycle
•Reducing defect reproduction time
•Reducing the number of defects and increasing test coverage.
Join Theresa Lanowitz, founder of industry analyst firm voke and author of the leading research on service virtualization and its impact in the enterprise, and Nate Lee Director of Product Management for Service Virtualization at CA Technologies to learn about why service virtualization is an absolute must for any organization that wants to compete in the digital landscape and about what service virtualization can do for software engineering teams in the future.
Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.
We will discuss:
How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product
How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center
How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future.
SAP systems can be complex to configure and install. With SUSE Linux Enterprise Server for SAP Applications we help to make it much simpler and certainly easier to install the entire SAP software stack with HA. Please join this webinar to learn more on how SUSE can make your SAP application environment easier and simpler to setup and maintain.
In this Webinar Manfred Berger explains why the HGST platforms, also known as JBODs or shelves are the perfect home for HGST hard disk drives and SSDs and how buying that combination as a platform, can look to reduce your integration cycle by up to 3 months. By enabling customers to focus their attention on storage applications rather than the underlying infrastructure, hardware investment turns to revenue sooner. Through proper integration of HGST hard disk drives into dedicated platforms, these hard disk drives can run more reliably and last longer, providing customers with a dependable storage installation they can rely on for their business needs.
In this webinar, we will discuss how utilising artificial intelligence and machine learning addresses risk reduction when dealing with the increasing pace of unknown malware proliferation. We will also discuss how this approach differs from legacy methods and provide a compliance example of how you can remove complexity and liberate resources by leveraging advanced artificial intelligence and machine learning.
Public, private and hybrid cloud are nothing new, but protecting sensitive data stored on these servers is still of the utmost concern. The NSA is no exception.
It recently became publicized that the contents of a highly sensitive hard drive belonging to the NSA (National Security Agency) were compromised. The virtual disk containing the sensitive data came from an Army Intelligence project and was left on a public AWS (Amazon Web Services) storage server, not password-protected.
This is one of at least 5 other leaks of NSA-related data in recent years. Not to mention the significant number of breaches and hacks we’ve experienced lately, including Yahoo!, Equifax, WannaCry, Petya, and more.
The culprit in this case? Unprotected storage buckets. They have played a part in multiple other recent exposures, and concern is on the rise. When it comes to storing data on public cloud servers like AWS, Azure, Google Cloud, Rackspace and more, what are the key responsibilities of Storage Architects and Engineers, CIOs and CTOs to avoid these types data leaks?
Tune in with Chris Vickery, Director of Cyber Risk Research at UpGuard and the one who discovered the leak, along with George Crump, Chief Steward, Storage Switzerland, David Linthicum, Cloud Computing Visionary, Author & Speaker, Charles Goldberg, Sr. Director of Product Marketing, Thales e-Security, and Mark Carlson, Co-Chair, SNIA Technical Council & Cloud Storage Initiative, for a live panel discussion on this ever-important topics.
What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.
Historisch wurden All-Flash Storage Systeme nur für hohe Performance Anforderungen eingesetzt. Als Pionier im All-Flash Bereich war es für Pure Storage schon früh ein Anliegen, all Flash Storage für alle Workloads zur Verfügung zu stellen. Erfahren Sie in diesem Webcast wie es möglich ist All-Flash Speicher für alle Ihre Daten zu nutzen. Unabhängig davon ob Sie einen On-Premise Speicher für traditionelle Workloads wie Datenbanken, VDI, File oder VSI, eine Hybrid Cloud Lösung oder eine schnelle zuverlässige Lösung für Analytics oder DeepLearning suchen, Pure Storage bietet Ihnen eine moderne innovative Lösungen für all diese und weitere Anforderungen. Themen wie NVMe, eine native Cloud Spiegelung und ein synchroner Spiegel mit transparentem Failover sind ebenso Bestandteil der Lösungen, wie die Möglichkeit FileServices nativ aus dem Storage System anzubieten. Durch das Evergreen Modell profitieren Sie automatisch von Hard- und Software Innovationen und das alles ohne Downtimes oder aufwändige Migrationsszenarien.
Many organizations within EMEA are beginning to host more of their business-critical applications and data in the Cloud. However, many of these organizations are not fully aware of the risks, so are not fully protecting their Cloud-based applications or data. In addition, the majority of organizations still rely on traditional on-prem focussed Backup solutions, many of which do not enable the cloud to be used efficiently, or cost effectively.
Join Phil Maynard, Sr. Director EMEA, Technical Sales at Barracuda and Alex Hilton, CEO at Cloud Industry Forum to discuss:
- Findings from Barracuda research on how companies are using Backup and Cloud in EMEA
- What’s preventing companies from moving their backups to the Cloud
- Why moving to Office 365 could break your data protection and IT security strategy
- Real life examples of how organisations have adopted a hybrid on-prem and Cloud Backup Strategy
In today’s world, every company is a digital business. A successful digital transformation starts with understanding what you want to achieve—and that begins with understanding your customer experience. This presentation shares examples of how you can quiet the noise of the rapidly evolving technology landscape with actionable, implementable solutions that generate lasting business results. Innovation happens at the nexus of different disciplines, and webinar attendees will learn how to solve today’s most pressing challenges by combining digital strategy, experience design, and technology.
The All-Flash era is well upon us, and most data centers consider an all-flash product storage tier both realistic and practical. But the flash industry continues to march on. New technologies like NVMe and ultra high-density flash modules promise to continue all-flashes march to data center dominance. Join us for this live webinar and we will help you design your plan for 2018.
Security information and event management (SIEM) has been a cornerstone of cybersecurity for years, but its future as a stand-alone product might well be in question. As advanced threat intelligence platforms, search engines, and other advanced tools come to market, we could be seeing a consolidation in how tools are packaged and marketed. This webcast will examine the following:
- The motivations behind a security overhaul
- SIEM as a core part of a SOC (security operations center)
- Security without SIEM
- Alerts versus actionable intel
- The role of a SOC analyst
- What makes up “a better SIEM?”
Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program – DNS can help with this and much more, but are you leveraging it as part of your security controls and processes?
DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing
In this webinar you’ll learn:
•The value of DNS as part of your cyber strategy
•How DNS can provide your SIEM with actionable intelligence
•How DNS can add value to other security controls, such as vulnerability scanners and end point protection
Join Infoblox and (ISC)² for a discussion on this often overlooked topic.
According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.
But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.
Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.
ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.
•Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today
•Security challenges: What basic micro-segmentation does, and the compromises it misses
•Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks
Cloud is changing the landscape of traditional information technologies. The impact of cloud on business-grade video collaboration has been felt in the Asia Pacific region in recent years. The increasing availability of cloud solutions empowers video collaboration among the entire workforce anytime and anywhere. Early adopters also contribute to the direction of localization and integrations, which helps further improve the feature set and capabilities of the solutions. As a result, there are prospective market growth opportunities for cloud-based video collaboration solutions.
Questions this webinar will answer:
· What are the trends in the Asia-Pacific cloud video collaboration services market?
· What are the growth opportunities for video communications powered by a cloud?
· How is the technology evolving and what are the impacts on end users?
· What are the promising partnerships emerging in the market?
· Why are IT teams and end users facing challenges with video calls?
With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.
In this webinar we will learn about:
i. Why SSL visibility is important
ii. What new challenges are we facing in SSL
iii. The importance of performance
iv. SSL in the age of virtualization
v. The impact of the evolving datacenter landscape on SSL requirements
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.
Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.
Overview of common compliance requirements
Best practices for preparing for and demonstrating compliance
Keys to overcoming challenges in your on-premises and cloud environments
How a unified security toolset can greatly simplify this process
Sr. Manager - Payments, Cloud & Technology, Coalfire
Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
Az internet világában megszámlálhatatlan nyílt forráskódú projekt létezik. Januári webinárunkban áttekintjük azokat a megoldásokat, amelyeket érdemes figyelembe venni, ha adatközpontunk infrastruktúráját szeretnénk fejleszteni.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.
When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.
In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:
- The top cybersecurity risks and best practices for securing cloud deployments
- How AWN security monitoring compliments the native security features in AWS and Office365
- The role of AWN cloud security in integrating observations from cloud and on-premise systems
To see how AWN CyberSOC™ can secure your cloud, register now.
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
• Nutanix Overview – Naming conventions and agnostic hardware and hypervisor support
• Nutanix technical detail - where and how the software runs and handles data
• Prism Management Demo – Detailed run through the core entities in Prism
With the global network functions virtualization (NFV) market projected to grow at a compound annual growth rate (CAGR) of 42%, reaching $15.5 billion by 2020, a massive market opportunity exists. To make it easier to design and deploy Network Functions Virtualization Infrastructure (NFVI) optimized systems, Intel has developed the new NFVI Server Block. Optimized to deliver exceptional performance for NFVI workloads, these pre-integrated, fully validated server systems reduce the complexity involved in designing and testing for the unique needs of NFVI.
This webinar will cover the key features and benefits of the NFVI Server Block as well as several other NFVI enablement options from Intel. You’ll walk away with actionable guidance on how Intel can help you harness this growing market opportunity.
With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.
Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.
In this webcast, we'll cover:
Essential security capabilities that all IT teams should have, regardless of size
Challenges of integrating and maintaining multiple security tools
How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
A demo of how AlienVault Unified Security Management speeds threat detection and incident response
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.