Hi [[ session.user.profile.firstName ]]

Virtualization

  • How to Standardize & Modernize your Open Source Cloud Infrastructure on Linux
    How to Standardize & Modernize your Open Source Cloud Infrastructure on Linux Daniel Messer, Storage Business & Philip Williams, Principal Architect, Rackspace Recorded: Jun 22 2017 67 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation. A standardized environment based on enterprise-ready, open-source operating system—Red Hat® Enterprise Linux®—and a hardware platform based on Intel ® is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux® to improve efficiency, and create a consistent foundation across current and cloud-future IT environments.
  • MSPs: Give customers the cloud (without letting them float away).
    MSPs: Give customers the cloud (without letting them float away). Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jun 22 2017 37 mins
    The cloud has upended the way your customers want to adopt applications and underlying infrastructures. It’s important that your business stays ahead of this transformation. Your customers are looking to you as their trusted managed services advisor to “make it work.” Join us to learn best practices for transitioning your customers to the cloud.
  • 10-Minutes to Cloud: How to Quickly Shift Big Data Processing
    10-Minutes to Cloud: How to Quickly Shift Big Data Processing Storage Switzerland, Avere Systems Recorded: Jun 22 2017 61 mins
    Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.

    In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
  • CEO Series featuring Cohesity
    CEO Series featuring Cohesity Arun Taneja, Taneja Group; Mohit Aron, Cohesity Recorded: Jun 22 2017 46 mins
    Cohesity is one of the rising stars in the world of data management. They have flipped the data protection market on its ear. In this CEO Series webcast, Arun Taneja, Founder and Consulting Analyst of Taneja Group will interview Mohit Aron, CEO of Cohesity, to understand the concept of Hyperconverged Secondary Storage and why it matters to the industry. We will explore the advantages it provides for your data protection, test/dev, and data analytics workloads and how Cohesity is different from other solutions on the market. It is time to say goodbye to the old, staid methods of protecting data. The traditional methods simply don’t make sense in the new world of Big Data, Multi and Hybrid cloud and web-scale applications. Join the webcast for a whirlwind tour of new ideas and methods in this space.

    Speakers:
    Arun Taneja, Founder & Consulting Analyst, Taneja Group
    Mohit Aron, Founder & CEO, Cohesity
  • Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage
    Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage George Teixeira - President, CEO & Co-founder & Sushant Rao - Senior Director of Product Marketing - DataCore Software Recorded: Jun 22 2017 59 mins
    Storage and infrastructure are going through a lot of changes. With technologies like Software-defined Storage as well as new infrastructure like Hyper-converged, there is a lot for IT admins to consider.

    Join us in this webinar where we’ll cover Software-defined Storage, Flash, Hyper-converged and Cloud Storage. You learn why these technologies and infrastructure models are or aren't being utilized by companies and the areas where they have not lived up to their promises.
  • Introducing the Future of CI: A New FlexPod Solution from NetApp & Cisco
    Introducing the Future of CI: A New FlexPod Solution from NetApp & Cisco Lee Howard, FlexPod CTO and Nitin Garg, Cisco Product Manager Recorded: Jun 22 2017 59 mins
    Be the first to hear about Cisco and NetApp’s exciting new FlexPod solution. This revolutionary design couples operational simplicity, guaranteed QoS, and granular scale-out with FlexPod’s proven architecture. The new solution will appeal to Infrastructure buyers, as well as, Cloud and Virtualization buyers who are building next generation data centers.
    •Learn how the solution can provide you with proven performance, agility and value through the latest NetApp and Cisco technologies
    • Experience how FlexPod converged infrastructure can reduce risk, deliver faster time to market and improve business outcomes
    • See how NetApp technology simplifies storage management and scales on demand
  • Change Liability for Accountability - GDPR with Cyber Security Risk Measurement
    Change Liability for Accountability - GDPR with Cyber Security Risk Measurement Christopher Strand, Carbon Black, Andrew Barratt, Coalfire, Adrian Davis, (ISC)² EMEA Recorded: Jun 22 2017 63 mins
    This webcast will introduce a discussion of several threat models that help to illustrate how organizations can look to strengthen their security posture while supporting their GDPR strategy. Areas of concentration will include:

    • How to reduce the potential risk and liability associated with the GDPR data residency and data protection accountability requirements.
    • Focus on specific controls used to provide clarity and measure to any GDPR strategy within the enterprise.
    • An introduction of cybersecurity control measure that can help reduce threats to the enterprise, while ensuring acceleration of data and security regulatory accountability for any GDPR program.

    Session attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of balancing the confluence of security risks and the GDPR mandate. They will have some starting points on how they can create a plan to step beyond static regulatory alignment and apply collective intelligence, industry baseline initiatives and mandates, as well as shared industry intelligence, to better measure what’s most important to their cyber policy and regulatory GDPR requirements.
  • 5 Steps To The Perfect Storage Refresh
    5 Steps To The Perfect Storage Refresh Storage Switzerland, Virtual Instruments Recorded: Jun 21 2017 60 mins
    In this live webinar, Storage Switzerland and Virtual Instruments will give you a 5 step, independent process for moving through a storage refresh project.

    In this webinar you will learn about the five key steps to success:

    1. Storage Technology Evaluation: (flash, hybrid, OpenStack, Ceph, etc)
    2. Product Evaluation: Determine which storage system meets your requirements
    3. Storage Configuration Optimization: Determine optimal storage configuration
    4. Production Management: Determine how to assure performance and rapidly resolve the inevitable problems
    5. Change Impact Analysis: Determine how future changes will impact performance
  • Modernizing Enterprise File Storage Workloads with Software-Defined Solutions
    Modernizing Enterprise File Storage Workloads with Software-Defined Solutions Irshad Raihan, Product Marketing, Red Hat Storage, fo& Yonathan Goltom, Senior Consultant, Red Hat Recorded: Jun 20 2017 46 mins
    Deploying open, software-defined scale-out storage solutions to industry standard Intel ® servers can allow you to easily manage unstructured data for physical, virtual, and cloud environments. Learn how you can benefit from added business agility and cost efficiencies by comparing traditional, monolithic storage to seamlessly scalable software-defined storage with Red Hat Gluster Storage - without sacrificing the durability, security, and performance you require from enterprise grade storage.
  • Streamlining Third Party Risk Assessments in the Cloud
    Streamlining Third Party Risk Assessments in the Cloud Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys Recorded: Jun 20 2017 59 mins
    Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

    For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

    During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

    You will learn how Pekin Insurance:

    > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
    > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
    > Gained improved visibility into its compliance performance metrics
    Increased the overall productivity and efficiency of its InfoSec team

    This webcast will include a live demo and Q&A session.
  • Why Data Migration Hurts And How To Stop the Pain
    Why Data Migration Hurts And How To Stop the Pain Storage Switzerland, Primary Data Recorded: Jun 20 2017 61 mins
    Transitioning from Data Migration to Data Management

    In this webinar join, Storage Switzerland and Primary Data for a roundtable discussion on how automated data management can help you overcome the budgetary and technological challenges with a migration strategy and how you can implement data flow to eliminate the problem once and for all.
  • Modernizing your SAP HANA Environment with All Flash Storage
    Modernizing your SAP HANA Environment with All Flash Storage Jeff Kato, Taneja Group; Stephen Carpenter, HPE Storage; Hasmig Samurkashian, HPE Storage Recorded: Jun 20 2017 59 mins
    As businesses become increasingly dependent on SAP HANA for real-time decisions, the demands of the infrastructure continue to grow. A more efficient and modern infrastructure is required to meet the demands of these global always on real-time environments. Storage plays a crucial role in maintaining high service levels and guarding against costly downtime. The right storage for SAP HANA is all flash.
    Join us as Jeff Kato, Senior Analyst and Consultant from Taneja Group describes why all flash is the best choice for HANA. Jeff will also provide a comparison of the leading all flash solutions in the market and illustrate where 3PAR All Flash leads the competition in critical storage efficiency metrics. Stephen Carpenter, Master Technologist from HPE’s Storage Business Unit, will share some key insights that distinguishes 3PAR StoreServ architecturally for HANA workloads. Additionally, Hasmig Samurkashian, Product Manager from the HPE Storage team will share actual customer deployment examples.

    Presenters:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group
    Stephen Carpenter, Master Technologist, Advanced Technology Center, HPE Storage
    Hasmig Samurkashian, WW Solutions Product Manager, HPE Storage
  • Data Integration Hub 10.2 Deep Dive and Demo
    Data Integration Hub 10.2 Deep Dive and Demo Scott Hedrick, Product Marketing, Charlie Hughes, Hubs Domain Expert, and Etai Margolin, Product Manager, Informatica Recorded: Jun 20 2017 60 mins
    See an in-depth discussion of the new features and a demo of Data Integration Hub including the new features of 10.2. Learn how you can boost your productivity, efficiency and self-service with modern, hub-based data integration.
  • Investigation or Exasperation? The State of Security Operations
    Investigation or Exasperation? The State of Security Operations Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Recorded: Jun 20 2017 58 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers
    ●How organizations are coping with an average of 40 actionable security incidents per week
    ●Where teams are focusing their security efforts
    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Measure your IT to have visibility
    Measure your IT to have visibility Erhan Ertul, Turkish Economy Bank Recorded: Jun 20 2017 43 mins
    We know we need to measure our IT systems and have visibility - but what level of monitoring is right for our environment?

    Join this webinar to discover how TEB uses monitoring to achieve their goals and help improve their development services - resulting in the highest level of customer satisfaction on their banking applications.
  • Nutanix Enterprise Cloud op Cisco UCS
    Nutanix Enterprise Cloud op Cisco UCS Sunil Dutt, Channel Sales, Benelux, Nutanix; Martijn Bosschaart, Sr Systems Architect Noord Europa, Nutanix Recorded: Jun 20 2017 46 mins
    Werelds meest geavanceerde enterprise datacenters vertrouwen op Nutanix web-scale technologie om hun bedrijfskritische applicaties en workloads voorspelbaar en consistent te laten draaien.

    Belangrijke aspecten van de Enterprise Cloud zijn het reduceren van kosten, door het vereenvoudigen van de infrastructuur en het beheer, het omlaag brengen van ongeplande downtime, en het mogelijk te maken om een “pay as you grow” model te hanteren.

    Nutanix biedt klanten nu ook de mogelijkheid om deze Enterprise Cloud te laten draaien op het krachtige Cisco UCS platform, op zowel de rackmount als blade series.

    In dit webinar vertellen we u graag wat Nutanix voor uw organisatie kan betekenen en wat de mogelijkheden zijn mbt de inzet van Cisco UCS, een oplossing die door CRN recent als "Product of the year Winner 2016" is uitgeroepen..
  • Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today
    Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today Stan Mesceda from Gemalto -Bruno Huttner & Gilles Trachsel from ID Quantique Recorded: Jun 19 2017 61 mins
    With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.

    Join Gemalto and ID Quantique for a joint webinar to learn more about:
    •What is quantum computing and how it affects security
    •Quantum cryptography in action
    •Examples of quantum cryptography in the enterprise and government space
    •Quantum-safe solutions at a glance
    •Future developments of quantum cryptography
  • Transitioning IoT Infrastructure: From Networks of People to Networks of Things
    Transitioning IoT Infrastructure: From Networks of People to Networks of Things Christian Renaud, Research Director, Internet of Things, 451 Research Recorded: Jun 15 2017 33 mins
    Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.

    Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.

    This webinar will cover:
    - Possible bottlenecks and roadblocks on the path to the Internet of Things
    - What leading organizations are doing today to prepare for the coming influx of new types of devices
  • How Organizations are Using OpenStack: Four Technical Use Cases
    How Organizations are Using OpenStack: Four Technical Use Cases Al Sadowski, Research Vice President, 451 Research Recorded: Jun 15 2017 60 mins
    Join this webinar with Research Vice President Al Sadowski of 451 Research as he presents four distinct use cases of how different organizations are using OpenStack.

    From building private cloud environments that provide public cloud services, to virtualizing network functions, to operating as a platform for deploying and managing containers at scale, the opportunities are endless.
  • Fission: Open-Source Serverless Functions For Kubernetes
    Fission: Open-Source Serverless Functions For Kubernetes Soam Vasani, Software Engineer Recorded: Jun 15 2017 28 mins
    Fission is a framework for serverless functions or Functions as a Service (FaaS) for Kubernetes. It allows users to run FaaS on any infrastructure.

    Fission exposes a conceptually simple interface: Users create _functions_ and associate them with _triggers_. Functions are short-lived and stateless, and are written in any supported language (NodeJS, Python, Go etc). Triggers invoke functions: they can be HTTP requests, timers, or other events.

    Along with demos, the talk will cover:

    1. Developer workflows: function versioning, unit testing, upgrades.
    2. Operational challenges with serverless and their mitigation
    3. Mixing serverless and more conventional designs as part of a real-world solution.
  • Dissecting the OPM Breach: How AI and Threat Hunting Removed the APT
    Dissecting the OPM Breach: How AI and Threat Hunting Removed the APT Thomas Pace, Director of Consulting Services at Cylance® Recorded: Jun 15 2017 50 mins
    The 2015 data breach at the U.S. Office of Personnel Management (OPM) was a defining moment for the federal government, as it continues to reel from the colossal theft of personnel information affecting 21.5 million individuals. Join us for an insightful discussion to understand more about this massive cyberattack in our webinar, “Dissecting the OPM Breach. How Artificial Intelligence and Threat Hunting Removed the APT.”

    During the webinar Thomas Pace, Director of Consulting Services at Cylance®, will walk you through the course of events that led up to the OPM breach, expose the motivation behind the attack, and project its probable long-term impacts on how the U.S. government evaluates its IT and security strategy.

    Thomas will review the role Cylance played in responding to the breach by explaining the tools and processes that Cylance utilized to quickly detect and remove the malware from over 10,000 machines. You’ll also get an inside look at how the lessons learned can help your organization to better prepare against and prevent security vulnerabilities.

    Register for the webinar to learn more about:

    •The evolution of the threat landscape during the past two years
    •The value of having incident response processes and products in place before an incident occurs
    •The inefficiencies of legacy antivirus solutions
    •The benefits of artificial intelligence-based malware detection
  • NSX Master Class: Security
    NSX Master Class: Security Jimmy Ray Purser & Ron Fuller Recorded: Jun 15 2017 59 mins
    The best actors don’t film an entire movie in a single day. The same is true for ‘bad actors’ in your data center: they don’t attack the whole data center at once, but start small and branch out rapidly. With this approach, they can make traditional segmentation methods ineffective. The key to cyber security is to always expect a counter move. You need to make your data center operate dynamically, just as your threats do, yet remain flexible to support your applications.

    In this session, we will look at methods to operationalize east-west security in ways that ensure scaling and flexibility don’t become an increased burden on your IT staff.

    You'll learn:
    - Best practices from government recommendations
    - Automation for security with Service Composer
    - Security resource planning using Splunk and NSX
  • Develop a Thoughtful Monitoring Strategy as the First Step in IT Transformation
    Develop a Thoughtful Monitoring Strategy as the First Step in IT Transformation Nancy Gohring, 451 Research; & Steve Francis, LogicMonitor Recorded: Jun 15 2017 57 mins
    Join 451 Research and LogicMonitor June 15th at 11:00 PST to learn how to develop a dedicated monitoring strategy to better navigate IT Transformation initiatives. This webinar will focus on identifying recent shifts in the IT space.

    Attendees will learn about:

    -451 analyst Nancy Gohring’s take on IT Transformation and related changes in the market

    -The challenges posed by faster and more frequent code and infrastructure changes

    -How infrastructure performance monitoring must adapt in the face of these challenges

    -How LogicMonitor is thinking about and approaching these issues, both internally and for customers
  • Winning Strategies for Preparing MEF 2017 Award Submissions
    Winning Strategies for Preparing MEF 2017 Award Submissions Stan Hubbard, MEF17 Program Director, and Rosemary Cochran, Principal & Co-founder, Vertical Systems Group Jun 27 2017 3:00 pm UTC 60 mins
    MEF's prestigious annual Awards Program, now in its 12th year, is the world's largest, longest-running awards program. It focuses on leadership in emerging Third Network services powered by LSO (Lifecycle Service Orchestration), NFV, SDN, and CE 2.0 networking technologies. The MEF 2017 Awards program recognizes service, application, technology, and professional excellence in the vibrant global Third Network community committed to delivering innovative solutions that are optimized for the digital economy and the hyper-connected world. The most advanced services typically provide an on-demand experience with user-directed control over service capabilities and are delivered over more automated, virtualized, and interconnected networks.

    This webinar that will help you identify the award categories in which your company excels. Attend and learn how to prepare an excellent award submission. We will cover:
    -MEF award categories and important dates
    -How to use the award submissions portal
    -Tips for writing concise, compelling submissions

    The deadline for submissions is September 13, 2017. Awards finalists will be announced on October 17, 2017.

    This is an excellent opportunity to have all of your questions answered and will help you to get one step closer to being an award winner.
  • NSX Master Class: Networking from Physical to Virtual and Back Again!
    NSX Master Class: Networking from Physical to Virtual and Back Again! Neil Moore & Ron Fuller Jun 27 2017 4:00 pm UTC 60 mins
    In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.

    This session will include:
    - A deep dive into setting up the physical and virtual network infrastructure.
    - Demos you can follow to get NSX quickly running in your environment.
  • Getting Started with Hyper-Converged Infrastructure
    Getting Started with Hyper-Converged Infrastructure Anita Kibunguchy, Product Marketing Manager Jun 27 2017 5:00 pm UTC 30 mins
    Business is moving faster than ever—and enterprise IT departments are struggling to keep up. Organizations need apps to run faster and more reliably, provision without the hassle, and scale on-demand while staying in budget. Hyper-converged infrastructure (HCI) makes all of that possible. Join us for the webcast to get a closer look at HCI, and find out how it can transform your data center.

    You’ll learn about:

    —The evolution of the modern data center
    —What HCI is and the case for a software-defined approach
    —The tangible—and intangible—benefits of HCI
    —How HCI works in the real world
  • Getting ready for a world of compliant containers with SUSE Manager
    Getting ready for a world of compliant containers with SUSE Manager Terri Schlosser & Joachim Werner, SUSE Jun 28 2017 2:00 pm UTC 60 mins
    As more and more applications are developed and deployed using containers, it is important for IT Operations and DevOps teams to be able to manage the container infrastructure. They must also ensure that these containers maintain and adhere to their internal security and compliance regulations. SUSE Manager, delivers best-in-class open source infrastructure management with new enhancements focused on improving DevOps efficiency with enhanced management of software templates and compliance, in hybrid cloud and container infrastructures. Join us to learn more about how SUSE Manager can help you get ready for a world of compliant containers.
  • Realize Unified Cloud Monitoring | The Devil's in the Details
    Realize Unified Cloud Monitoring | The Devil's in the Details John Worthington, Director of Product Marketing of eG Innovations Jun 28 2017 3:00 pm UTC 60 mins
    While there are many products that claim to provide cloud monitoring, the level of granularity provided by different solutions can vary significantly. But the devil’s in the details; the granularity provided by your performance monitoring solution will directly impact your ability to automatically diagnose performance issues before users are impacted.

    Join us for this webinar where John Worthington, Director of Product Marketing at eG Innovations discusses how managing private, public, and traditional data centers all together is no longer possible with multiple disparate monitors. Organizations must find a way to unify monitoring to successfully migrate digital business services to tomorrow’s hybrid cloud environments.

    You will discover how to:

    - Determine the critical requirements for assuring the performance of your digital business services as you migrate to the cloud
    - Learn the difference between universal and unified monitoring and how it can help you assure cross-cloud delivery of critical IT services
    - Validate a solid unified cloud monitoring solution with a demonstration and best practice features/functionality
  • Getting Rid of Risky Business: How contextual info is securing cloud app access
    Getting Rid of Risky Business: How contextual info is securing cloud app access Ella Segura, Identity and Access Management Expert at Gemalto Jun 28 2017 3:00 pm UTC 60 mins
    Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.

    Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.

    During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.

    Join us for a deep dive into:
    -Current implications of multi-cloud environments on IAM
    -Proactively using analytics to define access policies
    -Avoiding security fatigue through scenario-based authentication
    -Preparing for audits using policy implementations
    -A live demonstration of how this all fits together in a multi-cloud environment
  • Cloud-based Workstation Deployments Powered by Intel, IMSCAD and phoenixNAP
    Cloud-based Workstation Deployments Powered by Intel, IMSCAD and phoenixNAP David Hoff, Cloud Graphics Director, Intel Corporation Adam Jull, Founder & CEO, IMSCAD Global Jun 28 2017 4:00 pm UTC 60 mins
    State-of-the-art remote workstation experiences are now possible on any device, using infrastructure as a service (IaaS) hosted on the Intel® Xeon® processor E3 v5 family with Intel® Iris™ Pro graphics. Intel’s on-chip graphics technology powers a broad range of workstation-class applications for engineers, designers, and architects. Simple access is now available to companies of all types and sizes, on a trial basis and beyond. Leverage the capabilities of remote workstations with support provided by IMSCAD, a global consultant in graphics virtualization technology.
  • Case Study: Traditional Enterprise Storage to Modern Day Cloud Infrastructure
    Case Study: Traditional Enterprise Storage to Modern Day Cloud Infrastructure Karl Zimmerman, CEO at Steadfast and Bill Borsari, Head of Sales Engineering, Datera Jun 28 2017 5:00 pm UTC 60 mins
    Enterprise customers and service providers have been researching ways to find a modern day storage solution so they can move away from the traditional monolithic infrastructure environments. Customers have been looking for ways to remove silos, reduce OPEX/CAPEX, create operational efficiency – all with large scale-out capabilities and cloud agilities without sacrificing performance.

    This webinar is to share how customers can achieve these goals with a truly software-defined storage solution. Companies have transformed seamlessly from traditional storage environments to flexible, cloud-like agile environments.

    Hear from Steadfast, a service provider leader, who enables their customer base to focus on their company priorities to grow the business instead of spending the unnecessary time to maintain and manage their traditional storage infrastructure.

    In this session, you will hear about:

    - The modern day storage-as-a-service infrastructure with high-performance, extreme scale-out flexibility and cloud agility
    - How to eliminate manual data migration
    - Fully automating the storage infrastructure
    - Steadfast’s IT transformation
  • What’s Next in Storage for Managed Service Providers?
    What’s Next in Storage for Managed Service Providers? Storage Switzerland, ClearSky Jun 28 2017 5:00 pm UTC 60 mins
    The cloud has brought both risk and reward to MSPs. In today’s hybrid cloud world, MSPs must deliver consumption-based, private and public cloud offerings to their clients. This includes offering primary storage, offsite backup and DR that is high-performance, scalable and secure. Outsourcing primary storage along with backup and DR enables an MSP’s customers to reduce their on-premises footprint software licenses, connectivity and the problems that come with it. It also sets up the MSP to offer hybrid services like DR as a Service and the new opportunity of copy data management - stop making copies.
  • Your Secret’s Safe with Me: Using and Managing Secrets in Containers
    Your Secret’s Safe with Me: Using and Managing Secrets in Containers Liz Rice, Technology Evangelist, Aqua Security, and Sagie Dulce, Senior Researcher, Aqua Security Jun 28 2017 6:00 pm UTC 45 mins
    As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
    How do you assign and deploy secrets to containers while keeping them secure?
    How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
    How do update, rotate and revoke secrets without interrupting the containers that use them?
    How do you leverage existing secrets stores (KMSs) and extend their use to containers?

    Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
    · Learn some of the “do's and don'ts” of securing secrets
    · Learn the cardinal security requirements of secrets management
    · Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
  • Docker Containers: From Pilots to Production
    Docker Containers: From Pilots to Production Jay Lyman Principal Analyst in the Development, DevOps at 451 Research, Rob Lalonde VP and General Manager at Univa Navops Jun 28 2017 6:00 pm UTC 60 mins
    Ensuring you’re prepared for the next series of challenges

    Docker Containers and Kubernetes are taking the industry by storm, promising new levels of efficiency for both application developers and operations teams. Even organizations not engaged in a wholesale re-architecture of their application environments can benefit from desirable properties of containers like packaging, portability and service isolation.

    While the benefits are real, many organizations face choppy waters as they evolve from initial public or private cloud deployments to production. While Kubernetes is impressive at abstracting resources and managing containers, new services still need to interact with existing applications, and challenges abound related to multi-tenancy, resource scarcity and ensuring that business priorities are met.

    Join us for an informative and insightful look at containers in the enterprise, and learn about new technologies and strategies that can help ensure a smooth and trouble free evolution as you chart your course from pilot to production. Whether you’re advanced in your use of containers or just getting started, there are important insights to be gained.

    Key takeaways
    •451 Group’s latest research and analysis
    •The “state of containers” and their adoption in IT
    •Benefit from case studies and lessons learned by early adopters
    •Considerations when deploying applications to production
    •Techniques to maximize utilization and optimize expenditures
    •Strategies for supporting mixed container and non-container workloads
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches)
    Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto Jun 29 2017 12:00 am UTC 60 mins
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • The Role of Orchestration in Incident Response
    The Role of Orchestration in Incident Response Chris Neely, CISSP, Director of Technical Sales, EMEA, IBM Resilient, Adrian Davis, Managing Director, (ISC)² EMEA Jun 29 2017 1:00 pm UTC 60 mins
    Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best orgaizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.

    Join IBM Resilient’s Chris Neely, Director of Technical Sales, EMEA to explore the latest incident response methodology and technology. Can automation really save the day? From instant escalation, to automatic enrichment, to guided mitigation, Chris will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
  • EIP: Construyendo el Camino a los Servicios de la Tercera Red
    EIP: Construyendo el Camino a los Servicios de la Tercera Red Emerson Moura - Distinguished Systems Engineer, Cisco & MEF CALA Marketing Co-chair Jun 29 2017 3:00 pm UTC 75 mins
    Carrier Ethernet es el combustible para la economía digital global y la base sobre la cual se construye nuevos servicios dinámicos, seguros y orquestados para el mundo hiper_conectado. Pero la falta de estandarización para interconectar proveedores y operadores de servicios Ethernet es un obstáculo para el crecimiento y la eficiencia del mercado. Actualmente, la mayoría de las interconexiones Ethernet son interconexiones de red a red (NNI) no estándar y personalizadas, lo que impide escalar el mercado. Más de una docena de proveedores de servicios y proveedores de tecnología miembros del MEF han participado en el proyecto MEF para crear Puntos de Interconexión Ethernet (Ethernet Interconnect Points o EIP) aprovechando los estándares existentes para interconexión CE. La primera fase del proyecto EIP involucró la creación de una Directriz de Implementación de Punto de Interconexión Ethernet que recomienda cómo usar las Interfaces Estándar de Red a Red (ENNIs) de forma eficaz. Esta guía inicial se enfoca en la configuración de servicios de acceso Ethernet (E-Access) de una manera simple, y las nuevas directrices avanzarán en complejidad con en el tiempo. Las directrices ayudarán a la industria a escalar rápidamente y reducir complejidad.

    Este webinar explorará dónde se dirige el mercado, las expectativas técnicas, los obstáculos operacionales que pueden surgir y la necesidad de que los operadores gestionen eficazmente la transición a medida que el mercado avanza hacia la estandarización. Este seminario apunta a aquellos proveedores de servicios que compran servicios de Ethernet mayoristas de operadorese interconectan sus redes para crear servicios CE minoristas de extremo a extremo pasando por múltiples redes. También se compartirá informaciones que pueden ser importantes para la toma de decisiones mientras desarrolla su estrategia de cómo sacar total provecho de interconexiones Ethernet estandarizadas.
  • Power your Oracle Database and Business Applications Without Licensing Issues
    Power your Oracle Database and Business Applications Without Licensing Issues Alex Infanzon, Application Solution Manager, Pure Storage Dean Bolton, President at VLSS LLC Jun 29 2017 5:00 pm UTC 60 mins
    How can a better storage infrastructure accelerate time to discovery for genomics research?

    Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. Brian Schwarz from Pure Storage will also share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.

    Tune into the conversation to learn:

    - Why the convergence of data storage and life sciences research go hand-in-hand
    - Technologies and best practice methodologies for genomic analysis, including containers and workflows
    - How to handle massive big data sets in real time
  • 4 pitfalls to avoid with DR in hybrid cloud.
    4 pitfalls to avoid with DR in hybrid cloud. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jun 29 2017 5:00 pm UTC 60 mins
    Is your disaster recovery (DR) strategy inhibiting your company’s growth? A hybrid DR approach can bring significant benefits but only if you go in with full knowledge and understanding. In this webinar, we’ll outline the four pitfalls that can sink a DR strategy.
  • Compliant containers with SUSE Manager - Grow Your Technical Knowledge
    Compliant containers with SUSE Manager - Grow Your Technical Knowledge Donald Vosburg, SUSE Jul 6 2017 2:00 pm UTC 30 mins
    Get some excellent technical details about "getting ready for a world of compliant containers with SUSE Manager" in only 30 minutes!
  • Real-Time Data Management: Genomic Research Relies on Storage
    Real-Time Data Management: Genomic Research Relies on Storage Alan S. Louie, Research Dir., Eric Burgener, Research Dir., DC Health Insights, Brian Schwarz, VP of Product, Pure Storage Jul 6 2017 5:00 pm UTC 60 mins
    Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will also share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. And then Brian Schwarz from Pure Storage will share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 6 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • Everything You Wanted To Know About Storage: Programming & Networking Had a Baby
    Everything You Wanted To Know About Storage: Programming & Networking Had a Baby Rob Peglar, Symbolic IO, J Metz, Cisco, Alex McDonald, NetApp, Dror Goldenberg, Mellanox Jul 6 2017 5:00 pm UTC 75 mins
    In this, the sixth entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into some of the nitties and the gritties of storage details that are often assumed.

    When looking at data from the lens of an application, host, or operating system, it’s easy to forget that there are several layers of abstraction underneath before the actual placement of data occurs. In this webcast we are going to scratch beyond the first layer to understand some of the basic taxonomies of these layers.

    In this webcast we will show you more about the following:

    •Storage APIs and POSIX
    •Block, File, and Object storage
    •Byte Addressable and Logical Block Addressing
    •Log Structures and Journaling Systems

    It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.

    Join us on July 6th for this session. We look forward to seeing you there!
  • Turning the Table on Hackers and Breaches
    Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Jul 11 2017 3:00 pm UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • What's New in vSAN 6.6: Transforming the Software-Defined Data Center
    What's New in vSAN 6.6: Transforming the Software-Defined Data Center Lee Caswell, VP of Product, Michael Haag, Group Manager, Vahid Fereydouny, Sr. Product Line Manager Jul 11 2017 5:00 pm UTC 75 mins
    Hear from Lee Caswell, VP of Products for storage and availability, how the latest innovations in VMware vSAN 6.6 are helping customers simplify and accelerate their digital transformation.

    VMware vSAN, our award-winning software powering leading hyper-converged infrastructure (HCI) solutions, continues to evolve as a core building block for the Software-Defined Data Center. After Lee’s introduction, vSAN product experts will cover how vSAN enables you to seamlessly extend virtualization to secure hyper-converged storage, to reach your objectives for cost and efficiency, and to scale to tomorrow’s business needs. We’ll also share insights gained from our vSAN beta program where we focused on features and capabilities that informed vSAN 6.6, including security, protection, and management.

    Join us to learn how that latest features in vSAN 6.6 can help set your storage and availability agenda in 2017 and beyond.
  • Citrix Monitoring Tools | What Are My Options & How Do I Choose
    Citrix Monitoring Tools | What Are My Options & How Do I Choose Rob Beekmans, Solutions Architect at PQR Jul 11 2017 5:00 pm UTC 60 mins
    Organizations are looking for the right tools to monitor their Citrix farms. However, this is no easy task. There are several tools available in the market today - some from Citrix itself such as Director and NetScaler MAS, and others from third-party vendors like eG Innovations, Goliath Technologies, ControlUp, and more. Before investing in a Citrix monitoring tool, Citrix administration teams must be well-informed of what each of these tools is capable of, what use cases they serve, and their benefits and shortcomings.

    View (or join us for) this webinar as Rob Beekmans, Solutions Architect at PQR gives a vendor-neutral analysis of various monitoring tools with the objective of making you aware of the available options, and helping you choose the best monitoring tool for your Citrix deployment. Be informed, choose wisely!
  • A head-to-head comparison of the top-rated products in HCI & SDS
    A head-to-head comparison of the top-rated products in HCI & SDS Alfons Michels - Senior Product Marketing Manager, Sushant Rao - Senior Director, Product Marketing Jul 12 2017 6:00 pm UTC 60 mins
    When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-Converged Infrastructure (HCI) and Software-Defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.

    But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.

    Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization. In this webinar, we will cover the:
    - Criteria to evaluate these products
    - Pros and cons of different vendors’ products
  • App-Aware Data Management for Cloud-Scale All-Flash Storage
    App-Aware Data Management for Cloud-Scale All-Flash Storage Max Brown, Channel Technical Manager, Pure Storage & Rutger Kosters, Solutions Architect, Rubrik Jul 13 2017 9:30 am UTC 60 mins
    How Pure Storage and Rubrik work together to address many key challenges in the datacenter.

    Pure Storage and Rubrik deliver granular RPOs for production workloads while eliminating the effects of VM application stun. For highly transactional applications in virtualised environments, we can ensure high performance without lengthy snapshot windows and application time-outs.

    The integration significantly reduces the VM snapshot stun window while providing consistent point-in-time copy of VMs for reliable and quick recovery. Unlike traditional backup-vendor integrations with block-storage arrays, Rubrik’s direct integration with the Pure Storage FlashArray provides granular protection and file-level recovery for virtualised environments.

    In this webinar, we’ll discuss how Pure Storage and Rubrik work together to address many key challenges in the datacenter, including:

    Lengthy deployment and complex management
    Lack of scalability and performance bottlenecks
    Bloated footprint and lack of visibility and analytics