Hi [[ session.user.profile.firstName ]]


  • Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Josh Green, Richard Archdeacon, Duo Recorded: Dec 10 2018 59 mins
    During episode 1 in our Trust No One Series, we heard about the origins of Zero Trust. Episode 2 showed us how Banco Santander started their Zero Trust journey.

    In this Part 3, Duo will demonstrate how they deliver Zero Trust models to their customers.
    You’ll leave with a hands-on basic understanding of how to deploy Duo to a cloud-based web-application.

    Duo has been a pioneer in bringing Zero Trust models to the commercial market, allowing organisations to protect themselves quickly and easily.

    Josh Green, Solutions Engineer, Duo Security
    Richard Archdeacon, Advisory CISO, Duo Security
  • StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    Storage Switzerland and Aparavi Recorded: Dec 7 2018 16 mins
    Join Storage Switzerland and Aparavi for our live PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they protect, retain and remove data.

    During the PodCast we cover:
    - The aspects of the GDPR and CCPA regulations that should concern IT
    - The challenges the regulations create for current data protection retention applications
    - How organizations need to change policies and products to address the regulations
    - Answers to live audience questions about data privacy, GDPR, and CCPA

    All attendees to the live event receive a free copy of Storage Switzerland’s latest eBook “GDPR IS FOR EVERYONE - Designing a Data Privacy Infrastructure”.
  • Automatisierung mittles APIs
    Automatisierung mittles APIs
    Markus Grau, Principal Systems Engineer und Gabor Horvath, Implementation Engineer bei Pure Storage Recorded: Dec 7 2018 30 mins
    Immer häufiger werden Arbeiten an Storage Arrays nicht mehr über ein GUI oder CLI erledigt, sondern werden von Workflows oder Runbooks angestoßen. Ebenso werden Arrays in immer mehr 3rd Party Tools für z.B. Monitoring oder Backup integriert. Durch die offene HTTP REST API können diese Arbeiten sehr einfach und schnell erledigt werden. In diesem Webinar zeigen wir am lebenden Beispiel wie man Pure Arrays mittels APIs verwaltet und welche Integrationen von Partner (z.B. VMware, Veeam, Docker, Microsoft, etc.) diese bereits nutzen. Heute sind python, PowerShell, Ansible, Puppet, OpenStack, etc. keine Exoten mehr sondern ein Bestandteil der modernen IT, um Infrastructure As Code umzusetzen.
  • Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Eric Slack, Sr. Analyst, Evaluator Group Recorded: Dec 6 2018 37 mins
    Digital transformation is happening! It’s driving companies to adopt new ways to capture and analyze data (the new oil), to discover new insights and optimize the way they run their businesses.

    IT is evolving to meet these new requirements, becoming more agile to keep up with dynamic markets - and the competition. The Cloud is a key, but on-prem infrastructures are, and will be, a part of most enterprise’s future.

    Join Eric Slack, Sr Analyst with the Evaluator Group and see how CI, HCI and Composable can address this need for agile, comprehensive infrastructures that reduce time for design, configuration, deployment and operations.
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 6 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Next-Generation Hyperconvergence and Security
    Next-Generation Hyperconvergence and Security
    Mike McGhee - Technical Marketing Engineer at Nutanix | Shaun Donaldson - Director of Strategic Alliances at Bitdefender Recorded: Dec 6 2018 58 mins
    Since Nutanix pioneered hyperconverged infrastructure (HCI) in 2011, HCI has become an optimal way to run enterprise cloud. Meanwhile, the cyber threat landscape has worsened, demanding new approaches to protecting from advanced attacks.

    Join this webinar to see how Nutanix and Bitdefender work together to provide you the following:

    -An easy way to build a cutting-edge enterprise cloud for your environment
    -A bullet-proof combination of a hardened cloud and next-generation security for its files and workloads
    -An integrated solution to help you save time on infrastructure and security management and compliance
  • What’s Your 2019 NVMe Strategy?
    What’s Your 2019 NVMe Strategy?
    Storage Switzerland, Western Digital Recorded: Dec 6 2018 47 mins
    The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and not all applications or environments can take advantage of the performance NVMe promises. At the same time there are workloads like artificial intelligence, machine learning and high velocity analytics that need all the performance that NVMe can offer and some organizations are buying NVMe solutions just for those workloads.

    Most data centers already have too many storage systems to manage, and adding another silo just for extreme performance workloads may make the problem even worse. IT needs a strategy to not only correctly integrate NVMe into the data center but to do so in a way that doesn’t further fragment the architecture. In fact, with the right strategy, IT can use the NVMe system as a point of storage consolidation.

    In this live webinar join experts from Storage Switzerland and Western Digital for an interactive webinar the will help you develop an NVMe strategy that makes the most sense for your organization.
  • Oracle Workloads in the Public Cloud
    Oracle Workloads in the Public Cloud
    Dave Welch, CTO & Chief Evangelist; House of Brick Technologies Recorded: Dec 6 2018 54 mins
    What’s going on with Oracle core technology workloads in the IaaS Cloud market? What customer activity are we seeing in that space? What are the opportunities and challenges? How have those opportunities and challenges shifted?

    Join this live webinar with Dave Welch, CTO and Chief Evangelist at House of Brick Technologies to answer these questions and more, and take a technical deep dive into Infrastructure-as-a-Service and the cloud market in 2019.
  • Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Jim Sangster, Sr.Director Product Mktg, Supermicro; Brian Watson, DCG Product Mktg, Intel Recorded: Dec 6 2018 40 mins
    Unparalleled performance and enterprise-class capabilities are now available in the industry’s broadest portfolio of entry level UP servers and multi-node blades from Supermicro. Learn how you can now “do more” than ever before in this class of system, at the same entry prices.
    Together with latest Intel® Xeon® E-2100 Processor and Supermicro UP systems, the broad portfolio offers the right server optimized for your environment.
  • How to Get Your Business Digital Ready
    How to Get Your Business Digital Ready
    Ghassan Abdo, Research VP, IDC and Danny Johnson, Director of Product Marketing, Verizon Recorded: Dec 6 2018 61 mins
    Join Verizon and Ghassan Abdo, Research VP, Worldwide Telecom Cloud, & Virtualization Services, IDC for an engaging discussion about digital transformation and what organizations should consider as they take the next step in their digital journey. Get more insight into the key findings from the recent IDC MarketScape: Worldwide Communication SP SD-WAN
    Managed Services 2018 Vendor Assessment as well as the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment. Plus, find out what your organization needs to do to become a digital leader and improve business outcomes. Participants will be able to download a complimentary copy of the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment, and a Verizon authored decision-maker’s guide.

    About the speakers:
    Ghassan Abdo, Research VP, WW Telecom Cloud, & Virtualization Services, IDC
    Mr. Abdo, Research Vice President in the Telecommunications group, covers the evolution of the Telco Cloud Ecosystem as well as the emerging Virtualized Enterprise Networking services. His primary focus areas include Service Provider SD WAN and Managed Services, and emerging NFV-based Virtual Networking Services as well as other Managed WAN Services. In the Hosting & Cloud segment, Ghassan covers Service Provider Managed Hosting services, including Hybrid Managed Private/Public Cloud Services, Colocation Services, Secure Cloud Connect and CDN services.

    The session will be moderated by Danny Johnson, 20+ year veteran in the technology industry. He is a seasoned executive possessing experience in software development, engineering, sales, consulting, product development, and marketing. Danny has started and launched innovative products and solutions within multi-billion dollar markets and is currently the head of product marketing for Verizon where he shares responsibility for the profitable growth of Verizon’s Strategic Network Portfolio.
  • Cybersecurity Ratings Part 3: The Third Way
    Cybersecurity Ratings Part 3: The Third Way
    Brandon Dunlap, Moderator, (ISC)², Nick Trigg, BitSight, Bob Lewis, (former) Barclays Recorded: Dec 6 2018 59 mins
    In the third of the series exploring BitSight Security Ratings, we will be focusing on the challenge of third party supplier risk management:

    - How can we manage suppliers using the dimensions of inherent risk impact and residual risk appetite?
    - How can we place suppliers cyber risk posture into context of our business?
    - How can we continuously monitor and remediate according to sensible risk prioritisation?

    Bob Lewis (former head of External Cyber Assurance and Monitoring, Barclays UK) will be discussing real life examples with Nick Trigg from BitSight.
  • Join the Stress-Free Data Protection Revolution!
    Join the Stress-Free Data Protection Revolution!
    Florian Malecki, International Sr. Product Marketing Director Recorded: Dec 6 2018 44 mins
    Midsize businesses are increasingly embracing digital technology to gain a competitive advantage. However, the explosive data growth, coupled with a lean IT staff at most midmarket organizations has placed an immense burden on data protection and storage infrastructure requirements.

    In recent years, a disruptive technology has emerged, creating a brand new category of backup & recovery and storage solutions: converged data protection appliances.
    The concept is very simple: combine backup and recovery software with a scale out storage appliance that can be used as a backup target as well as accommodating most storage requirements.

    Join this webcast to learn about the benefits of converged data protection platforms and what to look for when making your final decision.
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Seyi Verma, Director of Product Marketing, Druva Recorded: Dec 5 2018 63 mins
    With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.

    Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
    - Centralise and simplify management of corporate data environments
    - Reduce costs and demands on local resources, and achieve 60% lower TCO
    - Modernise data protection for virtual workloads
    - Meet critical application data recovery speeds, and business continuity SLAs
    - Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security

    We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
  • Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Jim Jeffers, Sr. Director, Principal Engineer, Intel; Bart Willems, Director, Sr. HPC Engineer/Architect, Atipa Recorded: Dec 4 2018 26 mins
    Scientific simulations and modeling continue to produce larger and larger data sets. For our brain to understand and digest these vast amounts of data, visualization becomes an indispensable tool for post-simulation processing. Data produced by simulations is therefore often copied to high-end workstations and servers with special-purpose GPUs. As simulations continue to grow, moving and copying data becomes increasingly inefficient, time consuming, and wasteful of resources. The Atipa Polaris Select HPCV Cluster Family built on Intel Xeon Scalable Processors and Intel Omni-Path Fabric technology is the industry's first unified platform for scientific simulation and visualization. Using Intel Xeon optimized rendering engines, Atipa Polaris Select HPCV clusters offer in-situ visualization of big data on the same HPC system used to generate the data, eliminating the need for wasteful data transfers and special purpose hardware.
  • Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Bernie Hannon, Sr. Director, Citrix; Pankesh Mehta, Sr. Product Mgr, Lenovo Recorded: Dec 4 2018 61 mins
    For years, we’ve talked about the virtues of virtual desktop infrastructure (VDI). However, at the end of the day customers who invested time, resources and significant budget, often found that the benefits of VDI came with some hefty challenges. Complexity and time-to-value are difficult enough, but striking the balance between security and anytime/anywhere/any device access with has increasingly caused headaches for IT (not to mention the users!). Traditionally, securing apps and data meant keeping everything running in the data center, requiring IT to invest in expert resources to deploy and manage everything. In this session, you will see how these challenges have been addressed and how the barriers to adopting hybrid cloud digital workspaces are a reality with Citrix Cloud services deployed on Lenovo ThinkAgile HX. You’ll learn what VDI hasn’t been able to do, is now being delivered by Citrix and Lenovo. If you’ve already deployed VDI, we’ll show you how to relieve yourself of the burden of managing and maintaining a complex VDI environment, enabling you to put resources to better use. If you haven’t deployed VDI yet, we’ll show you just how simple it is to create secure, easy-to-use, and manage intelligent workspaces you and your users have been looking for. It’s called The Future of Work, and it’s here today.
  • VMware NSX and Intel: Getting the Most Out of Your Infrastructure
    VMware NSX and Intel: Getting the Most Out of Your Infrastructure
    Bob Ghaffari, Director, Intel & Calvin Chai, Director, VMware Recorded: Dec 4 2018 48 mins
    In today’s world of applications, dynamic workloads, and software-defined technologies, performance matters more than ever. Metrics like latency, availability, throughput, and processing power are all critical to designing a hyper-converged, software-based data center. Intel and VMware have been actively collaborating on technologies optimized for network workloads, and helping customers build solutions for enterprises of all sizes. In this session, we will explore how VMware, Intel, and customers are building multi-cloud networking solutions that combine all the speed and agility of the software experience with VMware NSX, together with platform benefits such as, Intel ISAs, DPDK, QAT.
  • Expecting the future with 4SIGHT
    Expecting the future with 4SIGHT
    Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice President Recorded: Dec 4 2018 53 mins
    Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.

    451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.

    Join us and see how you can raise your planning game!
  • VDI Strategy in a Multi-Cloud World: Building the Optimal Hybrid Cloud Platform
    VDI Strategy in a Multi-Cloud World: Building the Optimal Hybrid Cloud Platform
    Paul Murray, Senior Systems Engineer, Nutanix & James Hsu, Senior Technology Architect, Citrix Recorded: Dec 4 2018 60 mins
    Nutanix and Citrix have partnered to create a tightly integrated multi- cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.

    In this webinar, you will learn how Nutanix and Citrix allow you to:
    · Take advantage of enterprise-class VDI benefits without any complexity
    · Simplify desktop management and operations while increasing security and compliance
    · Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
    · Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
  • 5 Security Stories of 2018: What Our Customers Have Taught Us
    5 Security Stories of 2018: What Our Customers Have Taught Us
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Matthias Maier, EMEA Director of Product Marketing, Splunk Recorded: Dec 4 2018 60 mins
    Where has the time gone?

    2018 may forever be known as the year of GDPR, but a look back to the last 365 days shows us that those in cybersecurity have been through a year of numerous trends, investments and modernisations of their Security Operations.

    This webinar will share trends and lessons learned from Splunk’s own customers throughout 2018, including

    -Insights into SOC activities at the Bank of England
    -What security life really looks like at Siemens
    -Overcoming the Industrial Internet of Things/Industry 4.0 security challenges at Volkswagen AG
    -The skillsets Telia needed for their SOC to be successful.

    Join us on December 4th, 12pm GMT as Matthias Maier goes through the top tales you need to hear as a security practitioner or manager.
  • Mainframe: Legacy or Transformation Opportunity?
    Mainframe: Legacy or Transformation Opportunity?
    Simon Ratcliffe, CIO Advisor & Mentor, IT Evangelist, Ensono & Cloud Industry Forum Recorded: Dec 4 2018 56 mins
    A 2018 survey of Enterprise organisations by Ensono and the Cloud Industry Forum showed that 89% of the 500 participants surveyed indicated that legacy technology within their businesses were preventing or hampering their ability to execute effective digital transformation.

    Perhaps the greatest legacy within many organisations is the mainframe estate that brings the challenges of punitive vendor commercials, risks with maintaining on-going skills, lifecycle planning issues and the sheer volume of residual workload that remains within these estates. With increasing pressure to modernise the applications, methodologies and tooling surrounding these legacy environments, the mainframe is often seen as holding businesses back but does this need to be the case?

    This webinar will explore different approaches to enabling these legacy systems to be part of the transformational journey rather than a blocker and examine how organisations can re-define the legacy blockers as positive rather than negative attributes.
  • 2018 Threat Landscape Roundup and Predictions
    2018 Threat Landscape Roundup and Predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Dec 4 2018 36 mins
    Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.
  • Container und Pure Service Orchestrator
    Container und Pure Service Orchestrator
    Marija Šanina, Systems Engineer bei Pure Storage Recorded: Nov 30 2018 39 mins
    "Die Einführung von Container nimmt rasant zu, aber die fehlende Unterstützung von persistentem Speicher und dessen Skalierbarkeit, um die Anforderungen und Geschwindigkeit von Containern zu erfüllen, scheint den Trend zu verlangsamen.
    Mit dem Pure Service Orchestrator können Sie nun Storage- as- a- Service für Container liefern, um on-demand, microservicebasierende scale-out Applikationen aufzubauen und auszurollen, die die Anforderungen dynamischer, containerisierten Umgebungen erfüllen.
    Mit Pure Storage können Sie somit in Ihrer eigenen Infrastruktur, on-premise, die Agilität erfahren und ausüben, die man so bisher nur von der Public Cloud kennt."
  • Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Steve Hunt, Dir. Product Management - DataCore Recorded: Nov 29 2018 46 mins
    IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect on day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.

    This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.
  • Targeted Attacks: How to Recognize From a Defender's POV
    Targeted Attacks: How to Recognize From a Defender's POV
    Sam McLane, CTSO, Arctic Wolf Networks Recorded: Nov 29 2018 37 mins
    Cybersecurity is the biggest risk law firms face, and they can expect to face greater scrutiny from clients on how they use, store and protect client data. An effective cyber risk program often requires advanced threat detection and response capabilities that can challenge even a well-resourced internal IT team. While many recreations and online exploits are presented from the attacker's point of view, what do these attacks look like on the defender's side?

    In this webinar, top security operations center (SOC) expert, Sam McLane, will share war stories on how attacks appeared in targeted organizations, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.

    After attending, we will help you answer the following key questions:

    - How can law firms demonstrate to their clients the effectiveness of their cybersecurity programs?
    - What are the key risk factors that law firms face and how can they be mitigated?
    - Why are law firms particularly vulnerable to the new cyberattacks that are becoming more prevalent?
    - What is the right way to manage a cybersecurity breach?

    Register now to hear from this security expert!

    About our key speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Dec 10 2018 9:00 pm UTC 45 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • Aprovecha los beneficios de desplegar SAP en AWS, con SUSE y Linke
    Aprovecha los beneficios de desplegar SAP en AWS, con SUSE y Linke
    Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke Dec 11 2018 3:00 pm UTC 60 mins
    Descubre de la mano de Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke, AWS Premier Partner con la SAP Completency, cómo y por qué desplegar SAP en la nube de Amazon Web Services utilizando SUSE Linux Enterprise Server for SAP.
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Dec 11 2018 3:00 pm UTC 60 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Jambi Ganbar, Sr. Technical Solutions Manager NFV Ready Program, VMware and Petar Torre, Intel Lead Telco Architect Dec 11 2018 4:00 pm UTC 60 mins
    Intel and VMware will explore the impact of NFV Infrastructure on VNF Data Plane performance. We will explain the correct hardware design and then discuss the optimal use of VMware vCloud NFV to achieve high throughput and low latencies. This will be excellent opportunity to learn about Data Plane HW configurations with Intel® Xeon® Scalable Processors and Intel® Ethernet Adapters 710 Series, as well as VMware’s latest vCloud NFV OpenStack Edition 3.0 and NSX.
  • Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Michael Ocampo, Product Mgr, Supermicro; Jason Kennedy, Director, Data-Centric Product Mktg, Intel Dec 11 2018 5:00 pm UTC 60 mins
    The 5th generation of Supermicro’s Twin Architecture has been optimized to support cloud application solutions. In this Webinar, we will learn how companies configure their cloud infrastructure to maximize the BigTwin’s compute, memory and storage resources with virtualization. We will take a deep look into how BigTwin offers cost-effective memory bandwidth, which is critical for cloud applications and NoSQL performance.
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Dec 11 2018 5:00 pm UTC 60 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid


    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Dec 11 2018 6:00 pm UTC 75 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Dec 11 2018 6:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Monitoring and Managing Ceph with openATTIC
    Monitoring and Managing Ceph with openATTIC
    Tim Serong, SUSE Dec 12 2018 12:00 am UTC 45 mins
    openATTIC is a web-based management and monitoring tool for Ceph storage clusters. This webinar covers the functionality available in the most recent release, including performance graphs, node and disk monitoring, along with storage and gateway service management.
  • How to Rule Your Data World
    How to Rule Your Data World
    Jacqueline Bloemen, Senior Analyst BI (BARC) and Becky Smith, Sr. Product Marketing (Denodo) Dec 12 2018 10:00 am UTC 60 mins
    In a digtial World data is really everywhere. It enables innovative use cases, optimizes internal processes and will significantly affect tomorrow´s businesses.

    The growing interconnectedness of people, companies, and devices, however has led us to a vast volume of data from an ever-widening variety of sources. This has resulted in the rising awareness of the necessity to implement a data strategy.

    In this webinar Jacqueline Bloemen, Senior Analyst BI at BARC and Becky Smith, Senior Marketing Manger at Denodo, provide an overview of the current state of data strategy and data governance initiatives from companies around the world, based on the findings of a recently conducted study.

    Key Questions this webinar will address:

    - What are the most striking benefits of data governance?
    - Which technological approaches are companies taking to control and provide data?
    - What are the critical success factors of effective data governance?


    1) Introduction and Challenges (Denodo)
    2) Insights into the current state of data strategy and data governance initiatives (BARC)
    3) Key Takeaways
    4) Q&A
  • Benefits of NVMe™ SSDs in Client Implementations
    Benefits of NVMe™ SSDs in Client Implementations
    Cameron Brett, Toshiba and Jonmichael Hands, Intel Dec 12 2018 5:00 pm UTC 60 mins
    NVM Express® over PCI Express® SSDs is the mainstream solution in the client space because it is low cost and has a smaller form factor than HDDs, while touting high performance and low power usage. Evolving to meet the needs of consumers, NVMe™ implementations touch various markets like gaming, content creation, workstations, mobile, media creation and more. Join Jonmichael Hands of Intel and Cameron Brett of Toshiba for this NVM Express, Inc. hosted webcast to learn more about real-world examples and how NVMe specifications continue to evolve to support client needs.

    In this webcast, attendees will learn more about the benefits of selecting NVMe enabled products like Intel SSDs and Toshiba SSDs. The webcast explores the client benefits that have surfaced with the different iterations of the NVMe specifications from NVMe 1.2 to NVMe 1.3 to the upcoming NVMe 1.4. Attendees will receive an in-depth overview of critical NVMe features including easier management of power/thermals, NVMe’s enablement in small form factors like M.2 and BGA, boot partitions and host controlled thermal management and namespace write protection.

    About the Presenters

    Cameron Brett is Director of Marketing, SSD and Storage Solutions, Toshiba Memory America, Inc. and a member of the NVMe Marketing Workgroup.

    Jonmichael Hands is a Product Marketing Manager at Intel and the NVMe Marketing Workgroup Co-Chair.
  • How to Easily Migrate Data Without Downtime
    How to Easily Migrate Data Without Downtime
    Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore Software Dec 12 2018 6:00 pm UTC 60 mins
    Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?

    Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?

    Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.

    If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
    • How to integrate software-defined storage into your environment
    • How to migrate data between totally different types of storage
    • How to change towards hyperconverged during regular business operations
  • Transform Learning with Powerful, Scalable Desktops in Azure
    Transform Learning with Powerful, Scalable Desktops in Azure
    Carl Sweetland, Account Executive - Microsoft & Mirela Cunjalo, Dir. Product Mgmt. - Teradici Dec 13 2018 6:00 pm UTC 60 mins
    Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
    In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
    We’ll cover:
    •The unique benefits of hosting desktops and applications on Azure
    •A reference architecture for the education use case
    •The security and performance benefits PCoIP technology provides
    •Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
    Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
    Q&A will follow.
    Register today!
  • Challenges of the Software Defined DATA Center of the Future
    Challenges of the Software Defined DATA Center of the Future
    Don Molaro, CTA at WWT & industry expert, Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera Dec 13 2018 6:00 pm UTC 45 mins
    If you are like many out there, the DATA is at the center of what your organization does and it’s getting in the way of achieving a Software Defined DATA Center that is simple, automated and fast. Hear about the challenges enterprises like yours are encountering and evaluate the options available to architect a new approach that can:

    - Automate data storage end-to-end using new capabilities like machine learning
    - Harness the latest tech like NVMe to drive performance @ scale
    - Consolidate data storage and operations
    - Pave the way to adopt new container orchestration technologies like Kubernetes

    Don Molaro, Chief Technical Advisor at World Wide Technology joins Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera, to share their experience and advice. Learn the key requirements and technology options available to architect your future data operations, rightsize your budget and transition to a software-driven world.
  • Design your hybrid cloud for the end user - or fail
    Design your hybrid cloud for the end user - or fail
    Cameron Wyatt and Ian Tewksbury, Red Hat Dec 13 2018 7:00 pm UTC 52 mins
    The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.

    In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.

    We'll cover:
    - How to build your cloud incrementally to accommodate future fixes and enhancements.
    - Why you need to consider your existing policies and procedures when defining your new cloud experience.
    - How to iteratively design and implement a successful hybrid cloud experience.

    Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
    Ian Tewksbury, Consulting Architect, Red Hat Consulting, Red Hat
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Dec 14 2018 9:00 am UTC 30 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Marcelo Arantes Dec 14 2018 12:00 pm UTC 60 mins
    A SUSE Fornece uma infraestrutura ágil e simples de gerenciar, com maior velocidade de entrega, durabilidade e confiabilidade. Acelere a inovação e reduza os custos, transformando sua infraestrutura corporativa de armazenamento com uma solução inteligente de armazenamento definido por software, verdadeiramente aberta e unificada.
  • Consumption Based Data Management Providing Peace of Mind
    Consumption Based Data Management Providing Peace of Mind
    Storage Switzerland, Veeam, HPE Dec 17 2018 6:00 pm UTC 60 mins
    Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.

    A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.

    In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
  • Flexible Service Orchestration for converging Core and Edge Networks
    Flexible Service Orchestration for converging Core and Edge Networks
    Shay Naeh, Cloudify; Petar Torre, Intel, Telco Lead Architect Dec 18 2018 4:00 pm UTC 60 mins
    Diverse environments between CommSP IT, Core and Edge networks require flexible orchestration to implement multiple design principles from Telco over IT to cloud native. Solving orchestration and platform requirements for edge computing is critical from very small sites to much bigger ones. We will explore much better business and service agility for more performance and cost-optimized Intel(R) Architecture platforms.
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework
    IoT Series [Ep.1]: Foundations -- Architecture and Framework
    Johna Till Johnson, CEO & Founder, Nemertes Research Dec 18 2018 4:00 pm UTC 60 mins
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
  • Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Tom Rose, Vice President of Technical Solutions at Nasuni Dec 18 2018 6:00 pm UTC 60 mins
    Two competing trends are helping Hybrid Cloud file storage emerge as a dominant architecture for IT: Globalization and Data Center Consolidation. How does IT manage to power users and applications at the edge in a competitive global environment while consolidating expensive data center resources? Tune in to learn:

    - Why hybrid cloud solutions for applications and users are leading the way in file storage
    - How to leverage hybrid cloud storage to reduce data center footprint
    - How IT leaders are incorporating a cloud first strategy for file storage in 2019
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Dec 19 2018 6:00 pm UTC 60 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Nutanix
  • Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Jim Bugwadia Dec 19 2018 7:00 pm UTC 60 mins
    In this episode of the Enterprise-Wide Kubernetes series, we will show
    how Nirmata makes it easy to integrate your Kubernetes clusters and
    workloads with Vault for enterprise grade secrets management.

    What to expect:
    1. Learn best practices for managing secrets in Kubernetes.
    2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
    3. Discover Nirmata integrations with Vault.
  • Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAlta Dec 19 2018 7:00 pm UTC 51 mins
    TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:

    * Who is TransAlta and why data driven insight is critical for their energy trading system
    * Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
    * How Data Virtualization offers a faster and better data integration over legacy systems