Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Thomas Grätz, Sales Engineer, SUSE Linux GmbH, Michael Hojnacki, Geschäftsführer, ProtoSoft AGRecorded: Mar 22 201953 mins
Mit der digitalen Transformation setzt sich das Datenwachstum ungebremst fort. Softwarebasierte-Storage-Lösungen sind die optimale Antwort auf steigende Datenmengen und wachsende Anforderungen an Datenspeicher. Günstiger und skalierbarer als konventionelle Lösungen werden sie hohen Ansprüchen an Verfügbarkeit und Performance gerecht. SUSE Enterprise Storage bietet eine offene Technologie auf Ceph-Basis, die selbstverwaltenden Speicher, praktisch unbegrenzte Skalierbarkeit und höchste Verfügbarkeit kombiniert.
Als langjähriger SUSE-Partner hat ProtoSoft gemeinsam mit SUSE ein schlüsselfertiges Komplettsystem bestehend aus Soft- und Hardware für den Einsatz vor Ort oder im Rechenzentrum konzipiert. ProtoSoft Enterprise Storage ist ein vorkonfiguriertes System inklusive aller nötigen SUSE-Subskriptionen, 12 Monaten Priority Support sowie Vor-Ort-Installation, das für alle Storage-Aufgaben im Unternehmen oder im Data Center gerüstet ist. Im Webinar geben wir Ihnen Einblick in die neuesten Benchmark-Tests. Melden Sie sich jetzt an!
Agenda im Überblick
•SUSE + Protosoft: eine erfolgreiche Partnerschaft
•Warum Software Defined Storage?
•Vorstellung der Hardware- und Software-Konfiguration
•Benchmarks der Konfigurationen
•Neuerungen in SUSE Enterprise Storage 5.5 und Ausblick auf SUSE Enterprise Storage 6
Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of CarmelRecorded: Mar 21 201957 mins
Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.
Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.
The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.
Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.
In this webcast you will discover how City of Carmel:
• Has experienced 100% uptime for nearly 10 years
• Extended their storage life expectancy by 80% and saved $75k
• Replaced every storage component without doing a forklift and replace
Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product ManagerRecorded: Mar 20 201945 mins
Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.
Join us live Wednesday, March 20 @10AM PST to learn
* Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
* How to set triggers based on thresholds important to your business
* Set feature flags to control specific parts of your environment to reduce stress levels.
See a Honeycomb demo, ask questions and learn more.
John Grim, David KennedyRecorded: Mar 20 201985 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.
•The time it takes to discover a breach after the first action
•5 insider threat types identified by our caseload
•Top 3 insider threat motivations
•Top industries suffering sensitive data breaches
Our Verizon Threat Research Advisory Center presenters will be:
•John Grim, Senior Manager, Investigative Response - America
•Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
•David Kennedy, Managing Principal, Open Source Intelligence
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Mar 19 201942 mins
A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).
In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:
- Business drivers for a SIEM
- What is/is-not included in a SIEM
- SIEM deployment options
- Outsourcing considerations – MSSP vs MDR
Storage Switzerland, ActifioRecorded: Mar 19 201956 mins
Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for shorter recovery times and new threats like ransomware. The cost for IT to design, implement, maintain and upgrade these infrastructures can consume a big part of the IT budget. Additionally, the time required for each of these steps is something that most IT teams simply don’t have.
As a result, many organizations are looking for ways to move to an infrastructure-less architecture where most of the physical hardware is in the cloud as well as the software intelligence. The goal is to move data protection from a very unpredictable CAPEX cost to a normalized OPEX cost. There are an increasing number of cloud solutions that claim an infrastructure-less solution but many of these solutions force the organization to give up many of the capabilities they’ve come to count on or force them into long-term cloud relationships.
Attendees to the webinar will learn the challenges of maintaining an on-premises infrastructure, why current cloud solutions fall short and what IT really needs from an infrastructure-less solution.
Kirit Basu - VP of Product - StreamSetsRecorded: Mar 19 201944 mins
According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.
We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.
During this webinar, we will discuss:
-Pitfalls to avoid for any hybrid-cloud project
-Key requirements to ensure continuous movement of data across any cloud
-How StreamSets customers are using the platform to drive real value from DataOps
Jason Schmitt is CEO at Aporeto, a firm focused on new approaches to securing applications in the cloud. In this video from RSA 2019, Jason speaks with Charlene O’Hanlon about the security pitfalls around moving applications to the cloud, and why network infrastructure’s own baked-in security isn’t enough.
Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, NasuniRecorded: Mar 19 201935 mins
Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.
With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:
- How the business strategy drove TBWA to the cloud
- What key decisions enabled them to reduce costs and meet capacity requirements at the same time
- How they went about a worldwide roll-out of their cloud storage strategy
- Why multi-cloud capability is important
Paul Nicholson, Sr. Director of Product Marketing, and Yasir Liaqatullah, VP of Product Management at A10 NetworksRecorded: Mar 19 201956 mins
Most mobile operators are moving ahead with their 5G plans, some tentatively and others aggressively. Those who don’t act, face the very real prospect of being left behind in the greatest technology transformation in decades.
To Modernize your 4G/LTE networks for 5G, we will outline four strategic investments that mobile operators should consider today while delving into the myths and realities around them. These four areas are:
•Upgrading network management
•Consolidating network functions
•Boosting security at key protection points
•Virtualizing network functions
In the security portion of this webinar, we also spotlight key concerns where modern Gi/SGi firewalls and advanced machine learning powered DDoS protection are essential. By carefully investing in upgrades to support specific 5G use cases, network operators can monetize their near-term investments and at the same time modernize the existing infrastructure in preparation for the eventual migration to a full 5G architecture.
Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²Recorded: Mar 19 201955 mins
Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.
Join us for this webinar to learn more about how you can:
•Ensure that the Application traffic regardless of port spoofing gets to the right tool
•Improve tool efficiency by discarding irrelevant Application traffic
•Filter the traffic based on the application rather than the IP & Port
Lars Marowsky-Brée, Architect; Vincent Moutoussamy, Beta Program Manager & Holger Sickenburg, Technical Project Manager, SUSERecorded: Mar 18 201953 mins
This webinar will give you an opportunity to hear about the Beta testing program for the next release of SUSE Enterprise Storage 6. We will give an overview of the SES 6 release schedule, an overview of key features, and a demo installation.
Mike Waas | Datometry, Inc., Daniel Yu | Microsoft Corp., Deepak Patel | Datometry, Inc.Recorded: Mar 14 201947 mins
Enterprises now have an easier way to take their existing Teradata applications to Azure SQL DW. Azure SQL DW has the scale and elasticity required to match the demands of enterprise workloads. Datometry software suite enables Teradata applications to run natively on Azure SQL without changing SQL or Business logic.
The webinar will detail key insights from experts who have successfully implemented the six step replatforming plan from Datometry.
Julian Ereth - Research Analyst - Eckerson Group | Arvind Prabhakar - Co-Founder & CTO - StreamSetsRecorded: Mar 14 201959 mins
DataOps borrows concepts from agile development to streamline the process of building, deploying and operating dataflow pipelines at scale. Putting DataOps into action requires not only the right technology, but more broadly a thoughtful approach to align the people and the process behind such an initiative.
Eckerson Group research analyst Julian Ereth join StreamSets' Co-Founder and CTO, Arvind Prabhakar to explore the emerging trend of DataOps.
During this webinar, we will discuss:
-Principles and benefits of DataOps
-Common DataOps use cases
-Practical guidelines for putting DataOps into action
-How StreamSets can help on a DataOps journey
Storage Switzerland, Cloudian, VeeamRecorded: Mar 14 201948 mins
Backup software is continuously improving. Solutions like Veeam Backup and Replication deliver instant recoveries, enabling virtual machine volumes to instantiate directly on the backup device, without having to wait for data to transfer back to primary storage. These solutions can also move older backups to higher capacity, lower cost object storage or cloud storage systems. To deliver meaningful performance during instant recovery without exceeding the backup storage budget requires IT to re-think its backup storage architecture.
Modern backup processes need high performance, low capacity systems to deliver high-performance instant recovery, as well as high-capacity, modest performance systems to store backup data long term and software to manage data placement for the most appropriate recovery performance while not breaking the budget.
Paul Nashawaty - Product & Solution Marketing at HYCU | Mayank Gupta - Product Marketing at NutanixRecorded: Mar 14 201946 mins
Hyper converged infrastructure (HCI) has completely disrupted the enterprise datacenter by breaking down silos to make management of the entire storage, network and compute stack simple and flexible. A data protection solution purpose built and integrated with HCI will make data protection management easy enough for any generalist to handle yet powerful enough for even the most extreme recovery requirements.
Join us for this webinar to hear how a customer has implemented Nutanix AOS and Hycu data protection for an integrated and protected HCI solution.
• Simplified data protection for AHV & ESX
• Optimal protection leveraging Change File Tracking (CFT) for Nutanix Files
• Eliminate IT silos
Danielle Russell, Group Product Marketing Manager, AlienVault; Amy Pace, Principal Product Marketing Manager, AlienVaultRecorded: Mar 14 201951 mins
Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.
Join this webcast and demo of the AlienVault Unified Security Management (USM) platform to learn how solutions from AlienVault, an AT&T Company, can help you to:
- Determine your current security posture and make a prioritized plan for improvement
- Centralize security monitoring across multi-cloud and on-premises environments
- Automate threat detection and incident response activities for improved efficiency
- Consolidate your regulatory compliance requirements to help accelerate audit readiness
- Maintain continuous security monitoring all year long
Register today to reserve your seat. Here's to a secure 2019!
Enrico Signoretti Analyst, GigaOm Research Manish Chacko Sr. Product Manager, DataCoreRecorded: Mar 13 201961 mins
Hyperconvergence is now adopted by an ever-growing number of enterprises because of its simplicity, but others don’t like it because of its lack of efficiency, or because they do not find it flexible enough to answer to all of their workload needs.
Yet, it is not always possible to get everything you want. However, technology and products are quickly maturing, and now enterprises can ask for much more.
Attend this free GigaOm webinar featuring experts in enterprise data storage and IT infrastructure, including GigaOm Analyst, Enrico Signoretti and DataCore’s Sr. Product Manager, Manish Chacko, discussing innovative solutions for infrastructure strategies.
Attendees will learn innovative infrastructure strategies and explore solutions from both technical and business perspectives, including:
The good, the bad and the ugly of hyper-convergence
- Trade-offs of hyper-convergence
- Evolution of hyper-convergence and benefits for the end users
- New options that allow a smoother migration path to hyper-convergence
- The next major features to expect from an HCI platform
Join GigaOm and DataCore for this free expert webinar!
Scott Sinclair, Sr. Analyst - Enterprise Strategy Group & Alfons Michel, Sr. Product Marketing Manager - DataCore SoftwareRecorded: Mar 13 201960 mins
Data is a strategic weapon of any institution or business. But, if you’re not leveraging it, then it can be a massive competitive disadvantage in the industry!
So how can you, and your IT organization, gain this advantage? A transformation must occur.
Maximizing IT infrastructure flexibility is paramount to keep pace in this newly formed digital age. But typically, any major change in your IT infrastructure, besides costs, requires risky, time consuming and disruptive data migrations. So how to overcome this obstacle?
Join our brief webinar and Q&A at the end to hear more about the background, drivers and enablers to achieve IT modernization and flexibility without the pain of migrations. In other words: to disrupt without disruption. Experts from ESG and DataCore will jointly look at the challenges associated with the need of IT modernization and how it can be accomplished – within budget and without any disruption for your operations.
Learn more about the hold-backs and how to overcome them, because there is nothing more constant than change. Join us to discover:
• The need for change and transformations in IT
• Seamless introduction of new technologies
• Seamless migration options (e.g. to hyperconvergence)
Gail Orenstein is an award winning photojournalist & drone journalist covering humanitarian areas and conflict zones. She is an FAA and CAA licensed commercial UAV pilot and has droned in 21 countries. She is a speaker and educator and a champion of women's issues.
Her work is globally recognised and can be seen on CNN, BBC, Time, Aljazeera and The times of London. Join Gail in this live webinar as she discusses:
- Taking her career from photojournalism to drone journalism and being one of the first females to do so
- The hero of "fake news" and how drone journalism can save news
- Why a female perspective is critically needed in the drone industry
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksRecorded: Mar 12 201940 mins
Managing sensitive financial information and combatting cyberthreats often means finding efficiencies to do more with less. Modestly staffed IT teams often find themselves overwhelmed and challenged to complete projects that benefit the top line while also improving their cybersecurity maturity and meeting compliance obligations.
With such a wide breadth of responsibility, how can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing or building an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.
Concerns we will address:
1. Doing more with less: how to free up resources to accelerate projects affecting the top/bottom lines.
2. How is SOC-as-a-service different than conventional managed security service provider offerings.
3. Obtaining visibility across on-premises and cloud (SaaS and IaaS) environments
Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech MediaRecorded: Mar 12 201955 mins
Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.
What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.
Join Gigamon and ActualTech Media in this webinar and learn how to:
•Discover applications that you didn’t even know were running on your network
•Increase overall performance of your network and shared components
•Spot potential security vulnerabilities before they become a problem
Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
Edge Computing, often referred to as Distributed Cloud, is becoming a requirement for a set of new application use cases revolving around IoT, AI/ML and other new technologies requiring ultra low latency, data thinning to reduce bandwidth costs, autonomy, and privacy. These drivers mean that data center operators need to rethink their networking infrastructure as they plan for and deploy edge compute which will result in an explosion of mini- and micro-data centers. New approaches leveraging open networking, next generation SDN fabrics and network automation are required to simplify, manage and troubleshoot their increasingly distributed network infrastructures.
Join Storage Switzerland's Lead Analyst, George Crump and Pluribus Network's Mike Capuano for our on demand Lightboard webinar, "Using Next Generation Network Fabric for Your Distributed Cloud."
Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.
SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices
In this webinar we’ll explore:
* The synergies and differences between SREs and testers
* How testers can work with SREs and development teams to balance the needs of velocity and quality
* Tools to help integrate SRE into Continuous Testing and Continuous Delivery
Kelvin Murray, Threat Expert, WebrootMar 26 201911:00 amUTC60 mins
With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.
Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.
Join Webroot’s Threat expert as he discusses topics such as:
•The rise of information stealers
•The changing face of ransomware
•Relentless phishing attacks
•The theft, trade and cracking of passwords
Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)²Mar 26 20191:00 pmUTC60 mins
If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.
The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.
Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:
- Eradicate benign alert noise, focus on what’s important.
- Optimise threat hunting time with curated and focused story lines.
- Maximise staff efficiency and let staff become expert threat hunters.
Zahid Ghadialy, Sr. Dir., Strategic Mktg and 3G/4G Blogger and Babak Jafarian, Dir, Strategic Business CommunicationsMar 26 20193:00 pmUTC60 mins
The telecoms industry is capital intensive, so every dollar and every cent spent on new infrastructure needs to be accounted for. The biggest expense for mobile operators has always been the RAN, accounting for around 60 % of CAPEX (and 65 % of OPEX). Older (2G, 3G) technologies are becoming more expensive to maintain alongside with 4G and soon 5G. The Open Compute model of the data center has the potential to help operators to move away from proprietary hardware to a virtualized network architecture. Some of TIP’s (Telecom Infrastructure Project) initiatives by Facebook) highest-profile activities are aimed specifically at the RAN, where the proprietary nature of several interfaces has stopped operators from using more than one vendor. The software-based approach for older Gs is unheard of where by virtue of the original design, it’s impossible to reconfigure legacy 2G and 3G networks to support newer communications standards such as 4G, and eventually 5G. In this webinar learn how Parallel Wireless Open RAN technology, designed on x86 across baseband processing platform, radio hardware, and radio and core software, simplifies MNOs business models to support ALL current, present, and future Gs for a better service to the end users at much lower cost. We will present recent case studies from TIP Summit from operators like Telefonica, MTN and Vodafone. www.parallelwireless.com
Storage Switzerland, CarboniteMar 26 20195:00 pmUTC60 mins
The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.
Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.
In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.
Join us for this live event to learn:
1. Why switch to the cloud for enterprise backup?
2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
3. Why and where most solutions miss the mark
4. How Carbonite Server delivers the five critical capabilities
When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.
Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
Santosh Choudhary, AWS, and Michael Bukva, SUSEMar 27 20193:30 amUTC60 mins
In this session you will get an overview of how systems management, live patching and other high availability features provided by SUSE and AWS can help you maximise the uptime of your SAP HANA systems. We will demonstrate Live Patching of the kernel of a SUSE system running SAP HANA in AWS , driven by AWS Systems Manager, and the use of the CVE audit capability of SUSE Manager to identify the patches required to mitigate a serious vulnerability.
Storage Switzerland, HubStor, Osterman ResearchMar 27 20195:00 pmUTC60 mins
(and live to tell about it)
Organizations are moving to the cloud but according to a recent Osterman Research study, only 14% of companies have completed that transformation. The study clearly identifies data storage as an area where IT can easily accelerate their cloud transformation journey. Potentially more so than any other component, intelligently moving data to the cloud has the opportunity to significantly lower on-premises storage costs without the threat of impacting day to day operations.
Join Storage Switzerland, HubStor and Osterman Research for our live webinar where we’ll discuss the results of the Osterman Research study, what it means for IT, and how IT can take advantage of that research to leverage the cloud to alleviate data management and data protection concerns.
All pre-registrants will receive our exclusive eBook, “Understanding the Difference Between Data Protection and Data Management.” Sign up now and get your copy today.
Paul Moxon, VP Data Architectures & Chief Evangelist, DenodoMar 28 201911:00 amUTC60 mins
Advanced data science techniques, such as machine learning, have proven to be extremely useful tools to derive valuable insights from existing data. However, they put the pressure on the data scientists to look for the right data and massage it into usable formats – a process that ends up consuming most of their time.
In this webinar, we want to discuss the use of data virtualization to obtain the information needed in a more efficient and agile manner, show you the value added by this technology via a predictive analytics demonstration, and finally present a customer success story of this use case.
Join the webinar to find out:
•How does data virtualization help data scientists accelerate data acquisition and preparation?
•How does the Denodo Platform for data virtualization integrate with popular tools from the data science ecosystem, like Spark, Python, Zeppelin, Jupyter, etc.?
•How can you use the Denodo Platform to deal with large volumes of data more efficiently?
•How is McCormick, a food flavoring giant, using data virtualization to season its machine learning and blockchain landscape?
Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr.Mar 28 20194:00 pmUTC51 mins
Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.
With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.
For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:
•Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
•Windows 10 application incompatibilities
•Mobile security risks with running Exchange on-prem
•Network latency from running O365 in the cloud
•Managing multiple file hosting services including OneDrive
Sean Anderson - Director of Product Marketing - StreamSets | Dash Desai - Technology Evangelist - StreamSetsMar 28 20195:00 pmUTC51 mins
Cloud Data Warehouses are on the rise. As companies aim to make analytics pervasive across their organization, cloud data warehouses and data marts became a logical solution for delivering a familiar analytics experience but without the constraints of managing large DW infrastructure. Cloud Data Warehouses help reduce management and infrastructure costs, offload maintenance and uptime responsibilities, and allow users to simply load data and run queries instead of managing databases.
However, migrating and streaming data to these new cloud managed services remains a freshman effort with many tools offering only simple ingestion functionality and limited data destinations. StreamSets has built an advanced integration with popular cloud Sw solutions like Snowflake, one of the world’s most popular cloud data warehouses. This level of integration provides fast synchronous and asynchronous ingest, multi-table uploads, and data drift compensation. StreamSets Control Hub helps users then manage a variety of pipelines, on-premise; across public clouds and cloud services.
In this webinar you will...
-Take a look at common usage patterns for Cloud Data Warehousing.
-Understand the core functionality of the Snowflake connector.
-Get information on the installation and operation of the new tool.
Brad Bierman, Manager of Security Operations - Arctic Wolf NetworksMar 28 20195:30 pmUTC22 mins
It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.
Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.
1.What tools do you need to have in place to detect a data breach?
2.Who do you need to engage to respond to a data breach?
3.How do you respond appropriately to data breach?
To learn more, join this webinar!
About our key speaker:
Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
Jim Bugwadia and Ritesh PatelMar 28 20196:00 pmUTC60 mins
All major cloud providers have embraced Kubernetes. Using a cloud provider managed Kubernetes services is an easy way to get started with Kubernetes, as the cluster’s control plane installation and management are taken care of by the provider. There are several similarities in these offerings, but there also are some interesting differences.
In this webinar, we will compare the managed Kubernetes services from the top 3 cloud providers, discuss when to use managed Kubernetes services, and what else is necessary for enterprise-wide Kubernetes use cases.
Jim Bugwadia, CEO at Nirmata
Ritesh Patel, VP of Products at Nirmata
(ISC)² Membership TeamApr 2 201912:00 pmUTC60 mins
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Sheryl Kingstone - VP of Customer Experience & Commerce - 451 Research | Sean Anderson - Dir. of Product Marketing - StreamSeApr 2 20195:00 pmUTC57 mins
Every organization wants to know more about its customers. More data can lead to a more comprehensive Customer 360 view—but only if all that data can be captured, managed, and kept safe from unauthorized use.
Companies today are forced to piece together partial views of customer behavior, managing to the limitations of their systems and not to their analytic goals. When data lives in silos it can create gaps in analytic outputs and poor visibility for business intelligence. StreamSets built a DataOps platform to help manage complex data flows into analytics environments with pre-built connections for popular customer data systems. Join 451’s research director Sheryl Kingstone to discuss how DataOps is fueling digital transformation.
In this webinar you will learn...
-How to build Customer 360 in a scalable way to capture customer data—across all an enterprise’s systems, securely and in real-time.
-How to deliver a unified, complete picture of the organization’s interactions with its customers.
-Challenges that make it difficult to adequately protect customer data, including personally identifiable information (PII).
Toby Owen, CTO and Don Barlow, COOApr 3 20193:00 pmUTC60 mins
The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.
This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.
During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:
Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.
Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.
Critical Availability Services: Offering the BEST availability guarantee in the industry.
Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
Storage Switzerland and StorONEApr 3 20193:00 pmUTC60 mins
Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.
Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.
In this webinar learn:
- The problems with a fragmented approach to storage
- Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
- Why consolidating to a single storage system won’t work
- Why hyperconverged architectures fall short
- Why Software Defined Storage falls short
- Why the organization needs a Storage Hypervisor
Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman ResearchApr 3 20195:00 pmUTC60 mins
The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.
Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud
We will cover the following:
•Major concerns and issues with SaaS adoption
•What to look for in a CASB solution
•Overview of SonicWall Cloud App Security
Ramnath D Shenai - VM Ware, Sam Rastogi - Palo Alto Networks, Goker Ozturk - IntelApr 4 20193:00 pmUTC60 mins
Enterprises are deploying SD-WAN, at an increasingly faster pace, as an important first step towards building optimized environments that are ready for multi-cloud world. As a platform, SD-WAN is a solid first step in deploying edge security applications and services with additional security functions like next-generation firewall (NGFW), intrusion prevention, SSL inspection, web filtering, DNS security, and malware analysis needed as well. In this webinar, we will discuss how VMware SD-WAN by Velocloud lays the foundation for SD-WAN and how Palo Alto Networks VM-Series and GlobalProtect security products complement and strengthen overall security to help organizations prevent successful cyberattacks. We will also discuss how Intel architecture, network and security specific hardware and software technologies help these workloads operate in a consistent, saleable and high performance way.
Clarke Patterson - Head of Product MarketingApr 4 20195:00 pmUTC58 mins
Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.
In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:
-How to design any-to-any batch and streaming pipelines into and out of Kafka.
-How to monitor end-to-end dataflows through Kafka.
-How to operate continuous data movement with agility as data sources and architecture evolve.
Brian Talbert, Alaska Airlines and Chase Cunningham, ForresterApr 4 20197:00 pmUTC60 mins
Zero Trust is a major initiative for many security teams globally. But how do you get started? What pitfalls should be avoided?
Forrester has published a lot on Zero Trust. In this webinar, Forrester Zero Trust analyst Chase Cunningham interview Brian Talbert from Alaska Airlines to chronicle their lessons and best practices in implementing Zero Trust as they moved to a cloud-based architecture. We’ll discuss implementing Zero Trust in the cloud where many of your old security tools don’t work and dive deep into:
-Products and technologies
Miguel Pinto, Senior Product Manager at BitSight, Brandon Dunlap, Moderator, (ISC)² EMEAApr 9 201912:00 pmUTC60 mins
BitSight’s Peer Analytics allows organisations to understand their security programme performance at a more granular level, providing visibility to develop achievable improvement plans, allocate resources appropriately & consistently measure outcomes.
In this session you will learn how to:
• Determine the level of security performance that your company should attain to be ‘best-in-class’
• Profile organisations for communication and benchmarking purposes.
• Understand how specific risk vectors drive security performance.
• Determine the initial conditions for BitSight Forecasting
Ganesh Umapathy, Product Marketing Manager, SonicWallApr 10 20195:00 pmUTC60 mins
Many organizations are adopting cloud platforms such as Office 365 or G Suite. These offer a broad range of productivity tools beyond just email, so email security point solutions alone cannot protect the entire platform from targeted attacks.
Hear from our SonicWall expert to learn:
•The key capabilities needed to protect cloud office platforms
•How SonicWall Cloud App Security can help you protect email, data and user credentials for Office 365, G Suite and other SaaS apps
Primitive Logic President Kevin Moos and Technical Director Steve ErnstApr 10 20195:00 pmUTC39 mins
In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.
Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.
- How to build a secure EA roadmap grounded in your business priorities
- How microservices let you move quickly in keeping up with customer expectations
- How MDM helps you deliver the insights businesses need to make data-driven decisions