Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.
An intro to AlienVault USM
How to identify prospects quickly with a simple set of questions
How to sell the benefits of USM for easier and faster threat detection
Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:
Common security challenges for the mid-market
Considerations when selecting security vendor partners and ensuring a profitable practice
Operational, financial, and process considerations that are key to a successful MSSP
Essential skills critical to build successful MSSPs
Solutions, business resources, tools, and programs available to enable the success of an MSSP
In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.
In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.
Attend this Webchat and you will also learn:
The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.
Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.
In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:
The five vital technology tools you need to run an effective security practice
A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
No matter what level of modernization you are evaluating, any effort should start with a solid foundation.
A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.
Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
Current threats and how they are evolving
Comprehensive threat protection for the cloud
Unified security for detecting threats and responding to incidents
Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.
In this session you'll learn about key findings from this survey including:
The predominant driver for organizations to consider managed security services
The most critical capabilities organizations look for in MSSPs
The most requested security services offered by MSSPs
Key benefits respondents have achieved by partnering with an MSSP
Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
Software is eating the world. It is the catalyst that is driving disruptive innovation and has led to marketing-ease such as software-defined data centers, software-defined storage, software-defined networks, and software-defined anything.
In this session, we will discuss how IT professionals can successfully add value to the software-defined ecosystem as they continuously integrate and continuously deliver application services that meet and exceed any customer’s expectation.
Join this webinar to discuss:
- What are the key tenets of software-defined constructs?
- How do I apply a foundational set of skills like monitoring as a discipline to guarantee success as a software-defined professional?
In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.
Attendees will learn how each deployment model overcomes these challenge:
1. Ease of initial evaluation and testing
2. How to transition to hyperconvergence while having current servers
3. How to avoid hypervisor lock-in
4. How to build a future proof hyperconverged architecture
SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?
Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.
In this webinar, you will come to understand:
•Implications of security due to SD-WAN-enabled direct Internet access
•Operational and financial benefits of virtualizing the full branch
•How SD-WAN is only one part of your next-generation branch and WAN architecture
The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.
Among topics discussed will be:
- Present and future impact of Software Defined technologies on IT (challenges and opportunities)
- How Software-Defined is enabling the digital transformation
- Best practices and recommendation on adopting software-defined technologies with the future in mind.
This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
As more and more systems become hyper-converged, it can be hard to know where to start looking when something goes wrong. In this troubleshooting deep-dive our VMware Support engineers discussed a common approach for vSAN, potential missteps and pitfalls, and provide tips on how to approach various errors and outages you may see while using vSAN. Questions on capacity, performance, and what to do if you encounter issues are were asked during the live Q&A.
HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View
As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.
And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.
During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.
“When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
Software-defined storage is quickly becoming mainstream and not having to deal with all of the headaches of storage management can be a wonderful thing.
Placing your tier 1 database workloads onto software-defined storage is possible, but it needs to be done correctly. Tier 1 database workloads are typically the most I/O intensive systems in an environment. Consequently, there are additional considerations that need to be taken into account in order to ensure performance and redundancy for these critical workloads. It doesn’t matter if your workload is SQL Server or Oracle, or if you are running Hyper-V or VMware, the concepts are the same.
In this session, we will walk through SDS, and cover topics including: sizing your workload, validating performance characteristics, and following recommended best practices for placing your most important applications on SDS.
Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft.
So how do you improve your company’s security? How should you prioritize? How can you integrate all the tools? How many security staff will you need? How do you integrate a SOC and a NOC?
Managed Detection and Response (MDR) provides the answer to all these questions. With a focus on quick detection and response to threats, the service combines the right tools, people and processes to help you quickly implement the best security within your budget.
Ready for a good night’s rest? Join this webinar to discover how MDR can help!
The term “Software-Defined" sounds like marketing hype but this technology is behind much of current IT systems’ advanced features and functionality - really. And, it didn’t start with software-defined storage. In this webinar Evaluator Group Sr. Analyst, Eric Slack, explains where software-defined came from, how it’s shaping IT infrastructure and what you can expect from this technology.
Consolidating multiple mixed data center application workloads on a Software-Defined Storage (SDS) platform can sometimes feel like rocket science. To confidently consolidate these workloads, including those deemed mission-critical, you need a platform that delivers predictable and low latency performance where and when it counts.
Join Intel and Pivot3 as we share five ways to transform SDS into a workhorse for your traditional data center applications. We’ll discuss the impact on applications and operations, as well as ways to manage your SDS with ease, including hyper-converged, NVMe and Quality of Service (QoS). No PhD in storage performance required!
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.
- What core security capabilities you need to demonstrate compliance
- The top challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.
With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.
These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.
As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
Since the launch of Windows Server 2016, Microsoft has transformed the software-defined data center landscape with Storage Spaces Direct and SMB3 RDMA networking for optimal hyper-converged infrastructure deployments.
Storage Spaces Direct enables building highly available and scalable storage using servers with local storage. It simplifies the management of software-defined storage systems and allows the use of new storage devices such as SATA SSDs and NVMe disk drives. Storage Spaces Direct takes advantage of SMB3 RDMA networking technology for high-speed, low latency, CPU efficient storage.
Strategic Online Systems (SOS) is a Managed Service Provider that chose a DataON and Windows software-defined solution to replace an aging SAN for one of their non-profit customers.
The webcast will explore the following topics:
•How Storage Spaces Direct enables service providers and enterprises to use industry-standard servers with local storage to build highly available and scalable software-defined storage.
•How Mellanox 10/40/100GbE solutions for Window Server 2016 provide end-to-end support for RoCE, delivering high bandwidth and low latency networking via SMB3 RDMA.
•Best practices on how to deploy Storage Spaces Direct with a Mellanox SMB RDMA network, with real-world examples from SOS.
•DataON’s latest WSSD-certified platforms for Windows Server 2016.
Howard Lo, VP of Sales and Marketing, DataON
Steven Ekren, Senior Program Manager Windows Server, Microsoft
Motti Beck, Sr. Director, Enterprise Market Development, Mellanox Technologies
Benjamin Clements, President, Strategic Online Systems
More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.
In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
During this session a VMware Cloud Specialist Engineer will show you how to install and configure vRealize Operations (vROps) to quickly make it functional within your environment. We will begin with a brief review of the vRealize Operations Architecture and its different server configuration options.
This session will also cover:
-Sizing considerations and guidelines for pre-installation planning
-Installation wizard walk through including setup options and their effect on the environment
-Connection options of vROps to a vCenter(s) and the process of discovering and collecting data
-Steps to verify the system is collecting data once installation is complete
To wrap things up we will review the user environment and how to start using vROps to proactively manage your environment.
VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.
In this webcast, VMware subject matter experts will explore the key components available in the new vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future. We’ll discuss:
· What’s new in vSphere 6.5 and what’s coming up
· Best practices for upgrading to vSphere 6.5
· How vSphere 6.5 is your gateway to modernizing your infrastructure so you can take advantage of VMware’s suite of products for the SDDC, including vSAN.
In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.
Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?
Attend this webinar to learn about:
1) Top 5 IoT Security Challenges
2) Disconnect between Operations and Information Technology
3) Cyber security best practices that includes IoT security
You are the shield that guards your realm. Don’t let IoT penetrate your wall.
Napjainkban egyre több alkalmazást fejlesztenek, illetve futtatnak konténerizált környezetben és ezért az informatikusok számára egyre nagyobb kihívást jelent a konténer alapú infrastruktúrák felügyelet. A SUSE Manager a nyílt forráskódú világ leghatékonyabb felügyeleti megoldása. Vegyen Ön is részt webinárunkon, melyen megismerkedhet a legújabb 3.1-es SUSE Manager újdonságaival és azokkal a szolgáltatásaival, amelyek ideálissá teszik konténerek felügyeletére is!
Even with the advent of cloud and containers, virtualization will continue to be key to the efficient data center. But is your virtualization technology able to handle today’s demands for hybrid, modern applications?
Red Hat® Virtualization provides the performance, security, and scale required for virtualized workloads that pave the way for streamlined operations, increased productivity, and ultimately more modern applications. Learn about approaches for consolidating, upgrading, or migrating virtualization resources and unifying and automating management of heterogeneous environments.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.
When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!
This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:
•What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
•What are the main architectural differences between NVMe and SCSI deployments
•Impact on Queue Depth
•How to cross-connect legacy and future flash arrays with FC-NVMe
Please join us on August 29th for this advanced, deep dive on FC-NVMe.
We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.
Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!
In this technical, hands-on webinar we will cover the following topics:
-Overview of vRealize Automation setup and configuration
-Identifying and catering to your end users
-Blueprint design (Machine Lifecycle Whiteboard session)
-Overview of vRealize Automation extensibility
-Tying it all together
One of the dreams of development is to build a software package once - and deploy it anywhere. With current open source projects, this dream is even closer than ever. Join Nell Shamrell-Harrington, Senior Software Development Engineer at Chef as she discusses how to create software packages that run (almost) anywhere with Habitat. You'll see how the same application can be run on bare metal, on a virtual machine, or in a container - with everything needed to automate that application already built into the package itself. Also learn how to build and deploy these packages with the intelligence to self-organize into topologies, without needing a central orchestrator. See how the dream of platform-agnostic and self-organizing packages is fulfilled today, and how it will evolve in the future.
AI is changing everything — and you know you have to get on the bandwagon. But you may not be as clear about the differences between chatbots and intelligent assistants. What do customers actually expect from one or the other? And are they a passing customer engagement fad, or does this trend have legs?
Our latest interactive VB Live event brings together a panel of developers who have long-term, hands-on experience in chatbot and intelligent assistant tools. They’ll discuss everything from the platforms they use, the metrics they keep tabs on, the data they collect, and all the other wisdom they’ve gathered on the ground, deep in chatbot and AI territory.
Register now to find out which solution fits your own digital customer engagement plan, how to plan a strategy, and how to get in on the game now.
In this webinar, you'll:
Understand the messaging platforms of the future
Learn which platforms people are using — and why
Measure the success of your chatbot through best-practice KPIs
Create personalized interaction between your organization and your customers
* Amir Shevat, Director of Developer Relations, Slack
* Darrius Jones, AVP, USAA Lab
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Incident response has become increasingly complicated. According to a recent report, 67% of security professionals believe that incident response is more difficult today than it was two years ago. This is due to the numbers of IT activities and security alerts, and the need for advanced IR skills.
This webinar will explore a new and unexpected boost to incident response, coming from the integration of threat hunting methodologies.
Israel Barak, Cybereason CISO and an Incident Response expert, will chat with Lital Asher-Dotan, Senior Director of Content, about:
- The latest challenges faced by IR professionals
- Threat hunting and its benefits for IR
- Specific examples in which threat hunting leveled up IR practices
Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.
Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.
In this webinar, you will learn:
- What EDR vendors offer beyond EPP solutions
- Why Endpoint Detection and Response alone is not enough
- How Managed Detection and Response (MDR) makes up for EDR shortcomings
In the wake of global ransomware attacks targeted mainly at Windows desktop and laptop devices, this webinar will discuss an often-overlooked threat: the mobilization of malware and ransomware. Whether through malign apps, poorly written code, corrupt e-mail profiles or disreputable websites, there are a range of avenues of attack open to hackers who might choose to target smart devices.
To date, attacks on mobile devices have been mostly on a small scale, targeting individual user devices and data. But is a big attack waiting in the long grass? Will the next WannaCry or Petya target mobiles, and how can you protect yourself?
vSAN continues to drive the rapid growth of hyper-converged infrastructure (HCI), adopted by more than 8,000 customers. One of the most popular HCI consumption models is the vSAN ReadyNode – pre-configured, tested and certified x86 servers designed for optimal HCI performance. Today, we have more than 300 pre-configured ReadyNodes listed in our vSAN Compatibility Guide, which includes certified CPUs, memory, network, I/O controllers and storage options available from our OEM partners across the globe.
While pre-configured vSAN ReadyNodes ensure excellent HCI performance, some users need the flexibility to use another capacity tier device or a different processor in their ReadyNode. In this webcast, we will explore what you can and can’t change in a pre-configured ReadyNode. We’ll also talk about Day 0 availability for ReadyNodes with the new Intel Purley server platform, and discuss:
The high level certification process conducted by our vSAN ReadyLabs
vSAN Hardware Market Segmentation
Guidelines on building your own ReadyNode with certified components
Brief review of vSAN Hardware Guidance