Hi [[ session.user.profile.firstName ]]

Virtualization

  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
  • Threat Intelligence: The MSP’s Secret Weapon
    Threat Intelligence: The MSP’s Secret Weapon Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 34 mins
    One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

    In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

    Attend this Webchat and you will also learn:

    The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
    The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
    Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
    and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
  • A Step-By-Step Guide to Building a Profitable Security Practice
    A Step-By-Step Guide to Building a Profitable Security Practice Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 33 mins
    As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.

    Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.

    In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:

    The five vital technology tools you need to run an effective security practice
    A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
    A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
  • The Foundation for Data Center Modernization and Open Source Operations
    The Foundation for Data Center Modernization and Open Source Operations Dan Courcy, Red Hat Enterprise Linux, Andre Pitanga, Service Delivery Manager, Red Hat Recorded: Aug 17 2017 41 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 17 2017 35 mins
    Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.


    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:

    Current threats and how they are evolving
    Comprehensive threat protection for the cloud
    Unified security for detecting threats and responding to incidents
  • Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre
    Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre Garrett Gross Director, Field Enablement Recorded: Aug 17 2017 55 mins
    Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.

    In this session you'll learn about key findings from this survey including:

    The predominant driver for organizations to consider managed security services
    The most critical capabilities organizations look for in MSSPs
    The most requested security services offered by MSSPs
    Key benefits respondents have achieved by partnering with an MSSP

    Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
  • Monitor with Discipline: Software-Defined Professionals
    Monitor with Discipline: Software-Defined Professionals Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Aug 17 2017 26 mins
    Software is eating the world. It is the catalyst that is driving disruptive innovation and has led to marketing-ease such as software-defined data centers, software-defined storage, software-defined networks, and software-defined anything.

    In this session, we will discuss how IT professionals can successfully add value to the software-defined ecosystem as they continuously integrate and continuously deliver application services that meet and exceed any customer’s expectation.

    Join this webinar to discuss:
    - What are the key tenets of software-defined constructs?
    - How do I apply a foundational set of skills like monitoring as a discipline to guarantee success as a software-defined professional?
  • Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software
    Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software Storage Switzerland, Maxta Recorded: Aug 17 2017 62 mins
    In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.

    Attendees will learn how each deployment model overcomes these challenge:

    1. Ease of initial evaluation and testing
    2. How to transition to hyperconvergence while having current servers
    3. How to avoid hypervisor lock-in
    4. How to build a future proof hyperconverged architecture
  • SDN/NFV Interoperability – Challenges & Opportunities
    SDN/NFV Interoperability – Challenges & Opportunities Dimetis - Bruce Katzel, VP of Sales for North America; Glenn Booth, VP of Marketing Recorded: Aug 17 2017 50 mins
    SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
  • Software-Defining More than Just the WAN
    Software-Defining More than Just the WAN Robert McBride, Director of Enterprise and Telco Solutions Recorded: Aug 17 2017 29 mins
    Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?

    Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.

    In this webinar, you will come to understand:

    •Implications of security due to SD-WAN-enabled direct Internet access
    •Operational and financial benefits of virtualizing the full branch
    •How SD-WAN is only one part of your next-generation branch and WAN architecture
  • [Panel] Software-Defined in the Digital Transformation Era
    [Panel] Software-Defined in the Digital Transformation Era Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks Recorded: Aug 17 2017 60 mins
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • Reduce Security Vulnerabilities in Enterprise Applications
    Reduce Security Vulnerabilities in Enterprise Applications Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Aug 17 2017 61 mins
    Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • VMware vSAN Deep-Dive: Capacity, Performance, and Error Troubleshooting
    VMware vSAN Deep-Dive: Capacity, Performance, and Error Troubleshooting Bradley Mott, Manager in VMware Support for vSAN Recorded: Aug 16 2017 76 mins
    As more and more systems become hyper-converged, it can be hard to know where to start looking when something goes wrong. In this troubleshooting deep-dive our VMware Support engineers discussed a common approach for vSAN, potential missteps and pitfalls, and provide tips on how to approach various errors and outages you may see while using vSAN. Questions on capacity, performance, and what to do if you encounter issues are were asked during the live Q&A.
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • How to Leverage Cloud Storage for Hybrid VMware
    How to Leverage Cloud Storage for Hybrid VMware Storage Switzerland, ClearSky Data Recorded: Aug 16 2017 57 mins
    Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
  • Incident Response from the Inside Out
    Incident Response from the Inside Out Sam McLane, Head of Security Engineering, Arctic Wolf Networks Recorded: Aug 15 2017 2 mins
    In this video, we take a deeper dive into the incident response. Discover what a containment strategy is, how evidence is gathered, and is that evidence always the truth.
  • Using Software-Defined Storage for your Applications: A Best Practices Guide
    Using Software-Defined Storage for your Applications: A Best Practices Guide Shawn Meyers, Principal Architect, House of Brick Technologies Recorded: Aug 15 2017 55 mins
    Software-defined storage is quickly becoming mainstream and not having to deal with all of the headaches of storage management can be a wonderful thing.

    Placing your tier 1 database workloads onto software-defined storage is possible, but it needs to be done correctly. Tier 1 database workloads are typically the most I/O intensive systems in an environment. Consequently, there are additional considerations that need to be taken into account in order to ensure performance and redundancy for these critical workloads. It doesn’t matter if your workload is SQL Server or Oracle, or if you are running Hyper-V or VMware, the concepts are the same.

    In this session, we will walk through SDS, and cover topics including: sizing your workload, validating performance characteristics, and following recommended best practices for placing your most important applications on SDS.
  • Secure Your Business: How to Improve Threat Detection & Response
    Secure Your Business: How to Improve Threat Detection & Response Sridhar Karnam, Director, Product Marketing at Arctic Wolf Networks Recorded: Aug 15 2017 39 mins
    Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. 

    So how do you improve your company’s security? How should you prioritize? How can you integrate all the tools? How many security staff will you need? How do you integrate a SOC and a NOC? 

    Managed Detection and Response (MDR) provides the answer to all these questions. With a focus on quick detection and response to threats, the service combines the right tools, people and processes to help you quickly implement the best security within your budget. 

    Ready for a good night’s rest? Join this webinar to discover how MDR can help!
  • What is "Software-Defined" & Why Should You Care? (It’s More than Just SDS)
    What is "Software-Defined" & Why Should You Care? (It’s More than Just SDS) Eric Slack, Sr. Analyst, Evaluator Group Recorded: Aug 15 2017 39 mins
    The term “Software-Defined" sounds like marketing hype but this technology is behind much of current IT systems’ advanced features and functionality - really. And, it didn’t start with software-defined storage. In this webinar Evaluator Group Sr. Analyst, Eric Slack, explains where software-defined came from, how it’s shaping IT infrastructure and what you can expect from this technology.
  • Consolidate Multiple Mixed Workloads Like a Pro – No PhD Required!
    Consolidate Multiple Mixed Workloads Like a Pro – No PhD Required! George Wagner, Sr. Product Marketing Manager, Pivot3, Juan J. Fernandez, Storage Architect, Intel Data Center NVM Solutions Recorded: Aug 15 2017 49 mins
    Consolidating multiple mixed data center application workloads on a Software-Defined Storage (SDS) platform can sometimes feel like rocket science. To confidently consolidate these workloads, including those deemed mission-critical, you need a platform that delivers predictable and low latency performance where and when it counts.

    Join Intel and Pivot3 as we share five ways to transform SDS into a workhorse for your traditional data center applications. We’ll discuss the impact on applications and operations, as well as ways to manage your SDS with ease, including hyper-converged, NVMe and Quality of Service (QoS). No PhD in storage performance required!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Aug 15 2017 59 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.

    We'll cover:
    - What core security capabilities you need to demonstrate compliance
    - The top challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, Moderator (ISC)² EMEA, Membership Services, (ISC)² EMEA Aug 21 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • Solving the last encryption problem. Never exposing keys in memory!
    Solving the last encryption problem. Never exposing keys in memory! Steve Pate – HyTrust Chief Architect Aug 22 2017 3:00 pm UTC 60 mins
    It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.

    With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Aug 22 2017 4:00 pm UTC 60 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • Ransomware attacks continue... do you have a backup plan?
    Ransomware attacks continue... do you have a backup plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Aug 22 2017 5:30 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Bring Order to Chaotic Storage Management with Software-defined Storage
    Bring Order to Chaotic Storage Management with Software-defined Storage Sushant Rao Senior Director WW Product Marketing DataCore Software & Bill Hansen Sr. Product Manager & Product Planner Lenovo Aug 22 2017 6:00 pm UTC 60 mins
    Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?

    In a word, CHAOS!

    That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.

    Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
    • Abstracts away the underlying complexity of storage infrastructure
    • Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Aug 23 2017 3:00 pm UTC 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • NVMe, NVMe over Fabrics and Beyond - Everything You Need to Know
    NVMe, NVMe over Fabrics and Beyond - Everything You Need to Know Storage Switzerland, Kaminario Aug 23 2017 5:00 pm UTC 60 mins
    NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
  • Modeling and Pricing Cloud Migration Scenarios
    Modeling and Pricing Cloud Migration Scenarios Chris Grossmeier, Senior Director of Product, CloudPhysics Aug 24 2017 5:00 pm UTC 45 mins
    Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
  • Optimizing Storage Spaces Direct with SMB3 RDMA Networking
    Optimizing Storage Spaces Direct with SMB3 RDMA Networking DataON Storage, Microsoft, Mellanox Technologies, and Strategic Online Systems Aug 24 2017 5:00 pm UTC 60 mins
    Since the launch of Windows Server 2016, Microsoft has transformed the software-defined data center landscape with Storage Spaces Direct and SMB3 RDMA networking for optimal hyper-converged infrastructure deployments.

    Storage Spaces Direct enables building highly available and scalable storage using servers with local storage. It simplifies the management of software-defined storage systems and allows the use of new storage devices such as SATA SSDs and NVMe disk drives. Storage Spaces Direct takes advantage of SMB3 RDMA networking technology for high-speed, low latency, CPU efficient storage.

    Strategic Online Systems (SOS) is a Managed Service Provider that chose a DataON and Windows software-defined solution to replace an aging SAN for one of their non-profit customers.

    The webcast will explore the following topics:

    •How Storage Spaces Direct enables service providers and enterprises to use industry-standard servers with local storage to build highly available and scalable software-defined storage.

    •How Mellanox 10/40/100GbE solutions for Window Server 2016 provide end-to-end support for RoCE, delivering high bandwidth and low latency networking via SMB3 RDMA.

    •Best practices on how to deploy Storage Spaces Direct with a Mellanox SMB RDMA network, with real-world examples from SOS.

    •DataON’s latest WSSD-certified platforms for Windows Server 2016.


    Presented by:
    Howard Lo, VP of Sales and Marketing, DataON
    Steven Ekren, Senior Program Manager Windows Server, Microsoft
    Motti Beck, Sr. Director, Enterprise Market Development, Mellanox Technologies
    Benjamin Clements, President, Strategic Online Systems
  • Endpoint Backup is not Enough - You Need an End-user Data Strategy
    Endpoint Backup is not Enough - You Need an End-user Data Strategy Storage Switzerland, Druva Aug 24 2017 5:00 pm UTC 60 mins
    More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.

    In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
  • VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud
    VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud Mike Eisenberg Aug 24 2017 6:00 pm UTC 90 mins
    During this session a VMware Cloud Specialist Engineer will show you how to install and configure vRealize Operations (vROps) to quickly make it functional within your environment. We will begin with a brief review of the vRealize Operations Architecture and its different server configuration options.

    This session will also cover:
    -Sizing considerations and guidelines for pre-installation planning
    -Installation wizard walk through including setup options and their effect on the environment
    -Connection options of vROps to a vCenter(s) and the process of discovering and collecting data
    -Steps to verify the system is collecting data once installation is complete

    To wrap things up we will review the user environment and how to start using vROps to proactively manage your environment.
  • Solving Digital Transformation with Virtualization: vSphere 6.5 Upgrade
    Solving Digital Transformation with Virtualization: vSphere 6.5 Upgrade Adam Eckerle,Emad Younis, and Martin Yip, VMware Cloud Platform Aug 24 2017 6:00 pm UTC 60 mins
    VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.

    In this webcast, VMware subject matter experts will explore the key components available in the new vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future. We’ll discuss:

    · What’s new in vSphere 6.5 and what’s coming up
    · Best practices for upgrading to vSphere 6.5
    · How vSphere 6.5 is your gateway to modernizing your infrastructure so you can take advantage of VMware’s suite of products for the SDDC, including vSAN.
  • IoT is Wildly Insecure – Who is watching over your wall?
    IoT is Wildly Insecure – Who is watching over your wall? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 24 2017 6:00 pm UTC 45 mins
    In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.

    Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?

    Attend this webinar to learn about:
    1)  Top 5 IoT Security Challenges
    2)  Disconnect between Operations and Information Technology
    3)  Cyber security best practices that includes IoT security

    You are the shield that guards your realm. Don’t let IoT penetrate your wall.
  • SUSE Manager -- konténerek felügyelete és más újdonságok
    SUSE Manager -- konténerek felügyelete és más újdonságok Hargitai Zsolt Aug 25 2017 8:00 am UTC 60 mins
    Napjainkban egyre több alkalmazást fejlesztenek, illetve futtatnak konténerizált környezetben és ezért az informatikusok számára egyre nagyobb kihívást jelent a konténer alapú infrastruktúrák felügyelet. A SUSE Manager a nyílt forráskódú világ leghatékonyabb felügyeleti megoldása. Vegyen Ön is részt webinárunkon, melyen megismerkedhet a legújabb 3.1-es SUSE Manager újdonságaival és azokkal a szolgáltatásaival, amelyek ideálissá teszik konténerek felügyeletére is!
  • Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications
    Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications Jon Benedict, technical product marketing manager, Red Hat Virtualization Aug 29 2017 4:00 pm UTC 105 mins
    Even with the advent of cloud and containers, virtualization will continue to be key to the efficient data center. But is your virtualization technology able to handle today’s demands for hybrid, modern applications?

    Red Hat® Virtualization provides the performance, security, and scale required for virtualized workloads that pave the way for streamlined operations, increased productivity, and ultimately more modern applications. Learn about approaches for consolidating, upgrading, or migrating virtualization resources and unifying and automating management of heterogeneous environments.

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • Acceleration with the Universal Data Plane - FD.io
    Acceleration with the Universal Data Plane - FD.io Ed Warnicke, FD.io Technical Steering Committee chair, Cisco & John DiGiglio, FD.io Marketing Committee, Intel Aug 29 2017 4:00 pm UTC 60 mins
    The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
  • Dive Deep into NVMe over Fibre Channel (FC-NVMe)
    Dive Deep into NVMe over Fibre Channel (FC-NVMe) Curt Beckmann, Brocade, Craig Carlson, Cavium, J Metz, Cisco Aug 29 2017 5:00 pm UTC 60 mins
    As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.

    When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!

    This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:

    •What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
    •What are the main architectural differences between NVMe and SCSI deployments
    •Impact on Queue Depth
    •How to cross-connect legacy and future flash arrays with FC-NVMe

    Please join us on August 29th for this advanced, deep dive on FC-NVMe.
  • Getting Started with IT Automation and Self Service Provisioning
    Getting Started with IT Automation and Self Service Provisioning Ryan Kelly, Staff Systems Engineer, Cloud Management BU, VMware Aug 29 2017 6:00 pm UTC 90 mins
    We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.

    Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!

    In this technical, hands-on webinar we will cover the following topics:
    -Overview of vRealize Automation setup and configuration
    -Identifying and catering to your end users
    -Blueprint design (Machine Lifecycle Whiteboard session)
    -Overview of vRealize Automation extensibility
    -Tying it all together
  • Creating Platform Agnostic Packages with Habitat
    Creating Platform Agnostic Packages with Habitat Nell Shamrell-Harrington, Sr. Software Development Engineer at Chef Software Aug 30 2017 5:00 pm UTC 45 mins
    One of the dreams of development is to build a software package once - and deploy it anywhere. With current open source projects, this dream is even closer than ever. Join Nell Shamrell-Harrington, Senior Software Development Engineer at Chef as she discusses how to create software packages that run (almost) anywhere with Habitat. You'll see how the same application can be run on bare metal, on a virtual machine, or in a container - with everything needed to automate that application already built into the package itself. Also learn how to build and deploy these packages with the intelligence to self-organize into topologies, without needing a central orchestrator. See how the dream of platform-agnostic and self-organizing packages is fulfilled today, and how it will evolve in the future.
  • Intelligent assistants vs. chatbots: Which is best for your biz?
    Intelligent assistants vs. chatbots: Which is best for your biz? Amir Shevat, Director of Developer Relations, Slack Aug 30 2017 5:00 pm UTC 60 mins
    AI is changing everything — and you know you have to get on the bandwagon. But you may not be as clear about the differences between chatbots and intelligent assistants. What do customers actually expect from one or the other? And are they a passing customer engagement fad, or does this trend have legs?

    Our latest interactive VB Live event brings together a panel of developers who have long-term, hands-on experience in chatbot and intelligent assistant tools. They’ll discuss everything from the platforms they use, the metrics they keep tabs on, the data they collect, and all the other wisdom they’ve gathered on the ground, deep in chatbot and AI territory.

    Register now to find out which solution fits your own digital customer engagement plan, how to plan a strategy, and how to get in on the game now.

    In this webinar, you'll:
    Understand the messaging platforms of the future
    Learn which platforms people are using — and why
    Measure the success of your chatbot through best-practice KPIs
    Create personalized interaction between your organization and your customers

    Speakers:
    * Amir Shevat, Director of Developer Relations, Slack
    * Darrius Jones, AVP, USAA Lab
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • The IR Boost: How Cyber Hunting Enhances Incident Response
    The IR Boost: How Cyber Hunting Enhances Incident Response Nathaniel Ford, (ISC)² EMEA, Israel Barak, Lital Asher-Dotan, Cybereason Aug 31 2017 12:00 pm UTC 60 mins
    Incident response has become increasingly complicated. According to a recent report, 67% of security professionals believe that incident response is more difficult today than it was two years ago. This is due to the numbers of IT activities and security alerts, and the need for advanced IR skills.
    This webinar will explore a new and unexpected boost to incident response, coming from the integration of threat hunting methodologies.
    Israel Barak, Cybereason CISO and an Incident Response expert, will chat with Lital Asher-Dotan, Senior Director of Content, about:
    - The latest challenges faced by IR professionals
    - Threat hunting and its benefits for IR
    - Specific examples in which threat hunting leveled up IR practices
  • Worried about security breaches? Discover why Endpoint products are not enough
    Worried about security breaches? Discover why Endpoint products are not enough Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 31 2017 6:00 pm UTC 45 mins
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • Guarding Against Mobile Malware, How to Avoid the Next Big Threat
    Guarding Against Mobile Malware, How to Avoid the Next Big Threat Adrian Davis, Managing Director, (ISC)² EMEA, Stephen McCormack, Mobile Security Leader, IBM MaaS360 Sep 5 2017 10:00 am UTC 60 mins
    In the wake of global ransomware attacks targeted mainly at Windows desktop and laptop devices, this webinar will discuss an often-overlooked threat: the mobilization of malware and ransomware. Whether through malign apps, poorly written code, corrupt e-mail profiles or disreputable websites, there are a range of avenues of attack open to hackers who might choose to target smart devices.
    To date, attacks on mobile devices have been mostly on a small scale, targeting individual user devices and data. But is a big attack waiting in the long grass? Will the next WannaCry or Petya target mobiles, and how can you protect yourself?
  • Optimizing your Infrastructure: An Essential Guide to vSAN ReadyNodes
    Optimizing your Infrastructure: An Essential Guide to vSAN ReadyNodes Biswapati Bhattacharjee, Sr. Product Manager, VMware Sep 5 2017 4:00 pm UTC 60 mins
    vSAN continues to drive the rapid growth of hyper-converged infrastructure (HCI), adopted by more than 8,000 customers. One of the most popular HCI consumption models is the vSAN ReadyNode – pre-configured, tested and certified x86 servers designed for optimal HCI performance. Today, we have more than 300 pre-configured ReadyNodes listed in our vSAN Compatibility Guide, which includes certified CPUs, memory, network, I/O controllers and storage options available from our OEM partners across the globe.

    While pre-configured vSAN ReadyNodes ensure excellent HCI performance, some users need the flexibility to use another capacity tier device or a different processor in their ReadyNode. In this webcast, we will explore what you can and can’t change in a pre-configured ReadyNode. We’ll also talk about Day 0 availability for ReadyNodes with the new Intel Purley server platform, and discuss:

    The high level certification process conducted by our vSAN ReadyLabs
    vSAN Hardware Market Segmentation
    Guidelines on building your own ReadyNode with certified components
    Brief review of vSAN Hardware Guidance