Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
No matter what level of modernization you are evaluating, any effort should start with a solid foundation. A standardized environment based on enterprise-ready, open-source operating system—Red Hat® Enterprise Linux®—and a hardware platform based on Intel ® is key to the modern data center.
Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux® to improve efficiency, and create a consistent foundation across current and cloud-future IT environments.
The cloud has upended the way your customers want to adopt applications and underlying infrastructures. It’s important that your business stays ahead of this transformation. Your customers are looking to you as their trusted managed services advisor to “make it work.” Join us to learn best practices for transitioning your customers to the cloud.
Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.
In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
Cohesity is one of the rising stars in the world of data management. They have flipped the data protection market on its ear. In this CEO Series webcast, Arun Taneja, Founder and Consulting Analyst of Taneja Group will interview Mohit Aron, CEO of Cohesity, to understand the concept of Hyperconverged Secondary Storage and why it matters to the industry. We will explore the advantages it provides for your data protection, test/dev, and data analytics workloads and how Cohesity is different from other solutions on the market. It is time to say goodbye to the old, staid methods of protecting data. The traditional methods simply don’t make sense in the new world of Big Data, Multi and Hybrid cloud and web-scale applications. Join the webcast for a whirlwind tour of new ideas and methods in this space.
Storage and infrastructure are going through a lot of changes. With technologies like Software-defined Storage as well as new infrastructure like Hyper-converged, there is a lot for IT admins to consider.
Join us in this webinar where we’ll cover Software-defined Storage, Flash, Hyper-converged and Cloud Storage. You learn why these technologies and infrastructure models are or aren't being utilized by companies and the areas where they have not lived up to their promises.
Be the first to hear about Cisco and NetApp’s exciting new FlexPod solution. This revolutionary design couples operational simplicity, guaranteed QoS, and granular scale-out with FlexPod’s proven architecture. The new solution will appeal to Infrastructure buyers, as well as, Cloud and Virtualization buyers who are building next generation data centers.
•Learn how the solution can provide you with proven performance, agility and value through the latest NetApp and Cisco technologies
• Experience how FlexPod converged infrastructure can reduce risk, deliver faster time to market and improve business outcomes
• See how NetApp technology simplifies storage management and scales on demand
This webcast will introduce a discussion of several threat models that help to illustrate how organizations can look to strengthen their security posture while supporting their GDPR strategy. Areas of concentration will include:
• How to reduce the potential risk and liability associated with the GDPR data residency and data protection accountability requirements.
• Focus on specific controls used to provide clarity and measure to any GDPR strategy within the enterprise.
• An introduction of cybersecurity control measure that can help reduce threats to the enterprise, while ensuring acceleration of data and security regulatory accountability for any GDPR program.
Session attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of balancing the confluence of security risks and the GDPR mandate. They will have some starting points on how they can create a plan to step beyond static regulatory alignment and apply collective intelligence, industry baseline initiatives and mandates, as well as shared industry intelligence, to better measure what’s most important to their cyber policy and regulatory GDPR requirements.
Deploying open, software-defined scale-out storage solutions to industry standard Intel ® servers can allow you to easily manage unstructured data for physical, virtual, and cloud environments. Learn how you can benefit from added business agility and cost efficiencies by comparing traditional, monolithic storage to seamlessly scalable software-defined storage with Red Hat Gluster Storage - without sacrificing the durability, security, and performance you require from enterprise grade storage.
Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.
For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.
During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.
You will learn how Pekin Insurance:
> Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
> Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
> Gained improved visibility into its compliance performance metrics
Increased the overall productivity and efficiency of its InfoSec team
This webcast will include a live demo and Q&A session.
Transitioning from Data Migration to Data Management
In this webinar join, Storage Switzerland and Primary Data for a roundtable discussion on how automated data management can help you overcome the budgetary and technological challenges with a migration strategy and how you can implement data flow to eliminate the problem once and for all.
As businesses become increasingly dependent on SAP HANA for real-time decisions, the demands of the infrastructure continue to grow. A more efficient and modern infrastructure is required to meet the demands of these global always on real-time environments. Storage plays a crucial role in maintaining high service levels and guarding against costly downtime. The right storage for SAP HANA is all flash.
Join us as Jeff Kato, Senior Analyst and Consultant from Taneja Group describes why all flash is the best choice for HANA. Jeff will also provide a comparison of the leading all flash solutions in the market and illustrate where 3PAR All Flash leads the competition in critical storage efficiency metrics. Stephen Carpenter, Master Technologist from HPE’s Storage Business Unit, will share some key insights that distinguishes 3PAR StoreServ architecturally for HANA workloads. Additionally, Hasmig Samurkashian, Product Manager from the HPE Storage team will share actual customer deployment examples.
Jeff Kato, Senior Analyst & Consultant, Taneja Group
Stephen Carpenter, Master Technologist, Advanced Technology Center, HPE Storage
Hasmig Samurkashian, WW Solutions Product Manager, HPE Storage
See an in-depth discussion of the new features and a demo of Data Integration Hub including the new features of 10.2. Learn how you can boost your productivity, efficiency and self-service with modern, hub-based data integration.
Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:
●The time and associated cost security teams spend on incident response and how you compare to your peers
●How organizations are coping with an average of 40 actionable security incidents per week
●Where teams are focusing their security efforts
●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
We know we need to measure our IT systems and have visibility - but what level of monitoring is right for our environment?
Join this webinar to discover how TEB uses monitoring to achieve their goals and help improve their development services - resulting in the highest level of customer satisfaction on their banking applications.
Werelds meest geavanceerde enterprise datacenters vertrouwen op Nutanix web-scale technologie om hun bedrijfskritische applicaties en workloads voorspelbaar en consistent te laten draaien.
Belangrijke aspecten van de Enterprise Cloud zijn het reduceren van kosten, door het vereenvoudigen van de infrastructuur en het beheer, het omlaag brengen van ongeplande downtime, en het mogelijk te maken om een “pay as you grow” model te hanteren.
Nutanix biedt klanten nu ook de mogelijkheid om deze Enterprise Cloud te laten draaien op het krachtige Cisco UCS platform, op zowel de rackmount als blade series.
In dit webinar vertellen we u graag wat Nutanix voor uw organisatie kan betekenen en wat de mogelijkheden zijn mbt de inzet van Cisco UCS, een oplossing die door CRN recent als "Product of the year Winner 2016" is uitgeroepen..
With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.
Join Gemalto and ID Quantique for a joint webinar to learn more about:
•What is quantum computing and how it affects security
•Quantum cryptography in action
•Examples of quantum cryptography in the enterprise and government space
•Quantum-safe solutions at a glance
•Future developments of quantum cryptography
Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.
Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.
This webinar will cover:
- Possible bottlenecks and roadblocks on the path to the Internet of Things
- What leading organizations are doing today to prepare for the coming influx of new types of devices
Join this webinar with Research Vice President Al Sadowski of 451 Research as he presents four distinct use cases of how different organizations are using OpenStack.
From building private cloud environments that provide public cloud services, to virtualizing network functions, to operating as a platform for deploying and managing containers at scale, the opportunities are endless.
Fission is a framework for serverless functions or Functions as a Service (FaaS) for Kubernetes. It allows users to run FaaS on any infrastructure.
Fission exposes a conceptually simple interface: Users create _functions_ and associate them with _triggers_. Functions are short-lived and stateless, and are written in any supported language (NodeJS, Python, Go etc). Triggers invoke functions: they can be HTTP requests, timers, or other events.
Along with demos, the talk will cover:
1. Developer workflows: function versioning, unit testing, upgrades.
2. Operational challenges with serverless and their mitigation
3. Mixing serverless and more conventional designs as part of a real-world solution.
The best actors don’t film an entire movie in a single day. The same is true for ‘bad actors’ in your data center: they don’t attack the whole data center at once, but start small and branch out rapidly. With this approach, they can make traditional segmentation methods ineffective. The key to cyber security is to always expect a counter move. You need to make your data center operate dynamically, just as your threats do, yet remain flexible to support your applications.
In this session, we will look at methods to operationalize east-west security in ways that ensure scaling and flexibility don’t become an increased burden on your IT staff.
- Best practices from government recommendations
- Automation for security with Service Composer
- Security resource planning using Splunk and NSX
The 2015 data breach at the U.S. Office of Personnel Management (OPM) was a defining moment for the federal government, as it continues to reel from the colossal theft of personnel information affecting 21.5 million individuals. Join us for an insightful discussion to understand more about this massive cyberattack in our webinar, “Dissecting the OPM Breach. How Artificial Intelligence and Threat Hunting Removed the APT.”
During the webinar Thomas Pace, Director of Consulting Services at Cylance®, will walk you through the course of events that led up to the OPM breach, expose the motivation behind the attack, and project its probable long-term impacts on how the U.S. government evaluates its IT and security strategy.
Thomas will review the role Cylance played in responding to the breach by explaining the tools and processes that Cylance utilized to quickly detect and remove the malware from over 10,000 machines. You’ll also get an inside look at how the lessons learned can help your organization to better prepare against and prevent security vulnerabilities.
Register for the webinar to learn more about:
•The evolution of the threat landscape during the past two years
•The value of having incident response processes and products in place before an incident occurs
•The inefficiencies of legacy antivirus solutions
•The benefits of artificial intelligence-based malware detection
In 2016, when major platforms like Facebook gave developers the keys to the artificial intelligence kingdom, and advances in AI technology and natural language processing started breaking the user interface mold, analysts predicted that chatbots were going to change the game.
Bots flooded the market—and then they vanished. They weren't backed with solid business models, addressing real pain points or solving problems, because marketers weren't asking the right questions, customers weren't engaging, and chatbots were too often gimmicks instead of disruptors.
How do you become the next unicorn in the bots and artificial intelligence space? How do you catch the eye and win the heart of that top VC firm? Join our latest interactive VB Live event to find out!
In this live virtual executive roundtable, you'll:
* Learn what entrepreneurs need to do to get noticed by top VC firms
* Look at the most active venture capitalists in tech today
* Discover the biggest mistakes made by foundering startups
* Identify the weaknesses that are keeping you from becoming the next unicorn
* Ton van 't Noordende, Venture Partner, Keadyn
* Jon Cifuentes, Cofounder Research and Operations, All Turtles
* Matthew Zeiler, CEO, Clarifai
* Stewart Rogers, Director of Marketing Technology, VentureBeat
MEF's prestigious annual Awards Program, now in its 12th year, is the world's largest, longest-running awards program. It focuses on leadership in emerging Third Network services powered by LSO (Lifecycle Service Orchestration), NFV, SDN, and CE 2.0 networking technologies. The MEF 2017 Awards program recognizes service, application, technology, and professional excellence in the vibrant global Third Network community committed to delivering innovative solutions that are optimized for the digital economy and the hyper-connected world. The most advanced services typically provide an on-demand experience with user-directed control over service capabilities and are delivered over more automated, virtualized, and interconnected networks.
This webinar that will help you identify the award categories in which your company excels. Attend and learn how to prepare an excellent award submission. We will cover:
-MEF award categories and important dates
-How to use the award submissions portal
-Tips for writing concise, compelling submissions
The deadline for submissions is September 13, 2017. Awards finalists will be announced on October 17, 2017.
This is an excellent opportunity to have all of your questions answered and will help you to get one step closer to being an award winner.
In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.
This session will include:
- A deep dive into setting up the physical and virtual network infrastructure.
- Demos you can follow to get NSX quickly running in your environment.
Business is moving faster than ever—and enterprise IT departments are struggling to keep up. Organizations need apps to run faster and more reliably, provision without the hassle, and scale on-demand while staying in budget. Hyper-converged infrastructure (HCI) makes all of that possible. Join us for the webcast to get a closer look at HCI, and find out how it can transform your data center.
You’ll learn about:
—The evolution of the modern data center
—What HCI is and the case for a software-defined approach
—The tangible—and intangible—benefits of HCI
—How HCI works in the real world
As more and more applications are developed and deployed using containers, it is important for IT Operations and DevOps teams to be able to manage the container infrastructure. They must also ensure that these containers maintain and adhere to their internal security and compliance regulations. SUSE Manager, delivers best-in-class open source infrastructure management with new enhancements focused on improving DevOps efficiency with enhanced management of software templates and compliance, in hybrid cloud and container infrastructures. Join us to learn more about how SUSE Manager can help you get ready for a world of compliant containers.
Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.
Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.
During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.
Join us for a deep dive into:
-Current implications of multi-cloud environments on IAM
-Proactively using analytics to define access policies
-Avoiding security fatigue through scenario-based authentication
-Preparing for audits using policy implementations
-A live demonstration of how this all fits together in a multi-cloud environment
While there are many products that claim to provide cloud monitoring, the level of granularity provided by different solutions can vary significantly. But the devil’s in the details; the granularity provided by your performance monitoring solution will directly impact your ability to automatically diagnose performance issues before users are impacted.
Join us for this webinar where John Worthington, Director of Product Marketing at eG Innovations discusses how managing private, public, and traditional data centers all together is no longer possible with multiple disparate monitors. Organizations must find a way to unify monitoring to successfully migrate digital business services to tomorrow’s hybrid cloud environments.
You will discover how to:
- Determine the critical requirements for assuring the performance of your digital business services as you migrate to the cloud
- Learn the difference between universal and unified monitoring and how it can help you assure cross-cloud delivery of critical IT services
- Validate a solid unified cloud monitoring solution with a demonstration and best practice features/functionality
State-of-the-art remote workstation experiences are now possible on any device, using infrastructure as a service (IaaS) hosted on the Intel® Xeon® processor E3 v5 family with Intel® Iris™ Pro graphics. Intel’s on-chip graphics technology powers a broad range of workstation-class applications for engineers, designers, and architects. Simple access is now available to companies of all types and sizes, on a trial basis and beyond. Leverage the capabilities of remote workstations with support provided by IMSCAD, a global consultant in graphics virtualization technology.
The cloud has brought both risk and reward to MSPs. In today’s hybrid cloud world, MSPs must deliver consumption-based, private and public cloud offerings to their clients. This includes offering primary storage, offsite backup and DR that is high-performance, scalable and secure. Outsourcing primary storage along with backup and DR enables an MSP’s customers to reduce their on-premises footprint software licenses, connectivity and the problems that come with it. It also sets up the MSP to offer hybrid services like DR as a Service and the new opportunity of copy data management - stop making copies.
Enterprise customers and service providers have been researching ways to find a modern day storage solution so they can move away from the traditional monolithic infrastructure environments. Customers have been looking for ways to remove silos, reduce OPEX/CAPEX, create operational efficiency – all with large scale-out capabilities and cloud agilities without sacrificing performance.
This webinar is to share how customers can achieve these goals with a truly software-defined storage solution. Companies have transformed seamlessly from traditional storage environments to flexible, cloud-like agile environments.
Hear from Steadfast, a service provider leader, who enables their customer base to focus on their company priorities to grow the business instead of spending the unnecessary time to maintain and manage their traditional storage infrastructure.
In this session, you will hear about:
- The modern day storage-as-a-service infrastructure with high-performance, extreme scale-out flexibility and cloud agility
- How to eliminate manual data migration
- Fully automating the storage infrastructure
- Steadfast’s IT transformation
As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
How do you assign and deploy secrets to containers while keeping them secure?
How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
How do update, rotate and revoke secrets without interrupting the containers that use them?
How do you leverage existing secrets stores (KMSs) and extend their use to containers?
Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
· Learn some of the “do's and don'ts” of securing secrets
· Learn the cardinal security requirements of secrets management
· Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
Ensuring you’re prepared for the next series of challenges
Docker Containers and Kubernetes are taking the industry by storm, promising new levels of efficiency for both application developers and operations teams. Even organizations not engaged in a wholesale re-architecture of their application environments can benefit from desirable properties of containers like packaging, portability and service isolation.
While the benefits are real, many organizations face choppy waters as they evolve from initial public or private cloud deployments to production. While Kubernetes is impressive at abstracting resources and managing containers, new services still need to interact with existing applications, and challenges abound related to multi-tenancy, resource scarcity and ensuring that business priorities are met.
Join us for an informative and insightful look at containers in the enterprise, and learn about new technologies and strategies that can help ensure a smooth and trouble free evolution as you chart your course from pilot to production. Whether you’re advanced in your use of containers or just getting started, there are important insights to be gained.
•451 Group’s latest research and analysis
•The “state of containers” and their adoption in IT
•Benefit from case studies and lessons learned by early adopters
•Considerations when deploying applications to production
•Techniques to maximize utilization and optimize expenditures
•Strategies for supporting mixed container and non-container workloads
The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.
Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.
During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:
•The local and global government data privacy regulations (Australia and Europe)
•Gauging the true cost of a data breach and how to reduce the scope of risk
•Understanding privacy by design throughout business
•Strategies for simplifying operations for regulation and internal audits
•Determining current industry compliance, which may be applicable to the APA and GDPR
Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best orgaizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.
Join IBM Resilient’s Chris Neely, Director of Technical Sales, EMEA to explore the latest incident response methodology and technology. Can automation really save the day? From instant escalation, to automatic enrichment, to guided mitigation, Chris will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
Carrier Ethernet es el combustible para la economía digital global y la base sobre la cual se construye nuevos servicios dinámicos, seguros y orquestados para el mundo hiper_conectado. Pero la falta de estandarización para interconectar proveedores y operadores de servicios Ethernet es un obstáculo para el crecimiento y la eficiencia del mercado. Actualmente, la mayoría de las interconexiones Ethernet son interconexiones de red a red (NNI) no estándar y personalizadas, lo que impide escalar el mercado. Más de una docena de proveedores de servicios y proveedores de tecnología miembros del MEF han participado en el proyecto MEF para crear Puntos de Interconexión Ethernet (Ethernet Interconnect Points o EIP) aprovechando los estándares existentes para interconexión CE. La primera fase del proyecto EIP involucró la creación de una Directriz de Implementación de Punto de Interconexión Ethernet que recomienda cómo usar las Interfaces Estándar de Red a Red (ENNIs) de forma eficaz. Esta guía inicial se enfoca en la configuración de servicios de acceso Ethernet (E-Access) de una manera simple, y las nuevas directrices avanzarán en complejidad con en el tiempo. Las directrices ayudarán a la industria a escalar rápidamente y reducir complejidad.
Este webinar explorará dónde se dirige el mercado, las expectativas técnicas, los obstáculos operacionales que pueden surgir y la necesidad de que los operadores gestionen eficazmente la transición a medida que el mercado avanza hacia la estandarización. Este seminario apunta a aquellos proveedores de servicios que compran servicios de Ethernet mayoristas de operadorese interconectan sus redes para crear servicios CE minoristas de extremo a extremo pasando por múltiples redes. También se compartirá informaciones que pueden ser importantes para la toma de decisiones mientras desarrolla su estrategia de cómo sacar total provecho de interconexiones Ethernet estandarizadas.
How can a better storage infrastructure accelerate time to discovery for genomics research?
Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. Brian Schwarz from Pure Storage will also share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.
Tune into the conversation to learn:
- Why the convergence of data storage and life sciences research go hand-in-hand
- Technologies and best practice methodologies for genomic analysis, including containers and workflows
- How to handle massive big data sets in real time
Is your disaster recovery (DR) strategy inhibiting your company’s growth? A hybrid DR approach can bring significant benefits but only if you go in with full knowledge and understanding. In this webinar, we’ll outline the four pitfalls that can sink a DR strategy.
Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will also share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. And then Brian Schwarz from Pure Storage will share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.
In this, the sixth entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into some of the nitties and the gritties of storage details that are often assumed.
When looking at data from the lens of an application, host, or operating system, it’s easy to forget that there are several layers of abstraction underneath before the actual placement of data occurs. In this webcast we are going to scratch beyond the first layer to understand some of the basic taxonomies of these layers.
In this webcast we will show you more about the following:
•Storage APIs and POSIX
•Block, File, and Object storage
•Byte Addressable and Logical Block Addressing
•Log Structures and Journaling Systems
It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.
Join us on July 6th for this session. We look forward to seeing you there!
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:
-What we can learn from Jason Bourne about knowing one’s surroundings
-What we can learn from hackers to better protect valuable data
-What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
-How to change our mindset in a new era of a hacker driven gold rush
Organizations are looking for the right tools to monitor their Citrix farms. However, this is no easy task. There are several tools available in the market today - some from Citrix itself such as Director and NetScaler MAS, and others from third-party vendors like eG Innovations, Goliath Technologies, ControlUp, and more. Before investing in a Citrix monitoring tool, Citrix administration teams must be well-informed of what each of these tools is capable of, what use cases they serve, and their benefits and shortcomings.
View (or join us for) this webinar as Rob Beekmans, Solutions Architect at PQR gives a vendor-neutral analysis of various monitoring tools with the objective of making you aware of the available options, and helping you choose the best monitoring tool for your Citrix deployment. Be informed, choose wisely!
Hear from Lee Caswell, VP of Products for storage and availability, how the latest innovations in VMware vSAN 6.6 are helping customers simplify and accelerate their digital transformation.
VMware vSAN, our award-winning software powering leading hyper-converged infrastructure (HCI) solutions, continues to evolve as a core building block for the Software-Defined Data Center. After Lee’s introduction, vSAN product experts will cover how vSAN enables you to seamlessly extend virtualization to secure hyper-converged storage, to reach your objectives for cost and efficiency, and to scale to tomorrow’s business needs. We’ll also share insights gained from our vSAN beta program where we focused on features and capabilities that informed vSAN 6.6, including security, protection, and management.
Join us to learn how that latest features in vSAN 6.6 can help set your storage and availability agenda in 2017 and beyond.
When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-Converged Infrastructure (HCI) and Software-Defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.
But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.
Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization. In this webinar, we will cover the:
- Criteria to evaluate these products
- Pros and cons of different vendors’ products
How Pure Storage and Rubrik work together to address many key challenges in the datacenter.
Pure Storage and Rubrik deliver granular RPOs for production workloads while eliminating the effects of VM application stun. For highly transactional applications in virtualised environments, we can ensure high performance without lengthy snapshot windows and application time-outs.
The integration significantly reduces the VM snapshot stun window while providing consistent point-in-time copy of VMs for reliable and quick recovery. Unlike traditional backup-vendor integrations with block-storage arrays, Rubrik’s direct integration with the Pure Storage FlashArray provides granular protection and file-level recovery for virtualised environments.
In this webinar, we’ll discuss how Pure Storage and Rubrik work together to address many key challenges in the datacenter, including:
Lengthy deployment and complex management
Lack of scalability and performance bottlenecks
Bloated footprint and lack of visibility and analytics