Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at ForresterRecorded: Aug 15 201965 mins
As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.
Attendees of the webinar will learn:
-The top challenges organizations face in creating a technology experience that enables productivity
-The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
-A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
Ignacio Verona and David Sastre Medina, Red HatRecorded: Aug 15 201944 mins
X by Orange committed to launch a new, fully software-defined telco operator in Spain - from scratch. They wanted to “Uberize” the telco business by being completely cloud based and not owning a single piece of hardware. The goal was clear, but not easy: Streamline how a communications service provider works to launch new services in less than 90 days, provide an extremely simple user experience, and redefine the telco market. Also, the whole project, including hiring more than 120 people, developing the IT backend, and creating a sales, marketing, and go-to-market strategy, needed to be accomplished in 1 year. And they made it.
In this session recorded at Red Hat Summit, Ignacio Verona and David Sastre Medina, Red Hat, discuss how X by Orange created its infrastructure using Red Hat OpenShift with an “everything is automated” deployment policy. Also, they show how Red Hat Consulting helped the company's goals become reality through extensive involvement - during the initial phases and on site.
Nathan Necaise - VP of Data Sciences Emerging Services - OptivRecorded: Aug 15 201955 mins
The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.
During this webinar, we will discuss:
-Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
-Show customer examples and demonstrate how they are leading to transformative effects
-How to optimize security architectures that use technologies like Splunk using StreamSets
Storage Switzerland, HYCURecorded: Aug 15 201930 mins
Backup and Recovery is as old as the data center itself, but organizations still struggle with the process. IT professionals have tried many solutions to solve their data protection solutions, and the market is full of options, but none seem to address the core issues. Launched only two years ago, HYCU, Inc took a different approach by building backup solutions custom-built for each environment they protect.
Join HYCU, Inc’s CEO, Simon Taylor as he sits down with Storage Switzerland Lead Analyst, George Crump to discuss HYCU’s unique approach to the fiercely competitive backup market.
Primitive Logic CEO Jill Reber & President Kevin MoosRecorded: Aug 15 201936 mins
Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.
Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.
Join Jill Reber and Kevin Moos of Primitive Logic to learn:
- How to work with third parties who process personal data on your behalf
- How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
Cameron Joyce, Principal Solutions Architect at DatriumRecorded: Aug 15 201956 mins
Many enterprises have chosen Datrium’s next-generation disaggregated HCI solutions. Do your systems need a refresh? Fortunately, EqualLogic customers can take advantage of Datrium Automatrix and get primary storage, backup, disaster recovery, mobility, and encryption in a single data management platform. Join us for our upcoming webinar where you will learn how to:
- Get zero storage management overhead with a simple VM-centric approach and no LUNs or volumes
- Independently scale performance and capacity for maximum flexibility and no disruption to production systems
- Protect your data with built-in backup, blanket encryption, and erasure coding
- Take advantage of optional disaster recovery orchestration, including runbook automation, and recover from ransomware instantly with low RTO data mitigation plans
- Use industry-leading snapshot and replication capabilities
Theresa Miller, Principal Technologist, CohesityRecorded: Aug 14 201944 mins
For years, we have all been dealing with backup and restore policies that really haven't really changed with the times. While these concepts of recovery are not new, the game has changed how we do it. Today there are some better ways to manage this always traditionally cumbersome process in vSphere environments. This session will cover some of the common horror stories that make data protection seem over-complicated and difficult. Gone are the days when restoring data should take hours and be a hassle. We will also discuss backup and recovery features that you must have to ensure your enterprise is ready for any data protection situation related to vSphere. We will show you that there is a better way to avoid stepping on the landmines that plague backup administrators and keep them up at night.
Freddy Grahn, Senior Technical Field Enablement Engineer, Cohesity Jon Hildebrand, Principal Technologist, CohesityRecorded: Aug 14 201928 mins
Backup, recovery, and management for Microsoft SQL Server is a critical part of many enterprises' IT organizations. Legacy multi-point backup and recovery products are unable to go beyond serving as a mere insurance policy. Enterprises need a radically different approach that provides efficient operations with large deployments, adheres to organizational SLAs, and makes backed up data productive.
Cohesity offers a modern approach to tackle SQL Server protection challenges, which puts the admin in control of infrastructure with a single, hyperconverged scale-out solution.
In this on-demand webinar, we will show you how Cohesity:
-Backs up large-scale SQL deployments, easily
-Can help you achieve rapid RTOs and low RPOs
-Can enable test and development with rapid database clones
Robert Linton, Russ InmanRecorded: Aug 14 201960 mins
This webinar is brought to you by the Vivit US Government Solutions Special Interest Group.
Objective: Learn how to leverage the Cloud for realistic Performance Testing.
Cloud Burst, a Micro Focus performance testing solution, is the only product on the market today that can automatically support your scalable performance testing needs in the Government FedRAMP Cloud environments.
See how your testing can be hosted in a Private Secure Gov Cloud environment to automatically execute performance or stress test completely within the Gov Cloud environments, or from various cloud regions around the world, simulating real user’s experience during the performance test.
Watch the live demo running in the FedRAMP Gov Cloud regions to see how easy, quickly and affordably you can plan, design and execute your application performance testing requirements.
This offering with flexible pricing, allows clients to leverage their investment in the Micro Focus ADM software solutions, increasing their ROI, while reducing risk and adding value to their organization’s internal and external users.
Julian Ereth - Research Analyst - Eckerson Group | Arvind Prabhakar - Co-Founder & CTO - StreamSetsRecorded: Aug 13 201959 mins
DataOps borrows concepts from agile development to streamline the process of building, deploying and operating dataflow pipelines at scale. Putting DataOps into action requires not only the right technology, but more broadly a thoughtful approach to align the people and the process behind such an initiative.
Eckerson Group research analyst Julian Ereth join StreamSets' Co-Founder and CTO, Arvind Prabhakar to explore the emerging trend of DataOps.
During this webinar, we will discuss:
-Principles and benefits of DataOps
-Common DataOps use cases
-Practical guidelines for putting DataOps into action
-How StreamSets can help on a DataOps journey
Matt Roman, VP of Marketing and Product Management, Edgecore NetworksRecorded: Aug 13 201936 mins
New innovations are occurring in Open Networking switch design to support next generation cloud first architectures and the coming rollout of 5G mobile networks. The status quo of closed proprietary vendor designs is quickly being replaced with open devices that include high performance packet processors as well as powerful multicore CPU systems that not only support the switch Network Operating System but also support containerized value-added functions such as application analytics, network telemetry and packet shaping. This webinar will provide insights into the evolution of data center switches, core routers, mobile backhaul and FTTX network devices.
Bruce Beam, CIO, (ISC)², Brandon Dunlap, Moderator, (ISC)²Recorded: Aug 13 201960 mins
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.
In this session Bruce Beam, Chief Information Officer at (ISC)² will provide insight into the path he took to become a Cybersecurity Leader and how he is reinventing the role in the face of accelerating industry change
Alex McDonald, Vice-Chair SNIA EMEA, and Office of the CTO, NetApp; Paul Talbut, General Manager, SNIA EMEARecorded: Aug 13 201929 mins
The SNIA EMEA Storage Developer Conference (SDC) will return to Tel Aviv in early February 2020.
SDC EMEA is organised by SNIA, the non-profit industry association responsible for data storage standards and education, and the conference is designed to provide an open and independent platform for technical education and knowledge sharing amongst the local storage development community.
SDC is built by developers – for developers.
This session will offer a preview of what is planned for the 2020 agenda ahead of the call for presentations and will also give potential sponsors the information they need to be able to budget for their participation in the event. If you have attended previously as a delegate, this is a great opportunity to learn more about how you can raise your profile as a speaker or get your company involved as a sponsor. There will be time allocated during the webcast to ask questions about the options available. Companies who have significant storage development teams will learn why this conference is valuable to the local technical community and why they should be directly engaged.
Storage Switzerland, MemVergeRecorded: Aug 12 201930 mins
Workloads like artificial intelligence (AI), machine learning (ML), big data analytics, the Internet of Things (IoT) and data warehousing need storage memory-levels of performance. Charles Fan, CEO of MemVerge, has a vision for making this possible without disrupting the application programming model or the storage software. Join us as Fan discusses his company’s invention of “Memory-Converged Infrastructure (MCI).”
Attend for additional discussion, including learning:
The problems inherent in using dedicated clusters to serve these specific applications.
Why it is so challenging for enterprises to enable modern workloads to run at memory speed with technologies like Intel’s Optane App Direct Mode.
How to unlock the raw performance potential of Intel 3D XPoint Persistent Memory with the efficiencies of pooled storage – and without changing any code.
Kirit Basu - VP of Product - StreamSetsRecorded: Aug 8 201944 mins
According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.
We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.
During this webinar, we will discuss:
-Pitfalls to avoid for any hybrid-cloud project
-Key requirements to ensure continuous movement of data across any cloud
-How StreamSets customers are using the platform to drive real value from DataOps
Paul Moxon, VP Data Architectures & Chief Evangelist, DenodoRecorded: Aug 8 201961 mins
Digital transformation, as cliché as it sounds, is on top of every decision maker’s strategic initiative list. And at the heart of any digital transformation, no matter the industry or the size of the company, there is an application programming interface (API) strategy. While API platforms enable companies to manage large numbers of APIs working in tandem, monitor their usage, and establish security between them, they are not optimized for data integration, so they cannot easily or quickly integrate large volumes of data between different systems. Data virtualization, however, can greatly enhance the capabilities of an API platform, increasing the benefits of an API-based architecture. With data virtualization as part of an API strategy, companies can streamline digital transformations of any size and scope.
Join us for this webinar to see these technologies in action in a demo and to get the answers to the following questions:
- How can data virtualization enhance the deployment and exposure of APIs?
- How does data virtualization work as a service container, as a source for microservices and as an API gateway?
- How can data virtualization create managed data services ecosystems in a thriving API economy?
- How are GetSmarter and others are leveraging data virtualization to facilitate API-based initiatives?
Jonas Irwin, Pure StorageRecorded: Aug 7 201959 mins
This webinar will cover a broad set of practical capabilities needed to be successful implementing or optimizing a cloud 1st strategy. We will not only tell, but also demonstrate Pure's robust data mobility framework, infra-as-code and our new cloud scale data protection technology combing both flash and cloud (F2F2C).
The session will address VMware but also several CNCF - https://www.cncf.io/ - technologies that will help organizations build applications that can be written once and run anywhere.
"Automation is valuable, but how to we stay focused on adding features rather than maintaining code and tools? In this session, we will cover how to promote value focused automation using Ansible Roles and F5 Automation Toolchain including Application Services 3 (AS3), Declarative Onboarding (DO), and more. Leveraging a single Role or Task, we will demonstrate how to achieve lengthy use-cases such as deploying an application or GSLB configuration.
Andre Leibovici, Field CTO at DatriumRecorded: Aug 7 201929 mins
Ransomware is quickly becoming IT’s worst nightmare. With 300% year-over-year growth in ransomware incidents in 2018, equalling more than $8B in damage costs globally, organizations need to prepare for the increasing threats and attacks.
How long will it take to recover from a ransomware attack?
Join us to learn how you can speed up recovery from ransomware acts. Learn how you can leverage best practices in disaster recovery and data management to achieve:
- Instant RTO, low RPO, consistency across hosts, using Blanket Encryption
- Immutable, isolated, regularly verified and cataloged VM-granularity snapshots
- Massive retention on multiple replicated sites
- Whole data center recovery workflow automation
Erik Ottem, Sr. Director, Data Center Systems at Western Digital CorporationRecorded: Aug 7 201928 mins
Virtualization has been around for quite a while. Now might be a good time to review what you’re doing from a data perspective. Classic hardware virtualization has been the key to consolidation efficiencies and savings. Now data virtualization can provide similar benefits in a different way. A modern data strategy should consider the benefits and costs of data virtualization. Some people are surprised to find out that hardware virtualization is not the end of the story, that there is data virtualization as well. In this webinar we’ll take a look at how having the right data strategy can improve the way you provide value to business operations by making data more available by reducing siloes and reducing the amount of management required.
Join Erik Ottem, Senior Director, Data Center Systems at Western Digital Corporation, as he shares tips on how to get the most from a virtualized environment from a data perspective.
In this webinar you’ll learn:
- Data Strategy: Why organizations must start with a data strategy; the business value of building a
data strategy and aligning infrastructure planning with that strategy
- Shifting from Hardware Virtualization to Data Virtualization: Why viewing your virtualization strategy
from a different lens is imperative to driving a competitive business advantage
- Cost Savings: How implementing a data strategy can help you spend less on both building and
managing data infrastructure
- Virtualization-Worthy Data: How to identify what data is better housed in a virtual environment;
including identifying the single source of truth (Golden Copy) and managing data quality
- Case Study: we’ll take a look at how data virtualization can work in the real world and the benefits that
have been realized.
Eric Noriega and Vickie Shen, Booz Allen HamiltonRecorded: Aug 7 201942 mins
In this session recorded at Red Hat Summit, Eric Noriega and Vickie Shen, Booz Allen Hamilton, review the differences between deploying Red Hat OpenShift on-premise versus in a hosted cloud provider. The Booz Allen Hamilton team has significant experience deploying Red Hat OpenShift, both on-premise as well in public cloud providers. They've determined a number of technical and organizational factors that are critical to speeding up deployment and adoption.
The session will cover:
• Technologies that are critical for each environment, and the order in which to handle them.
• The benefit gained from running Red Hat OpenShift in either environment.
• Tips for controlling cost and effort in both environments.
Yoram Salinger: CEO - Perception Point, Michael Aminov: Founder & Chief Architect - Perception PointRecorded: Aug 7 201948 mins
Wide adoption of new cloud collaboration apps (e.g. OneDrive, Slack, etc.) is creating many new security blindspots that are ripe for hackers to leverage. As more and more companies use these tools to communicate with customers, suppliers, and partners, and insider threats remain a challenge, IT decision makers should adapt and plan how to protect their organization from these new attack vectors.
Join our CEO and Chief Architect to learn more about:
1. How these tools are being adopted across the enterprise
2. What are the specific security risks they pose
3. How you can effectively manage this new level of complexity, and close the gaps
Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and CognitiveAug 20 20194:30 amUTC32 mins
Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
Scott Tye (AE), Jenny Ngo (SE), Sridhar Devarapalli (PM)Aug 20 20194:30 amUTC49 mins
Security threats have become more sophisticated and in combination with new application and cloud deployment models adding to existing complexity have caused more than 3/4 of organizations to be victims of successful cyber attack - don't become the next victim!
Join this session to learn common use cases and best practices for implementing VM microsegmentation in the hybrid cloud world. Nutanix engineers cover design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
Jarosław Biniek, SUSE, Przemysław Celiński, ncNETcomAug 20 20198:00 amUTC90 mins
Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat drugiego spotkania to "DevOps jest prostsze niż myślisz - jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?"
- Co jest nam potrzebne (software / hardware, minimalne zasoby do testowego klastra)
- Rekomendacje odnośnie konfiguracji produkcyjnej i skalowania; jak dobrać storage pod kontenery
- Jak się zabrać do instalacji (konto na SUSE.com, jak pobrać software, po co nam dokumentacja, co trzeba przeczytać), na co zwrócić uwagę przy instalacji i konfiguracji (konfiguracja klastra, tworzenie własnego repozytorium dla kontenerów)
- Propozycje zastosowań (od uruchomienia sklepu internetowego w architekturze mikrousługowej po SAP HANA i SAP Data Hub w kontenerach)
- Pokaz jak zrealizować praktycznie DevOps stosując SUSE CaaS Platform w połączeniu z darmową wersją GitLab
- Silne strony SUSE CaaS Platform (kwestie automatyzacji, łatwości użycia, bezpieczeństwa).
Część pokazowa przygotowywana jest we współpracy z partnerem SUSE, firmą ncNETcom.
Kelvin Murray, Sr. Threat Research Analyst, WebrootAug 20 201910:00 amUTC60 mins
** This is an EMEA focused webinar **
When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.
Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.
Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
Meera Rao, Senior Principal Consultant, Synopsys, Brandon Dunlap, Moderator, (ISC)²Aug 20 201912:00 pmUTC60 mins
Demands for more secure software and more rapid application development have led to the emergence of DevSecOps. DevSecOps maturity requires a risk-based approach to adding security activities, increasing depth, and improving testing governance. The best strategy is to shift from a reactive to a proactive security approach that injects security at the right time and place with automated continuous testing. This presentation covers these aspects of automated continuous testing:
1. Practices to avoid
4. When and where to use automated testing
5. Best practices for implementing and improving continuous testing throughout the development life cycle
John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, GigamonAug 20 20195:00 pmUTC37 mins
IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.
With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.
Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;
• Enhancing Infrastructure resiliency and availability
• Reducing operating and monitoring Costs
• Improved operation efficiencies and cooperation between IT teams
• Step by step GUI configuration examples
Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, KaminarioAug 20 20195:00 pmUTC75 mins
Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?
This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.
•Running a database on a VM and connecting it to Kubernetes as a service
•Running a database in Kubernetes using a `stateful set`
•Running a database in Kubernetes using an Operator
•Running a database on a cloud managed service
Register today to learn (almost) everything you need to know about stateful workloads on Kubernetes
Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSetsAug 20 20195:00 pmUTC60 mins
Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.
Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.
During this webinar, we will discuss:
-The modern data architecture required for dealing with extreme data
-How StreamSets enables continuous data movement and transformation across the enterprise
-How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
-A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
David Shaw, Chief Science Officer at Nasuni | Anne Blanchard, Senior Director of Product Marketing at NasuniAug 20 20195:00 pmUTC13 mins
On May 7, 2019, the city of Baltimore was hit by a ransomware attack - code named “RobinHood.” Hackers used remote encryption to lock down the city’s file servers and demanded payment of 13 bitcoin in exchange for keys to release them. The city immediately notified the FBI and took systems offline to keep the attack from spreading, but not before it impacted over 10,000 computers and multiple city departments. The cost? An estimated $4.6M in data recovery costs alone. All told, the cost to restore data, the cost of new systems that would prevent an immediate new attack, and the lost revenue totaled over $18M.
Scenarios like this are causing many companies to reexamine their plans for disaster recovery in order to ensure business continuity, not just in the face of equipment, software, or network failures, but also in the event of a ransomware attack.
Anne Blanchard, Senior Director of Product Marketing sat down with David Shaw, Chief Science Officer at Nasuni, to discuss the Baltimore incident, tips on how to avoid a ransomware attack, and how to dramatically decrease business downtime and cost following an attack.
Pablo Alvarez-Yanez, Director of Product Management, DenodoAug 21 20191:30 amUTC47 mins
Digital Transformation, even though a cliche, is definitely on top of every CEO's strategic initiative list. At the heart of any digital transformation, no matter the industry or the size of the company, there is an API strategy. Application programming interfaces (APIs) are the connection points between one application and another, and as such, they enable applications to build on each other, extend each other, and work with each other. Taken together, APIs represent a thriving ecosystem of developers that is showing no sign of slowing down.
Attend this webinar to learn:
- How data virtualization greatly enhances the capabilities of an API
- How data virtualization works as a service container, as a source for microservices and as an API gateway
- How data virtualization can create managed data services ecosystems in a thriving API economy
Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, CitrixAug 21 20199:00 amUTC42 mins
In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.
Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.
What's driving cloud investments today?
Improving the speed of IT service delivery
Greater flexibility to react to changing market conditions
Enabling business continuity
Improving customer support or services
Watch this webinar to find out how you can:
Deliver easy, secure access across devices
Connect people and places, securely
Reduce time to market for new products
Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:
•Observations and recommendations across the six phases of incident response
•Top takeaways for building a solid IR Plan and capability
•Breach Simulations Kits and using these resources to run data breach tabletop exercises
Matt Hebb, Product Marketing, Data Center Systems, Western DigitalAug 21 20195:00 pmUTC18 mins
As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.
We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.
In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
>How to simplify your VMware administrative tasks
>How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWSAug 21 20196:00 pmUTC55 mins
Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.
In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).
• How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
• Technical considerations and best practices for SAP HANA and cloud migration.
• Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
DataON, Microsoft, Intel, Florida PolytechAug 21 20197:00 pmUTC60 mins
With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.
Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.
Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.
The webcast will explore the following topics:
• How to successfully plan for an upgrade and migration to Windows Server 2019
• What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI
• How Florida Polytech successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.
DataON – Howard Lo, Vice President of Sales & Marketing
Microsoft – Rob Hindman, Senior Program Director of Windows Server
David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, GigamonAug 22 20191:00 amUTC54 mins
Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.
What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.
Join Gigamon and ActualTech Media in this webinar and learn how to:
- Unleash visibility to secure and optimize your network
- Discover applications that you didn’t even know were running on your network
- Increase overall performance of your network and shared components
- Spot potential security vulnerabilities before they become a problem
Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.
Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, InformaticaAug 22 20194:30 amUTC58 mins
With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.
Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.
This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.
As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales EngineerAug 22 20194:00 pmUTC58 mins
As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.
What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.
We’ll address the following questions:
- What does DFIR readiness include? What frameworks exist?
- What security tools and technologies are essential for DFIR?
- How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
- How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?
Meet Your Hosts:
Danielle Russell, Group Product Marketing Manager
Aaron Genereaux, Sales Engineer
The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSetsAug 22 20195:00 pmUTC34 mins
Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.
During this webinar, we will discuss:
-How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.
-We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla NetworksAug 22 20196:00 pmUTC60 mins
Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
1. Defend against Cyberattacks
2. Ensure Privacy Safeguards
4. Minimize Reputational Risk
5. Earn the Trust of your Customers
Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.