Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Storage Switzerland, KeepItSafe, VeeamRecorded: Feb 15 201917 mins
Most data centers still use a legacy DR strategy of replicating or even physically transporting backups to a dedicated disaster recovery (DR) site, or a secondary site owned by the organization. Disaster Recovery as a Service (DRaaS) delivers a compelling alternative to traditional DR, return on investment (ROI). It eliminates the costs associated with a dedicated disaster recovery site like paying for and equipping the site. Organizations though are hesitant to transition to DRaaS following the “if it ain’t broke, don't fix it” philosophy.
In this live 15 minute webinar join Storage Switzerland, Veeam and KeepItSafe to learn how to transition from a legacy DR strategy to DRaaS without risking data protection downtime.
In 15 minutes, we cover the areas critical to success:
1. DRaaS Software selection
2. Cloud Provider selection
3. Creating and executing a transition plan
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at DateraRecorded: Feb 14 201956 mins
Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.
Datera is the only true, software-driven data services platform that:
•Powers modern application environments at global scale
•Provides game-changing data orchestration and automation with enterprise-class performance
•Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
•Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales EngineerRecorded: Feb 14 201956 mins
Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.
Join this webcast to learn:
- How fileless attacks work and how they evade detection by most traditional antivirus software
- The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
- Why HIDS is an essential security control for threat detection and compliance
- How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response
Group Product Marketing Manager
Sr. Sales Engineer
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Feb 13 201960 mins
Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss, site outages, revenue loss, and potential non-compliance with regulations.
But here’s the good news: centralizing data protection in the cloud can make all the difference. That’s why you should join our webinar and hear from storage expert, George Crump, from Storage Switzerland and Druva’s W. Curtis Preston, Chief Technologist, as they discuss:
• Why protecting a distributed data center is challenging with traditional methods
• How a cloud-centralized backup strategy can be a game changer for your organization
• How Druva can help you drastically improve data protection quality, reduce costs, and simplify global management and configuration?
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Feb 13 201937 mins
Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.
Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.
- Trends affecting your attack surface
- Need for vulnerability management program
- What should you look for in an external vulnerability scan report
Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red HaRecorded: Feb 13 201944 mins
In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.
Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.
During the webinar, we’ll discuss:
> Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
> The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
> Why hyperconverged infrastructure operational processes are more effective.
> How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - TeradiciRecorded: Feb 13 201935 mins
PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
•Support for Active Directory, including support for sub-domains
•User Roles: System Administrator and Administrator roles
•Web Interface performance improvements
Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, NasuniRecorded: Feb 13 201936 mins
Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.
With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:
- How the business strategy drove TBWA to the cloud
- What key decisions enabled them to reduce costs and meet capacity requirements at the same time
- How they went about a worldwide roll-out of their cloud storage strategy
- Why multi-cloud capability is important
Jennifer Kotzen, Product Marketing Lead, SUSE Application Delivery SolutionsRecorded: Feb 13 201950 mins
To thrive today, businesses must act on opportunities, solve problems, and respond to the needs of customers, partners, and employees more quickly than ever before. Increasingly, applications are the vehicles through which these critical needs are addressed, and in this digital economy the key to increasing business agility is no secret: enterprises must deliver applications faster. But how is it done?
Join us in this webinar for an executive level overview of the path your business can take to reduce application delivery cycle times and increase business agility. We’ll discuss emerging container technologies, cloud-native application architectures, DevOps processes, and ways you can use them together to effect the change you need. Application delivery transformation is as exciting as it is important – start your journey with us now!
Aslam Ramos, SUSE Sales EngineerRecorded: Feb 13 201955 mins
Segurança na gestão de sistemas com Live patching e SUSE Manager
Participe deste webinar e descubra como é possível aumentar a segurança do seu ambiente Linux e SUSE Linux com as ferramentas da SUSE, sistema operacional Linux líder para aplicações SAP e SAP HANA. Como estas ferramentas podem ajudar você na continuidade dos negócios e na redução de custos, diminuindo o tempo de espera, aumentando a disponibilidade dos serviços, aprimorando a segurança e a conformidade, utilizando os recursos de gestão de outros sabores de Linux e o SUSE, utilizando o SUSE Manager e do módulo SUSE Live Patching para correção do Kernel, sem necessidade de reboot.
Johna Till Johnson, CEO & Founder, Nemertes ResearchRecorded: Feb 12 201949 mins
Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
• Who are the right providers?
• What are the critical factors to consider in selecting one?
This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
Nathan Rader, Director of NFV Strategy, CanonicalRecorded: Feb 12 201930 mins
The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
• Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
• Redevelopment path of VNF for containers
• Laying the groundwork for container technology: proactive planning and prep
• The impact of containers on strategy for 5G, edge computing, AI, and blockchain
• Components for core certifications, portability and kubernetes distributions
• Use cases and deployments
Parker Sinclair Sales Engineer, Druva Inc.Recorded: Feb 12 201920 mins
Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?
Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!
During this demo you'll learn how to:
- Provide global protection for enterprise server and virtual workloads
- Reduce total cost of ownership (TCO) by up to 60%
- Isolate and quickly restore data during infrastructure attacks
- Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
Brandon Dunlop, Moderator, (ISC)², Matthias Maier, EMEA, Director of Product, SplunkRecorded: Feb 12 201962 mins
Every organisation can, and at some point will be breached. Gone are the days where investing only in preventive security technologies such as firewalls, endpoint protection and proxy servers were considered ‘state-of-the-art’. Instead, security best practices have evolved to build capabilities that detect attacks early, and to respond if all detection and prevention measures have failed. Today’s modernised approach is essential in helping the business recover quickly after a major attack - and helping the CISO keep their job.
So, your technologies have evolved, but has your approach to data collection? Do you have the right data for detection and response - or do you need to adapt for the future?
Join this webinar with Splunker, Matthias Maier to walk through 20 security use cases already used by leading organisations. You’ll hear the most relevant questions for each use case, and discover which device or application within your infrastructure can be used to find the answers. Forty minutes later, you’ll be set to take away your learnings, validate them in your own environment, and identify the most relevant gaps that need to be addressed for your business.
Daniela Fusaro, Senior Solutions ArchitectRecorded: Feb 8 201920 mins
Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.
Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.
Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.
Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.
Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.
An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.
Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.
Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
Dinah Davis, VP Research & Development - Arctic Wolf NetworksRecorded: Feb 7 201937 mins
Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.
However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?
In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:
- What happens when a ransomware is exploded in a computer, with a demo
- How do you detect and respond to a ransomware attack?
- What is coming next in the world of ransomware?
To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
About our key speaker:
Dinah Davis is the VP of R&D at Arctic Wolf Networks, responsible for the development of the AWN CyberSOCTM product. Dinah holds an M. Math in cryptography from the University of Waterloo. She has over 16 years of experience in the tech industry with time spent as a Security Software Developer at the Communications Security Establishment Canada and BlackBerry, and as a manager at TrustWave and D2l. Dinah is also the founder of Code Like a Girl, a publication whose goal it is to change society’s perceptions of how women are viewed in technology, which has over 36,000 subscribers and a vibrant online community.
Oracle + Talari NetworksRecorded: Feb 7 201961 mins
What are the realities of easily implementing reliable and secure UCaaS services? Featuring Riverside Transport, RingCentral and Analyst Lee Doyle share a first-hand customer, partner and analyst point of view.
•Riverside Transport details UCaaS synergy from failsafe SD-WAN technology and high-value Cloud Communications applications.
•Analyst Lee Doyle’s view on why the Cloud Communication services market is important and how it can be a money-saving option for enterprises.
•Deploying reliable UCaaS applications including Voice over IP (VoIP), SIP trunking, and online collaborative workspaces.
Mike Harding, Product Manager - Microsoft Storage Solutions, HPERecorded: Feb 7 201952 mins
Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
Pascal Beurel, Solutions ArchitectRecorded: Feb 7 201931 mins
La plupart des équipes opérationnelles de sécurité ont une compréhension globale de ce qui transite sur les réseaux. Cependant, la majorité n’ont pas une visibilité précise des applications qui consomme les ressources. Alors que les budgets de sécurité sont réduits au maximum, les entreprises doivent lutter pour supporter une demande accrue. Les inefficiences font souvent que tout le trafic est analysé et inspecté par tous les outils de sécurité du réseau, que le traffic soit pertinent ou non.
Tandis que de nombreux administrateurs concentrent leurs efforts sur les outils de sécurité et leurs outils SIEM, l’acquisition du trafic pertinent est souvent négligée. Aujourd'hui, le centre d'opérations de sécurité (SOC) dépend énormément de sa capacité à collecter, corréler et analyser les événements réseau afin d'identifier et de réagir rapidement aux menaces à la sécurité. Mais l'accès aux trafic approprié et pertinent sur l'ensemble du réseau et sans surcharger les outils peut s'avérer être un réel défi.
L’approche Gigamon avec la fonctionnalité « Application Intelligence » permet de découvrir l’ensemble des applications transportées dans un réseau et de sélectionner uniquement les applications sensibles et utiles pour les outils de sécurité. Dans un contexte critique de sécurité, cela est particulièrement efficace car les dispositifs de sécurité recherchent souvent « l'aiguille dans la botte de foin»; c’est-à-dire : identifier la séquence unique de paquets ou de flux provenant de l’ensemble tu trafic et qui contient les menaces
Rejoignez-nous pour comprendre comment tirer meilleur parti de votre réseau pour améliorer votre efficacité de vos outils de sécurité.
Andrew Sullivan, Technical Marketing Manager, Red HatRecorded: Feb 6 201945 mins
Given the current focus on digital transformation, companies are experiencing mounting pressure to modernize datacenters and cloud-based infrastructure, and to implement more agile processes. Moving to a modern datacenter can help your organization remain competitive and relevant, but it isn't easy. Manual processes, a lack of control, separate infrastructure, and inefficient deployment can make it difficult.
Red Hat® Virtualization can help. It’s an open software-defined, easy-to-use, efficient infrastructure and centralized management platform for virtualized workloads. Built on Red Hat Enterprise Linux® and Kernel-based Virtual Machine (KVM) technologies, Red Hat Virtualization offers a high-performing, highly-available platform that helps businesses have a stable infrastructure that easily scales.
Join this webinar, where we’ll cover these topics:
> Red Hat Virtualization features, use cases, integrations, and partners, which allow you to build a streamlined, reliable environment with mixed workloads.
> Virtual-to-virtual (V2V) conversion tooling, helping you more easily migrate workloads from other hypervisors.
Stan Hubbard, MEF; Pascal Menezes, CTO, MEF; Craig Easley, President, CEA; Sam Hurrell, CEO, Perpetual SolutionsRecorded: Feb 6 201940 mins
SDN and NFV technologies are critical to the success of network and service transformation for communications service providers and enterprises. But the skills necessary to achieve transformation results are scarce. A recent MEF and Vertical Systems Group survey ranked engineering expertise and technical resources as the No. 1 business challenge for migrating to cloud-centric, dynamic network services. Research by SDxCentral, Cartesian, and others have identified SDN and NFV skills shortages as the major barriers to success. MEF's vendor-neutral SDN/NFV professional certification is the only industry accreditation recognizing the technical depth that is required in these technologies to address organizational skills gaps, accelerate transformation initiatives, and ensure competitiveness now and in the future.
Attend this webinar to learn about:
* Transformation: The importance of SDN and NFV to network transformation strategies
* MEF 3.0: The need for SDN and NFV expertise for those companies planning and implementing the MEF 3.0 global services framework
* SDN Federation: Why MEF SDN/NFV certified professionals will play an instrumental role in enabling successful inter-carrier SDN federation
* The MEF-SDN/NFV Exam: The target audience, what we cover, and how we compare against other industry certifications
* MEF-SDN/NFV and MEF-CECP: Why existing MEF-CECPs should consider MEF-SDN/NFV
Ollie Sheridan, Principal Security Solutions Engineer, CISSPRecorded: Feb 6 201932 mins
Whilst many users will focus their efforts on the Tools and their SIEM tools, the acquisition of this traffic is often neglected. Today’s Security Operations Centre (SOC) depends heavily on the ability to collect, correlate and analyse network events to quickly identify and respond to security threats – but getting access to the right traffic data from across the network, and without overloading the system, can be a challenge.
Most Security Operations organizations have a broad understanding of what applications are running on their network. However, many have no visibility into which specific applications are consuming resources. While Security budgets are stretched thin, organizations have to struggle to support increased demand. Inefficiencies often result in all traffic being analysed by all network security tools, whether it is relevant or not.
Application Intelligence provides specific information about all the applications streaming through a network. In a security context, this is especially useful because security appliances are looking for the “needle in the haystack”; that is, to identify the one single sequence of threat packets or flows from the entire mass of network flows.
Join us to understand how you can better utilise your network and security tools to protect your network infrastructure and ensure your end-users receive the best service.
Ashish Sonkusare, Leader, SAP Digital Transformation at HCL Technologies & Kelly Harris, Sr. Content Manager, BrightTALKRecorded: Feb 5 201947 mins
This webinar is part of BrightTALK's Ask the Expert Series.
After the hype created by Internet of Things (IOT), digitization of everything has become a norm. Digitization would become a competitive advantage in every aspect of running a successful organization. Be it Manufacturing, Sales and Marketing, Customer Experience, Supply Chain, Finance & Operations, Human Capital, Strategic sourcing; every single function in an organization is going to undergo this massive change and transformation. Most of us are still trying and struggling to understand how profound this change would be and what will it mean in terms of providing additional business capabilities to companies. The impact of this change on the organizations can be both positive as well as negative.
Join this live Q&A with Ashish Sonkusare, Leader, SAP Digital Transformation at HCL Technologies, and Kelly Harris, Sr. Content Manager at BrightTALK, for an in-depth look at enterprise architecture and infrastructure, and digitizing your supply chain.
Christine McMonigal, Intel; J Metz, Cisco; Alex McDonald, NetAppRecorded: Feb 5 201961 mins
“Why can’t I add a 33rd node?”
One of the great advantages of Hyperconvergence infrastructures (also known as “HCI”) is that, relatively speaking, they are extremely easy to set up and manage. In many ways, they’re the “Happy Meals” of infrastructure, because you have compute and storage in the same box. All you need to do is add networking.
In practice, though, many consumers of HCI have found that the “add networking” part isn’t quite as much of a no-brainer as they thought it would be. Because HCI hides a great deal of the “back end” communication, it’s possible to severely underestimate the requirements necessary to run a seamless environment. At some point, “just add more nodes” becomes a more difficult proposition.
In this webinar, we’re going to take a look behind the scenes, peek behind the GUI, so to speak. We’ll be talking about what goes on back there, and shine the light behind the bezels to see:
•The impact of metadata on the network
•What happens as we add additional nodes
•How to right-size the network for growth
•Tricks of the trade from the networking perspective to make your HCI work better
Now, not all HCI environments are created equal, so we’ll say in advance that your mileage will necessarily vary. However, understanding some basic concepts of how storage networking impacts HCI performance may be particularly useful when planning your HCI environment, or contemplating whether or not it is appropriate for your situation in the first place.
Brandon Dunlap, Moderator, (ISC)², David Mount, Cofense, Mollie MacDougall, CofenseFeb 19 20191:00 pmUTC60 mins
New year. New resolutions. Every year we make the pledge to eat healthier and exercise more. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session you’ll hear about 10 resolutions for your phishing defense programs that will make your organisation more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
Sarah Beaudoin, Product Marketing Manager, DruvaFeb 19 20194:00 pmUTC44 mins
As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.
Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
- Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
- How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
- How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / IntelFeb 19 20194:00 pmUTC60 mins
Workloads are shifting across platforms that span from entry-level to extreme performance.
Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.
This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:
•Simplify Network Evolution using platforms verified as Intel® Select Solutions
•Get on faster, more efficient deployments using tested white box servers
•Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO TechnologiesFeb 20 20196:00 pmUTC75 mins
FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.
The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.
Join this live FCIA webcast where you’ll learn:
- How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
- The evolution of the FICON protocol optimizations
- How FICON adapts to new technologies
Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, DateraFeb 21 20195:00 pmUTC105 mins
Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.
Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.
What you will learn from this webinar:
• Architecting your data center for high-performance
• Ease of deployment and management
• Advanced automation and future-ready choice to orchestrate data for VMs
Kamesh Pemmaraju, Head of Product Marketing at Platform9Feb 21 20196:00 pmUTC75 mins
Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.
Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.
Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:
1.Get up and running with Kubernetes in an hour
2.Eliminate the management overhead
3.Enable self-service for your developers to deploy Kubernetes applications with a single click
4.Improve collaboration between your developers and VMware admins
5.And much more!
Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
Komal Bhardwaj & Ritesh PatelFeb 21 20196:00 pmUTC60 mins
When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.
In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.
Ritesh Patel - VP Products at Nirmata
Komal Bhardwaj - Principal Product Manager at Citrix
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksFeb 21 20197:00 pmUTC39 mins
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
John Masci, Principal Technologist - Cloud SolutionsFeb 21 20197:00 pmUTC60 mins
Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.
As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.
In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.
This webinar focuses on the following critical topics:
• How your cost, security & governance challenges will change at different stages of cloud adoption
• Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
• Mitigating security risks using risk-based policies, and automated threat detection
• Maintaining compliance against internal and external standards corporate when operating in the public cloud
• How the HyperCloud™ platform can simplify all the above
Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
George Crump, Storage Switzerland and W. Curtis Preston, DruvaFeb 22 20196:00 pmUTC15 mins
If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.
Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:
- What level of protection do cloud services provide?
- Is the provided level of protection enough for the enterprise?
- What does the enterprise need to add to achieve complete protection?
Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product MarketingFeb 22 20197:00 pmUTC60 mins
Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.
Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:
• Steps you need to take to gain full visibility and control to secure your hybrid environment
• How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
• How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 LabsFeb 26 20191:00 pmUTC60 mins
Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.
Join us for this webinar to learn more about:
• Challenges with encrypted traffic and risks to your business
• How to efficiently decrypt and orchestrate traffic to reduce latency
• How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
The demand for additional data storage is growing too fast for traditional storage options to continue to be an affordable solution. Continuing down this path means you'll be forced to increase your budget dramatically in order to keep up with your data needs. However, SUSE’s intelligent software-defined storage solution, powered by Ceph technology, enables academic facilities to transform their storage infrastructure and reduce costs while providing unlimited scalability.
Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- TeradiciFeb 26 20192:15 pmUTC30 mins
Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.
1.What graphics adapters does Cloud Access Software support?
2.What Windows versions does Cloud Access Software support?
3.Can USB devices be used with Cloud Access Software?
4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
5.Can I connect to my Cloud Access Software workstation on a tablet device?
Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
Alessandro Barbieri, VP Product Management at Pluribus NetworksFeb 26 20194:00 pmUTC60 mins
In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.
Sean Leach, Fastly and Sophia Vargas, ForresterFeb 26 20195:00 pmUTC18 mins
Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.
Join this webinar with experts from Fastly and Forrester to learn how to:
- Maximize availability by ensuring sufficient redundancy and failover options
- Maintain visibility and control to guarantee app performance
- Optimize performance across a diverse set of resources, locations and workload types
- Address interoperability and leverage hybrid app components as one dynamic system
Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.
Nathan Swetye - Sr. Manager of Platform Engineering - Cox AutomotiveFeb 26 20196:00 pmUTC62 mins
Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.
In this webinar, Nathan Swetye from Cox Automotive will discuss how they:
-Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
-Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
-Reduced data availability from weeks to hours and developer time by 90%.
Paul Moxon, VP Data Architecture and Chief Evangelist, DenodoFeb 27 20191:30 amUTC57 mins
By 2020, a corporate "no-cloud" policy will be as rare as a "no-internet" policy is today, according to Gartner, Inc. While cloud makes enterprises more flexible and agile, various cloud adoption scenarios such as hybrid cloud, infrastructure modernization and cloud based analytics present a few challenges of their own.
Attend this session to learn:
• Challenges involved with various cloud adoption scenarios
• How data virtualization solves cloud adoption challenges while centralizing data governance and security mechanism
• How companies are using data virtualization to tackle complex modern customer segmentation problems such as “customer genomics”
• Challenges of cloud adoption
• Data virtualization to the rescue
• Product demonstration
Sam Kumarsamy, Senior Product Marketing Manager, GigamonFeb 27 20196:00 pmUTC60 mins
How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.
Join Gigamon to get the latest best practices to:
• Acquire and aggregate all network traffic for better visibility
• Stop duplicate packets from overloading your tools
• Filter traffic to provide the right data to the right tools
• Optimize compliance and reduce risk across your entire IT environment
If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
Storage Switzerland, Virtual Instruments, SANBlazeFeb 27 20196:00 pmUTC60 mins
NVMe storage systems and NVMe networks promise to reduce latency further and increase performance beyond what SAS based flash systems and current networking technology can deliver. To take advantage of that performance gain however, the data center must have workloads that can take advantage of all the latency reduction and performance improvements that NVMe offers. Vendors emphatically state that NVMe is the next must-have technology, yet many still continue to provide SAS based arrays using traditional networks.
How do IT planners know then, that investing in NVMe will truly provide their organizations the benefits of NVMe for their demanding applications and see a measurable return on investment? Just creating a test environment to perform an NVMe evaluation can break the IT budget!
Register now to join Storage Switzerland, Virtual Instruments, and SANBlaze as we look at the state of the data center and provide IT planners with the information they need to decide if NVMe is an investment they should make now or if they should wait a year or more. The key is determining which applications can benefit from NVMe-based approaches.
In this live event, IT professionals will learn
- About NVMe, NVMe Storage Systems and NVMe over Fabric Networking
- The Performance Potential of NVMe Storage and Networks
- What attributes are needed for a workload to take advantage of NVMe
- Why NVMe creates problems for current IT testing strategies
- Why a Workload Simulation approach is the only practical way to test NVMe
- How to build a storage performance validation practice
Chris Marsh of 451 Research & Matt Crawford of CitrixFeb 28 201912:00 pmUTC54 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Edge Computing has been brought in as an approach to solve some of the main challenges of IIoT, but it is capable of much more than handling secure networking. In this webinar, we’ll share new developments in Edge computing and explain how it can be used to perform IIoT-specific, non-networking functions, such as OpenPLC and SCADA firewall.