Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
In this webinar you'll learn how SUSE has worked with Microsoft to enable HA clusters on Azure. Learn how to launch via the Azure Resource Manager; and how this applies to even the most demanding enterprise databases such as SAP HANA.
Nutanix 101: An introduction to the nuts and bolts of Nutanix and Prism Management
Nutanix Overview - Naming conventions and agnostic hardware and hypervisor support
Nutanix technical detail - where and how the software runs and handles data
Prism Management Demo - Detailed run through the core entities in Prism
Banks, credit unions and insurance companies may have differing business models, but they all have a common goal: better conversion and retention rates.
Fortunately, better customer onboarding usually translates to better conversion and retention. For this reason, organizations continue to invest in digital technologies to streamline operations and eliminate time-consuming online interactions in areas such as new account opening, loan origination and policy applications.
Those first information-intensive interactions, of course, are the most critical: you usually only get once chance to win a new customer’s business. But winning is only part of the equation. What if you could win—and wow—customers from those first moments and keep them engaged throughout the onboarding process?
Mark your calendars for this upcoming webinar, where industry experts will share six best practices to help your organization win and wow customers:
• Easy—Enable instant image and data capture via web and mobile technology
• Accurate—Extract data from pictures of physical documents without error-prone manual entry
• Automated—Invest in workflow tools to automate and track completion of process steps
• Visible—Empower staff and customers with process transparency and timely communication
• Consistent—Ensure data is complete and integrated across internal systems
• Efficient—Meet expectations for speed, while effectively managing regulatory risks
Speakers will include:
•Sheryl Kingstone, Director, 451 Research
•Sarah Johnson, Industry Solutions Architect, Kofax
•Jim Marous, Owner and Publisher, Digital Banking Report
File systems are the heart of most organizations. They’re how critical unstructured data assets are stored, organized, and shared. But with files exploding in size and quantity as well as the cloud offering potentially cheaper and more scalable storage than traditional NAS, a new set of requirements is needed. Is your file system ready? Find out in this live webinar.
Healthcare providers have specific and unique requirements around storing and accessing sensitive patient data and meeting HIPAA compliance. But this shouldn’t mean you can’t take advantage of the cost and scalability benefits of the cloud. In this webinar, we’ll discuss four common questions healthcare providers ask when they’re thinking of moving to the cloud and the corresponding strategies to employ a hybrid cloud approach.
Consumers aren’t actually impressed by just a "Hi!" And as deluged by content as they are, they know they have the luxury of simply ignoring you. To catch their interest, you need to demonstrate that you know what they want, and you can deliver it.
In other words, hyper-personalization. Innovations in marketing tech, like AI, machine learning, and shopping bots, enable you to microsegment all the way down to a customer’s purchase and interest patterns to develop messaging that triggers powerful interest, creates deep engagement, and drives sales.
Learn more about the tech you need, the strategies that win, and how to deliver the “you know me” satisfaction that keeps customers coming back for more when you join this VB Live event!
Don’t miss out!
* Why broad segmentation is no longer enough
* How shopping bots, AI + more enable one-to-one marketing
* How psychographics, lifecycle data, and multi-channel behavior can build customer profiles
* How engagement, experience and retention improve one-to-one marketing
* The importance of not being creepy
* The trends and future of hyper-personalization
* Cherie Yu, Head of Local Marketing, Lyft
* Dr. Martin Prescher, CTO of AutoGravity
* Stewart Rogers, Direct of Marketing Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Agile works well for small, co-located teams that can hover around sticky notes on a Kanban board, and collaborate on-demand. But as initiatives become more complex, and teams become dispersed, Agile can be difficult to scale across the enterprise.
What’s missing in Agile practices today is the ability to see the whole picture. With user stories as the source of record for an application, it’s hard to connect all the dots to see the complete functionality of a feature or capability. Think about the new team who will be developing additional features on that capability - where can they learn everything it does today? How will they know the impact their changes will have on that capability or potentially other capabilities? How will they collaborate on those changes and get them reviewed in a timely manner? How will your business stakeholder understand the impact of new those changes to the overall business process? Storyteller provides a centralized reusable searchable repository of exiting business and technical process models and requirements (business, non-functional and regulatory). In addition we also offer rich visualization, collaboration and review functionalities. These base capabilities are being used today to address the questions above. And - we do it in a way that everyone can understand from Business Stakeholders down to developers and testers.
Storyteller is a key player in Enterprise Agile. We bridge the business gaps in the current agile process. For companies struggling with Agile Transformation, we providing guardrails around writing user stories and feature decomposition. Project teams can save time and effort by using our user story and test plan generation which can them be automatically synched over to ALM tools. We are also a key player in the BizDevOps chain by providing that upfront business alignment so what is produced though “Dev” and delivered and maintained by “Ops” is exactly what “Biz” wanted.
Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?
Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:
•Optimal application experience
•Secure and authorized connectivity
•Third party network access and integration
•Local guest services like Wi-Fi
It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.
With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
Bpm'online invites you to a free webinar “Adding intelligence to your Digital Transformation process: driving innovation and flexibility” with Brent Leary, one of the most influential CRM industry experts, as a guest speaker.
Today 87% of businesses treat Digital Transformation as their competitive opportunity, however, only 10% of companies describe themselves as fully digital.
Bpm’online has invited Brent Leary, one of the most regarded industry experts, to share his expertise on how to tackle the challenges of Digital Transformation and how intelligent technology impacts the future business landscape.
REGISTER FOR THE WEBINAR AND LEARN:
• Best practices in strategy execution: how to upgrade your Digital Transformation strategy with Artificial Intelligence.
• How companies will have to adjust and adopt new ways of thinking to stay connected with customers and serve them moving forward.
• Why AI is destined to change how businesses engage with customers forever and how to respond to this change.
• How intelligent technology can enrich your customer engagement strategy by providing profound insights and better workflow visibility.
• How today’s intelligent CRM solutions are driving growth for organizations from various industries.
Featured Guest Speaker: BRENT LEARY, Co-founder and partner of CRM Essentials LLC
Co-presenter: MATT THARP, Chief Evangelist at bpm’online
Don’t miss out the opportunity to acquire extensive knowledge on how to accelerate your time-to-strategy execution with intelligent technology powered by AI from one of the most regarded industry experts!
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organisations to prepare for the GDPR
- What the consequences of the breach could be
While the top-level forecasts for colocation are rosy, a closer analysis points to significant disruption ahead. The opportunities for providers will be uneven but those that adapt will carve a profitable role for themselves.
This session will delve into customer research on changing patterns of demand and emerging requirements, and will answer questions such as:
•What drives customers to colocation today and what will attract them in the future?
•How can providers remain relevant?
•How can they compete against cloud and other colo providers?
Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW
In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!
Join our webinar to find out...
>How businesses can monetise the internet of things in the long term
>What skills they need and where to find them
>How to address fundamental security considerations.
Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.
This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
Yann Palmore, Vice President, Smart Building Solutions, JLL
Ray Moya, COO/CTO, Argent Associates, Inc.
>> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.
>> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.
For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.
Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.
Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.
Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:
- Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.
- Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.
- Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operations Centres'. What do customers say about their experiences working with Watson for Cyber Security and how is it helping security analysts improve response times?
Mike Spradbery, IBM's UK&I Security Technical Leader, will discuss not only the promise of Watson for Cyber Security but the client results that IBM is seeing. Mike will talk live to Brian Jensen, the analyst responsible for Cyber Security during the high-profile Wimbledon tennis tournament, to understand the scale and type of attacks the team saw, and how innovative new technologies like Watson for Cyber Security helped the team keep Wimbledon safe and secure.
As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.
Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
- How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
- A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.
Join this webinar to learn:
• How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
• How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
• Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
• And more
Network engineering and operations teams face a complex, moving target. But unfortunately, they’re typically armed with only a disparate collection of management tools - with little or no integration. Network teams deal with equipment outages, slowdowns, security breaches, inability to reach resources, access denials, and other issues that can be caused by anything from a bad connection to devious hackers.
To address these challenges, we are now offering the 5th suite in the ITOM portfolio – Network Operations Management (NOM). Combining the functionality of Network Node Manager i (NNMi) and Network Automation (NA) and additional suite functionality such as reporting, NOM represents our path forward to managing web-scale networks with their evolving mix of physical, virtual, and software-defined networks.
Join this webinar to get an in-depth understanding about Network Operations Management including:
•Enhanced workflows designed to drive productivity and reduce
•Ongoing capability and content enhancements for both the suite and standalone products
•New licensing models to enable upgrades at an average of half the cost of a la carte purchases
The cloud has transformed business and IT. By moving to the cloud, businesses are rapidly changing to become faster, innovative, and more connected. Many organizations are starting to embrace a multi-cloud world. However, this has added architectural complexity in ways not previously considered. Where and how you choose to deploy an application in the cloud could become an advantage or a liability.
Join us for an informative webinar where you will learn:
•The emerging challenges of multi-cloud environments
•How to reduce complexity with consistent application services for any environment
•Solutions to manage your applications in a multi-cloud world
Eine synchrone Replikation ist für die Verfügbarkeit unternehmenswichtiger virtualisierter und cloudbasierter Anwendungen unverzichtbar.
Wer seine Anwendungen bislang durch synchrone Replikation mit einem Recovery Point Objective (RPO) von 0 Minuten schützen wollte, musste auf komplexe und teure Speicherlösungen zurückgreifen.
Jetzt bietet die synchrone Replikation von Tintri die Vorteile ohne die Komplexität, und das mit einfacher Einrichtung, Failover mit einem Klick, unkompliziertem Betrieb und allen Leistungsvorteilen von Tintri VM-Aware Storage (VAS) für virtualisierte und Cloud-Infrastrukturen.
In diesem Webcast zeigen wir Ihnen u. a.:
- wie Sie Ihre Anwendungen mit einem Recovery Point Objective (RPO) von 0 schützen können,
- wie eine einfache Administration von Notfallwiederherstellung und Datenschutz aussehen kann,
- eine Live-Demo der synchronen Replikation mit Tintri.
The cost and complexity of traditional enterprise storage are exacerbated when it comes to data protection. Every piece of data written turns into 15 or more copies for backups, disaster recovery, testing, etc. There are costs for onsite and offsite infrastructure, the corresponding software licenses, all the integration, and management. How do you eliminate all of this? Join us to learn about a fundamentally different approach to enterprise data storage and protection that removes significant cost and complexity from how you manage and access your data.
Cloud-based file applications like SharePoint and OneDrive for business mean any document in your company is seconds away from being shared to the world with a unique URL that takes people directly to the file.
Given this, how do you remain compliant and exert some level of control and accountability over your organization’s documents?
In this webinar, Randy Smith of Ultimate Windows Security will zero in on how the UAL can answer these questions:
-Who viewed this file?
- Who was been downloading an abnormal amount of files?
-When was this file downloaded and by whom?
Sacha Dawes of AlienVault will then show you how AlienVault Unified Security Management (USM) accomplishes all of this and more – such as enriching audit events with geo location based on the ClientIP field, and enabling alerting and reporting on SharePoint and OneDrive events.
Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.
In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?
Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
•Securing blockchain from the edge to the core
•The operational benefits and pitfalls of blockchain technology
•Our 4 step qualification process for blockchain business opportunities:
1.Is there an established business process?
2.Are there more 3 parties involved – i.e. is it a distributed problem?
3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
4.Would automation improve the performance of the process?
The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is a need for cost effective long term retention so that the organization is protected from ransomware. Finding the right balance between these extremes is called hitting the data protection sweet spot. In this live webinar, experts from Storage Switzerland and Carbonite will help you get there.
Surveys show that 61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. Companies are desperately trying to improve their I/O performance to speed-up applications and increase VM density.
The most common performance measurement is IOPS, but is this the best metric?
IOPS depends on a number of variables, including the type of workload being simulated, read/write percentages, sequent/random percentages and block size. Most importantly, IOPS doesn’t indicate the response time.
In this webinar, we’ll discuss better ways to measure response times as I/O increases. These metrics will help you understand why some storage products can claim high number of IOPS but still perform poorly when they are used for critical applications in production.
We will also show how a software-defined storage appliance (the Lenovo DX8200D Powered by DataCore) can speed up your applications.
A converged APM/IPM solution can facilitate true root-cause analysis from an end-to-end IT service management (ITSM) perspective, inclusive of both supporting and customer-facing IT services, as well as across multiple service lifecycle stages. In addition, by having all service team members share an easy-to-use interface that is tailored to each of their requirements minimizes learning curves, enhances operational efficiency and ensures user satisfaction by providing a production-grade monitor to IT staff that are working in staging environments.
Attend this webinar to discover how a converged APM/IPM solution can be leveraged effectively in pre-production to eliminate bottlenecks in testing, delays, re-work or increased deployment risk.
SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices.
Join this interactive webinar to learn:
- How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak
- Understand best practices for adapting to the changing environment
Pure Storage's Evergreen™ Storage has changed the way organizations view, pay for, and even think about their storage. Evergreen Storage applies a cloud-like approach to on-premise storage, enabling you to simply subscribe to a storage experience that keeps getting better with age. Imagine buying your storage once, and upgrading it as needed, all without any disruption, and without rebuying any TBs you already own*. Evergreen Storage subscriptions mean you can frequently harness rapid software, hardware, and flash innovation – annually or even faster – with no need to wait for a 4-5 year refresh. In this session we'll go over the basics of Pure's Evergreen Subscriptions and how they can save any organization 30% and more over traditional storage.
In this webinar you will learn:
- Get a subscription to innovation and a storage experience that keeps getting better with age
- Buy your storage once, upgrade it as needed without disruption, and without rebuying any TBs you already own
- Frequently harness rapid software and hardware innovation, with no disruptive refresh cycles
- Learn the basics of Pure's Evergreen Subscriptions and how you can save 30% and more over traditional storage
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:
-The latest trends in DDoS attacks
-The importance of proper network visibility for anomaly & DDoS attack detection.
-Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
With the changing nature of the cyber-threat landscape, companies are now looking at ransomware differently than your typical malware attack. Ransomware can attack your company's infrastructure which in turn can debilitate your day-to-day operations and cause billions of dollars in losses annually. Ransomware is hardly new, but continues to be a very dangerous trend.
With over 30 years of experience, tune into this intriguing fireside chat to hear insights from Arctic Wolf's CEO, Brian NeSmith. In this webinar, Brian will discuss the following:
- Why traditional backup strategies fail
- 5 Things IT should do if exposed
- Preventative measures to ensure your company's data security
Security solutions and users now have to be more smarter than ever before, so don't let a ransomware attack outsmart you. Register today to learn how!
About the Speaker
Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
Storage can be something of a “black box,” a monolithic entity that is at once mysterious and scary. That’s why we created “The Everything You Wanted To Know About Storage But Were Too Proud to Ask” webcast series. So far, we’ve explored various and sundry aspects of storage, focusing on “the naming of the parts.” Our goal has been to break down some of the components of storage and explain how they fit into the greater whole.
This time, however, we’re going to open up Pandora’s Box and peer inside the world of storage management, uncovering some of the key technologies that are used to manage devices, storage traffic, and storage architectures. In particular, we’ll be discussing:
•Storage networking management protocols
•SMI-S – The bread-and-butter of vendor-neutral storage management
•SNIA Swordfish – The new storage management solution gaining widespread momentum
•Software-Defined Storage – the catch-all term for storage that includes architectures and management
There’s so much to say on each of these subjects we could do a full webcast on any one of them, but for a quick overview of many of the technologies that affect storage in one place, we think you will find your time has been well spent.
Join us on September 28th, 2017, for our continuation of the “Too Proud To Ask” series with Cyan, the Storage Management Pod.
This webinar will discuss case studies from customers across healthcare, financial, and manufacturing that underwent transformations to SD-WAN technology. We will walk through the major issues that drove the transformation, and the migration journey for each customer. Beyond significant reduction in WAN Opex, there are common themes of challenges that SD-WAN solves across industries. These include resiliency for critical applications, agile change control, secure isolation of critical assets, and building a cloud-aware infrastructure.
· Key WAN problems for three customers in healthcare, financial, and manufacturing
· Different drivers for SD-WAN (M&A, Bandwidth shortage, long times for change control, lack of app visibility)
· Difference in choices of Hybrid WAN architecture
· Walking through the testing process, pilots and full deployments
While Amazon and other cloud vendors shouldn't predicate their businesses on huge data centers in the middle of nowhere, most IoT applications that require instantaneous response and user interactivity shouldn't be in the cloud, either. With AWS' recent announcement of Greengrass, and Microsoft allowing customers to run its Azure cloud technology directly on their own infrastructure, more organizations are making a move to the edge. So, what does this mean for your business? During this webinar, we'll discuss the future of the edge and how your organization can best leverage it.
Ransomware continues to be one of the most intrusive and pervasive threats today. With organizations of every size and vertical being a potential target, the opportunity exists for traditional MSPs to offer security-as-a-service to help customers protect, detect and respond to such threats.
But, just how bad is the ransomware threat? It's worse than you may think and organizations are not doing enough to combat it.
Hear from industry expert Nick Cavalancia and Garrett Gross, Director of Field Enablement, from AlienVault as they discuss:
- The current state of the ransomware threat
- Common ransomware scenarios, responses, and outcomes
- The opportunity that exists for MSPs to stand in the gap
The fifth generation of mobile network technologies, or 5G, is being rolled out for commercial launch in 2018, with trials already underway around the world. 5G brings on new challenges for regulatory compliance. In this webinar, we will discuss what 5G brings in terms of new capabilities and challenges. We do this through a case study of an SS8 customer who has added 5G to their existing 2G, 3G and 4G services.
Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.
The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.
In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.
The presentation will encompass:
• An overview of the CIS Critical Security Controls, including ongoing updates
• Success patterns organizations have demonstrated for using the controls to their advantage
• How an automation can reduce the staffing load to determine whether controls are in place and effective
• How to prioritize remediation efforts
• Real-world examples of recent attacks that leveraged misconfigured systems
This webcast will include a demo and Q&A session with the speakers.
vCPE and SD-WAN are hot new technologies in networking and are forecasted to drive explosive growth over the next several years. To help understand the opportunity and challenges these technologies represent, Intel is hosting a series of webinars to explore vCPE and SD-WAN in detail. In our first webinar, we will review the technologies, the potential disruption they represent, the deployment strategies and highlight some of the key issues and challenges being addressed. We are also inviting ADI Engineering, an Intel Network Builder partner, to review some of their new vCPE product reference designs, including a discussion on features, performance, market drivers and differentiation.
For next steps, I’ll send out a few meeting invites to review progress on the content development over the next couple of weeks. In addition, Renee Hunsaker, our host and coordinator for the webinar will send out a separate invite for a dry run and to work through logistics.
During a survey recently conducted among security professionals, 90% said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.
Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.
You will also find out:
•How bad is the phishing threat?
•How confident are companies in their phishing responses?
•What solutions are companies using—and which ones should they add?
•How can automation and technology help? Why are humans important, too?
Transformation, despite all the hype, is difficult. People can be stubborn, processes inflexible and technology deeply embedded. In this webinar, Rob Healy, a Principal Consultant at SUSE Partner - Ammeon, will discuss some short real-world DevOps war stories. You will gain tips and techniques on how you and your teams can overcome wicked problems to deliver faster, cheaper and better.
Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
Join our webinar to learn:
•What are containers?
•How to use containers?
•What are the security challenges they introduce?
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
Apple and Google have joined the call for an Augmented Reality future, bringing hundreds of millions of users with them. Given multiple visions for the massive opportunity ahead, how should we divide our efforts? In this webcast, you’ll hear expert opinions from a group living this challenge. VR/AR Association Marketing Committee Chair John Buzzell and YOU ARE HERE technology lead Ricardo Olivo will reveal their journey – from Vuforia and HoloLens to ARKit and beyond – covering use cases, technology insights, hardware challenges and more. You’ll learn where to place your bets, and how to make the most of this transition. This session will also include 30 minutes of Q&A to help you make sense of your VR/AR options.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.