Hi [[ session.user.profile.firstName ]]

Virtualization

  • Recovering your data from a Ransomware Attack with DataCore
    Recovering your data from a Ransomware Attack with DataCore Sushant Rao, Senior Director, Product Marketing, DataCore Software Recorded: May 25 2017 36 mins
    When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.

    Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.

    At DataCore, we can help your business address these challenges.
  • Ever dream of eliminating your backup licenses?
    Ever dream of eliminating your backup licenses? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: May 25 2017 49 mins
    Now you can. Hybrid cloud storage that delivers on-demand primary storage and offsite backup plus disaster recovery in a single service means you eliminate backup licenses, secondary storage sites and replicating data. Attend this webinar to learn more.
  • Simplify Disaster Recovery Plans with DataON & Windows Server 2016 SDS Solution
    Simplify Disaster Recovery Plans with DataON & Windows Server 2016 SDS Solution DataON – Howard Lo, Microsoft – Ned Pyle, Western Digital – Kris Menon, Mead & Hunt – Joseph Anich Recorded: May 25 2017 54 mins
    With the launch of Window Server 2016, new storage enhancements bring revolutionary new features within reach of every organization with its software-defined feature setup.

    Storage Replica is one of those new features in Windows Server 2016. For the first time, Windows Server offers the peace of mind of zero data loss, with the ability to synchronously protect data on different racks, floors, buildings, campuses, counties, and cities. Before and after a disaster strike, Storage Replica offers you the ability to switch workloads to safe locations prior to catastrophes when granted a few moments warning with no data loss.

    Mead & Hunt is a leading engineering firm that chose a DataON and Windows software-defined solution. They replaced their aging SAN with DataON CiB storage, optimized for Microsoft Windows Server 2016 and Hyper-V in a ReFS environment.

    The webcast will explore the following topics:

    •How Mead & Hunt was able to consolidate and simplify their storage environment, eliminating increasing SAN maintenance costs while increasing performance

    •How Storage Replica in Windows Server 2016 allows you to setup storage-agnostic, block-level synchronous replication between clusters or servers for disaster recovery

    •Best practices on how to deploy Storage Replica, with real-world examples from Mead & Hunt’s deployment


    Presented by:
    DataON – Howard Lo, VP of Sales and Marketing
    Microsoft – Ned Pyle, Program Manager
    Western Digital – Kris Menon, Business Development Manager
    Mead & Hunt – Joseph Anich, Systems Administrator
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife Recorded: May 25 2017 59 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients
    Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients Matt Erich, Dir. of Pre-Sales, Imprivata & Slaven Boskovic, Systems Analyst, Teradici , Recorded: May 25 2017 24 mins
    As healthcare organizations look to improve workflows to enable clinicians to spend more time with patients, IT organizations must find ways to keep patient data secure; while providing convenient access.

    Join us for an informative session on how Imprivata OneSign® Single Sign On and PCoIP Zero Clients have improved clinician productivity and resulted in time savings for IT and medical staff; all while enhancing the security of patient data.

    This open Q&A forum will cover how to:
    •Streamline clinical workflows with No Click Access®
    •Increase security to ensure the protection of electronic patient information
    •Meet healthcare compliance requirements with joint solutions from Imprivata and Teradici
    •Provide a consistent user experience that follows clinicians to the point of care

    Q&A will follow at the end of the session.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife Recorded: May 25 2017 58 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Turning the Table on Hackers through Situational Awareness
    Turning the Table on Hackers through Situational Awareness Jason Hart, CTO Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: May 25 2017 61 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    •What we can learn from Jason Bourne about knowing one's surroundings
    •What we can learn from hackers to better protect valuable data
    •What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
    •How to change our mindset in a new era of a hacker-driven gold rush
  • How to Develop a Container Migration Strategy for your Organization
    How to Develop a Container Migration Strategy for your Organization Eric Sauer, Red Hat Consultant, Architect, PaaS & DevOps Recorded: May 24 2017 49 mins
    In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).

    In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:

    -Evaluate and understand the value and impact of PaaS in your organization
    -Devise a migration vetting process
    -Create a migration plan to optimize business value
    -Use lessons learned from other organizations
  • New Quantum Integration with Veeam
    New Quantum Integration with Veeam Eric Bassier Recorded: May 24 2017 27 mins
    Quantum Announces Unique DXi and Scalar Tape Integration with Veeam - DXi systems now integrated with Veeam Data Mover Service, new Scalar iBlade™ enables Veeam tape creation without separate physical server.
  • What Makes a Storage Solution TRULY  Software-Defined?
    What Makes a Storage Solution TRULY Software-Defined? Scott Sinclair, Senior Storage Analyst, ESG's Enterprise Strategy Group & Ashok Rajagopalan, Head of Product at Datera Recorded: May 24 2017 59 mins
    It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.

    Register for a chance to win an Apple Watch 2.

    As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.

    In this session, we will discuss:

    - What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
    - What benefits your organization should expect from SDS technology
    - What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.

    Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
  • CephFS: A File System for the Future
    CephFS: A File System for the Future David Disseldorp & Jan Fajerski, SUSE Recorded: May 24 2017 58 mins
    CephFS is a scalable clustered POSIX filesystem built atop Ceph's reliable, autonomous, distributed object store. This talk will cover a quick introduction to Ceph and CephFS, its architecture and potential use cases. We will explore some of its impressive features and extensive configuration options. A look on CephFS' future challenges and road-map will conclude this talk.
  • GDPR: Countdown to Day0
    GDPR: Countdown to Day0 Neil Thacker, Forcepoint, Moyn Uddin, Cyber Counsel, Jonathan Armstrong, Cordery, Adrian Davis, (ISC)² EMEA Recorded: May 24 2017 60 mins
    With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.

    Topics for discussion will include obligations to:

    · Maintain a personal data inventory
    · Map Data flow vs. Data Transfer Agreements
    · Incident Response and obligations for mandatory data breach notification
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery Recorded: May 24 2017 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Tech Talk: Security and SD-WAN
    Tech Talk: Security and SD-WAN Derek Granath and Anusha Vaidyanathan Recorded: May 23 2017 48 mins
    The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS Recorded: May 23 2017 57 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • A Case Study on Improving SQL Server Performance 20x with Hyperconverged
    A Case Study on Improving SQL Server Performance 20x with Hyperconverged Sushant Rao, Senior Director of Product Marketing, DataCore Software Recorded: May 23 2017 49 mins
    How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
    In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
  • Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG
    Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG Terri McClure, Senior Analyst; Vaughn Stewart, VP of Product; Joel McKelvey, Infrastructure Solutions Recorded: May 23 2017 35 mins
    Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.

    In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.

    Terri McClure, Senior Analyst, ESG

    Vaughn Stewart, VP of Product, Pure Storage

    Joel McKelvey, Infrastructure Solutions, Pure Storage
  • Oracle Baselines and Benchmarks for the Business
    Oracle Baselines and Benchmarks for the Business Jonas Mason, Senior Consultant & Joe Grant, Principal Architect; House of Brick Technologies Recorded: May 23 2017 43 mins
    Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.

    Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.

    Discover the importance of benchmarks in establishing baselines that:

    1) Facilitate performance troubleshooting
    2) Enable efficient use of existing hardware
    3) Inform the hardware and software requisition narrative

    Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
  • Meet Your Digital Workspace Goals E3: Path to WorkspaceONE using Identity
    Meet Your Digital Workspace Goals E3: Path to WorkspaceONE using Identity Todd Dayton, Principal Systems Engineer, VMware Recorded: May 23 2017 34 mins
    Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.
    In Episode 3, Your Path to Workspace ONE using Identity Manager you will learn:

    The need for identity management as the key component to the digital workspace.
    The role of VMware Identity Manager
    Opportunities to use other identity providers alongside Workspace ONE
  • Extending Real-time Service Assurance with 360o Visibility to Telco Cloud
    Extending Real-time Service Assurance with 360o Visibility to Telco Cloud Anton Basil, Vice President – Technologyand Selvaraj Balasubramanian, Vice President – Products, Veryx Technnologies Recorded: May 23 2017 30 mins
    While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.

    Join this webinar to learn about:
    - Challenges faced by telecom service providers while deploying NFV-based services.
    - Understanding potential bottlenecks in NFV infrastructure.
    - How to diagnose the bottlenecks and overcome them.
    - How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure

    Who should attend?
    - Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
    - Network engineering teams exploring service assurance and visibility tools.
    - Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
    - Application providers and system integrators designing and deploying NFV ecosystem.
    - Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
  • 15 Minute Ransomware Survival Guide
    15 Minute Ransomware Survival Guide Storage Switzerland, Commvault Recorded: May 19 2017 51 mins
    Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault will cover the three P's of Ransomware survival: Prevention, Preparation and Practice. Join data protection experts with decades of experience protecting organization's digital assets.
  • Provisioning New Storage Volumes with Datera
    Provisioning New Storage Volumes with Datera Bill Borsari, Director of Systems Engineering at Datera Recorded: May 18 2017 4 mins
    This video shows how to provision storage volumes with a Datera System. The processes uses the Datera UI.
  • Provisioning New Storage Volumes with Datera
    Provisioning New Storage Volumes with Datera Bill Borsari, Director of Systems Engineering at Datera Recorded: May 18 2017 4 mins
    This video shows how to provision storage volumes with a Datera System. The processes uses the Datera UI.
  • Datera Kubernetes Public Cloud Demo
    Datera Kubernetes Public Cloud Demo Ashok Rajagopalan, Head of Product at Datera Recorded: May 18 2017 8 mins
    In this demo, we will show how easy it is to deploy a Datera cluster and a Kuberenetes cluster in the Google Cloud Platform. Datera is deployed in Google Compute Engine and Kubernetes is installed in Google Container Engine. We will install and configure Datera's Kubernetes persistent storage driver, and then using Kubernetes, deploy and manage a CockroachDB cluster (running in Docker containers). The Datera cluster will serve persistent storage to the CockroachDB and seamlessly provision and scale storage as CockroachDB scales.
  • Simplifying HPC System Software at Scale
    Simplifying HPC System Software at Scale Ed de la Fuente - Intel | Jeff Reser - SUSE May 31 2017 5:00 pm UTC 60 mins
    SUSE and Intel discuss the community approach taken to bringing the Intel® HPC Orchestrator to market and how a validated stack for HPC system software can reduce complexity.
  • Bimodal IT Infrastructure: Your Stairway to the Cloud
    Bimodal IT Infrastructure: Your Stairway to the Cloud James Labocki, Product Owner, Red Hat Cloud Infrastructure May 31 2017 7:00 pm UTC 45 mins
    Predictive analysis, mass provisioning, and building large, scalable clouds can all happen more quickly, less expensively, and with less risk when it's on the right infrastructure.

    In this webinar you'll learn:
    How to stair-step from simple digitization to innovation.
    How to become bimodal—an environment with both traditional and emerging technologies.
    How being bimodal makes you more agile and better able to align with your business priorities.

    You'll leave this webinar knowing why the right infrastructure—Red Hat® Cloud Infrastructure, which includes Red Hat Insights and Red Hat CloudForms—is your stairway to the cloud.
  • Five steps to gain greater than 50 percent TCO savings in storage costs.
    Five steps to gain greater than 50 percent TCO savings in storage costs. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jun 1 2017 5:00 pm UTC 60 mins
    Step 1: stop making copies! Steps 2-5: Implement fully managed hybrid cloud storage. Pay only for the capacity you actually use and eliminate secondary storage infrastructure, corresponding software licenses, management of disparate systems and the endless data copying. This webinar will walk through these five key steps.
  • Setting Up Profiles in PCoIP Management Console for Ease of Management
    Setting Up Profiles in PCoIP Management Console for Ease of Management Paul Barrett, Systems Specialist, Teradici Jun 1 2017 5:00 pm UTC 45 mins
    Looking for the ins and outs of PCoIP Zero Client profile management with PCoIP Management Console? For ease of PCoIP Zero Client management, the software allows you to create profiles that contain a list of the settings you want to apply to one or more groups of endpoints. Once a profile is configured, you can apply the same criteria to a group or schedule for a future date. During this 30-minute webinar you’ll learn the best ways to create, import and manage profiles.

    The demonstration will cover how to:
    •Configure a profile and apply settings
    •Change a profile association and navigate between profile settings
    •Duplicate, re-name, edit or delete a profile
    •Update firmware only for all endpoints
    •Migrate profile properties from PCoIP Management Console 1.x to 2.x

    Q&A will follow at the end of the session.
  • Latest Malware Trends & Attack Vectors
    Latest Malware Trends & Attack Vectors Richard Cassidy, Technical Director EMEA, Cybereason, Adrian Davis, Managing Director, (ISC)² EMEA Jun 2 2017 11:00 am UTC 60 mins
    In this webinar, Richard Cassidy, Technical Director EMEA, and (ISC)² EMEA Managing Director, Adrian Davis will discuss the latest malware trends and attack vectors. The most reported cyber-criminal groups, the latest attack trends (like WannaCry), and best practices for fighting the adversary will be explored. Join us for an up-to-date deep dive into adversary TTPS and how to prevent and respond to attacks using techniques like proactive hunting and SOC analysis and response.
  • Unified Network & ICT Management for Telco/MSP, Cloud and IoT Service Assurance
    Unified Network & ICT Management for Telco/MSP, Cloud and IoT Service Assurance Christopher Kalkhof, Business Development at Infosim, Peter Moessbauer, Strategic Alliances Manager at Infosim Jun 6 2017 3:00 pm UTC 60 mins
    Infosim® StableNet® is a unified network-management solution designed to integrate into existing telco or enterprise network environments built on both modern SDN architectures or legacy physical infrastructures. StableNet helps identify and inventory network devices, provides visualizations of network architectures, and enables management, support, and security for network devices.
  • Turning the Table on Hackers and Breaches
    Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Jun 6 2017 3:00 pm UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • How to Avoid the Top 7 Mistakes Made When  Managing Citrix Performance
    How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance Raymond Otero, Manager of End-User Computing, Anexinet; Srinivas Ramanathan, CEO, eG Innovations Jun 6 2017 4:00 pm UTC 60 mins
    With Citrix XenApp and XenDesktop being two of the most critical and performance-sensitive applications used in enterprise networks today, Citrix performance management is of vital importance for a positive user experience and business continuity.

    Join us for this webinar where we will discuss the top seven mistakes that IT professional make when managing their Citrix-based services as well as the best practices to address and avoid these mistakes to ensure positive user experiences and business operations.

    You will discover how:

    - Performance management is no longer just about monitoring CPU, memory and disk resources
    - When a user complains that "Citrix is slow", it is not always a Citrix issue
    - Built-in tools provided in the Citrix stack are useful, but not always sufficient for managing performance end-to-end
    - Virtual desktops are VMs, but you can't confidently use monitoring tools you've used for virtual servers to monitor virtual desktops
    - You don't always have to involve your experts in problem diagnosis
    - Performance management is more than just about troubleshooting problems
    - You shouldn’t worry about performance management just after you have deployed the Citrix infrastructure
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Gabriela Markette, Senior Marketing Manager Jun 6 2017 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Persistent Containers and Storage for Open Source Modern Applications
    Persistent Containers and Storage for Open Source Modern Applications Daniel Messer, EMEA Partner Solutions Architect & Mike Barrett, Principal Product Manager, Red Hat Jun 6 2017 7:00 pm UTC 45 mins
    Container-native storage offers developers the ability to dynamically provision storage for their modern applications. With the release of Red Hat® OpenShift Container Platform 3.5, enterprises now have the option of persisting their container registry on Red Hat Gluster Storage.

    In this webinar, you'll learn from a Red Hat expert how:
    - To make container registries persistent.
    - Advanced data services, like asynchronous geo-replication, are natively supported.
    - The advanced data services can be used to provide better disaster recovery.
    - To optimize day-2 management operations for container storage.
  • GDPR Compliance Made Easy with Data Virtualization
    GDPR Compliance Made Easy with Data Virtualization Mark Pritchard, Sales Engineering, Denodo Jun 7 2017 4:00 pm UTC 60 mins
    Companies should be gearing up for May 25, 2018 when the General Data Protection Regulation (GDPR) comes into effect. GPDR will affect how businesses that serve the European Union collect, use and transfer data, forcing them to provide specific reasons and need for the personal data they gather and prove their compliance with the principles established by the regulation.

    The regulation is already creating many challenges for companies, including:

    - Ensuring secure access to most current data, whether on or off-premise
    - Consistent security across all data sources
    - Data access audit
    - Ability to provide data lineage

    This webinar aims to demonstrate how data virtualization has surfaced as a straight-forward solution to many of the challenges and questions brought on by the GDPR. It will also include a case study of how Asurion already achieved the desired level of security with data virtualization.

    Join the webinar to learn more about the benefits of using data virtualization to smoothly comply with the GDPR.
  • House your Big Data by the Lake: How Flash Storage Enhances your Oracle Database
    House your Big Data by the Lake: How Flash Storage Enhances your Oracle Database Alex Infanzon, Application Solutions Manager, Pure Storage Jun 7 2017 4:00 pm UTC 60 mins
    Most industry analysts agree that big data warehouses, built on a relational database, will continue to be the primary analytic database for storing much of the company’s core transactional data. These data warehouses will be augmented by big data systems. Even though this new information architecture consists of multiple physical data repositories and formats, the logical architecture is a single integrated data platform, spanning the relational data warehouse and the data lake.

    Join the discussion to find out more about how high performance, high density all-flash storage can help.
  • Automating Bare Metal Infrastructure for Any Workload
    Automating Bare Metal Infrastructure for Any Workload Greg Bruno, VP of Engineering/Co-founder - StackIQ | Frank Rego - SUSE Jun 7 2017 6:00 pm UTC 60 mins
    Join this webinar and learn how you can build server clusters faster for any workload (Hadoop, Docker, Kubernetes, OpenStack, etc.) with Stacki Pro & SUSE.

    When you’re deploying hundreds or even thousands of servers, you cannot leave anything to manual configuration and scripts if you want your cluster up quickly (and correctly). Stacki Pro enables customers to start automating from the beginning allowing then to go from bare metal to a running application in a single step. With Stacki Pro now ported to SUSE Linux Enterprise Server 12 SP2 and certified by SUSE, customers can use Stacki Pro to provision nodes running the latest version of SUSE Linux Enterprise Server.
  • The Role of SD-WAN Managed Services in Today's Enterprise
    The Role of SD-WAN Managed Services in Today's Enterprise Roopa Honnachari, Frost & Sullivan; Paul Ruelas, Masergy and Nav Chander, Silver Peak Jun 7 2017 6:00 pm UTC 60 mins
    SD-WANs enable enterprises to easily use multiple types of network services (MPLS, broadband, LTE) to simultaneously connect users to applications, quickly bring branch offices online and improve overall network and application performance.

    But, finding the right SD-WAN solution for your business can take time. Many enterprises are looking towards managed SD-WAN as a solution to simplify branch network deployments and find the best fit for their business.

    In this webinar, Frost & Sullivan analyst, Roopa Honnachari will share new industry data on managed SD-WAN and will host a discussion between Silver Peak and Masergy experts as they share insights on how managed services can enable enterprises to adopt SD-WAN in a seamless manner.

    Come with questions and join our live Q&A session.
  • Quantum StorNext FlexTier With Microsoft Azure Demo
    Quantum StorNext FlexTier With Microsoft Azure Demo Greg Holick - Director of Cloud Storage Solutions Jun 8 2017 4:00 pm UTC 60 mins
    Quantum’s Greg Holick (Director of Cloud Storage Solutions) will be giving a live demo of StorNext’s FlexTier ability to connect and write data into Azure.

    We will be covering the configuration and the powerful policy engine on how to manage data from an on premise stornext solution into the azure cloud.
  • Cloud Transformation for SaaS and IaaS
    Cloud Transformation for SaaS and IaaS Ariful Huq, Product Management at Viptela Jun 8 2017 5:00 pm UTC 45 mins
    Traditional WAN network infrastructure is breaking the adoption of SaaS and IaaS. Connecting users of an enterprise to application and infrastructure in the cloud requires many transformational changes. For one, the network itself needs to be cloud aware. Next, there needs to be unified management capability for both cloud and on-prem applications. Last, there needs to be a dynamic management of application experience based on realtime network unreliabilities.

    Topics covered:
    - SaaS / IaaS Challenges (ie. Quality of Experience, Onboarding Workflows, Scale, Security)
    - Network Transformation and the Cloud onRamp Solution
    - Benefits for IaaS (ie. Single Solution, Branch to Cloud Connectivity including AWS and Azure)
    - Benefits for SaaS (ie. Improved Experience, Visibility for Office365, Salesforce, Dropbox and more)
    - Use Cases and Case Studies
  • Are storage costs bringing you down?
    Are storage costs bringing you down? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jun 8 2017 5:00 pm UTC 60 mins
    Storage costs are spiraling out of control – provisioning for capacity before you need it, maybe never using it, managing secondary sites for backup and DR. In this webinar, you can learn about a revolutionary way of approaching storage that will reduce your TCO by at least fifty percent.
  • Key considerations for migrating graphics workloads to the cloud
    Key considerations for migrating graphics workloads to the cloud Alex Herrera, Sr. Analyst with Jon Peddie Research & Consultant and Ziad Lammam, Dir. of Product Mgmt., Teradici Jun 8 2017 5:00 pm UTC 60 mins
    Moving to “The Cloud” is becoming a norm these days as it now provides better security and flexibility that enterprises are looking for in today’s ever growing “Big Data” landscape! Organizations with graphics workloads and interactive applications are looking for ways to consolidate their workstations to decrease CapEx and OpEx while ensuring data security for a disperse and mobile workforce.
    Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will talk about on how enterprises can collocate their graphics intensive applications and workstations in the cloud to increase productivity and enhance collaborative working environment for creative professionals and design engineers in various verticals like: Media & Entertainment, Automotive & Manufacturing, Architecture, Engineering, Construction.
    This webinar will introduce key considerations in moving high-performance workstation to the cloud and provide valuable insights including:

    •Physical workstations vs. virtual workstations in the cloud
    •Choosing among cloud workstations - Private, Public or Hybrid
    •What to consider when moving to the cloud

    Teradici's Ziad Lammam will share how Cloud Access Software and PCoIP technology can enable you to securely migrate graphics intensive workloads and applications to the cloud while providing a seamless and “workstation-like” end user experience.
  • Cirque d'Application Development: Containers, Kubernetes and OpenShift
    Cirque d'Application Development: Containers, Kubernetes and OpenShift Steve Pousty, Lead Developer Advocate, OpenShift Online, Red Hat Jun 8 2017 7:00 pm UTC 120 mins
    In this webinar, we'll prepare web and application developers to build applications using containers, Kubernetes, and OpenShift.

    We'll cover:

    - A short introduction to containers and Kubernetes, which are the foundation of OpenShift.
    - Using hands-on exercises, a walk through a variety of applications and uses cases for OpenShift.
    - How easy it can be to deploy your pre-built containers and how health checks to OpenShift can heal your application.
    - Digging into build containers just using a git repository, see an easy application scaling, and do some A/B deployment
    - A complete microservice application with database and polyglot back-end services.

    You bring your curiosity and willingness to code, and we'll teach you all you need to go home and start building pure awesomeness on OpenShift.
  • Detect Ransomware Before it’s Too Late with AlienVault USM Anywhere
    Detect Ransomware Before it’s Too Late with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Jun 13 2017 5:00 pm UTC 60 mins
    By now you've probably heard about ransomware like CryptoLocker, which encrypts your data and demands payment to unlock it. These threats are typically delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server they encrypt files throughout your network that can only be unlocked with a key from the attacker. Spotting infections quickly can limit the damage.

    AlienVault USM Anywhere uses several built-in security controls working in unison to detect ransomware. Join us for a live demo that will show you how USM Anywhere detects these threats quickly, saving you valuable clean up time and limiting potential damage from the attack.

    You'll learn:

    How AlienVault USM Anywhere detects ransomware
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Steps you should take to stop the threat and limit the damage
  • HPE OpsBridge transforms IT to support digital business
    HPE OpsBridge transforms IT to support digital business Sanjay Chaudhary, Sr Product Manager OpsBridge, HPE and Ian Bromehead, Sr Product Marketing Manager OpsBridge, HPE Jun 13 2017 5:00 pm UTC 60 mins
    Transforming IT to support digital business initiatives is a major theme, requiring IT to free up time and resources to serve agile business initiatives.

    Those transformation can be accelerated with solutions that allow teams to gain autonomous operations, put the “O” in DevOps, and raise IT to a stronger business partner.

    Learn how HPE OpsBridge provides such a solution with its new and unique container-based architecture. See how automated monitoring, service modelling, multimode correlation and Big Data analytics are providing customers with amazing value such as 90% event reduction, 80% process automation, 60% MTTR reduction, $M cost reduction. We’ll show you a demonstration that describes the solution in action and inspires your own journey to Autonomous Operations.
  • Modern Flash Storage for Best of Breed IoT Projects
    Modern Flash Storage for Best of Breed IoT Projects Rob Commins, VP, Marketing, Tegile Systems Jun 13 2017 6:00 pm UTC 45 mins
    Customers who are deploying IoT platforms sometimes are forced to make difficult and limiting decisions for their infrastructure. Most application workloads are not consistent in their performance and capacity requirements, further compounding the difficulty on the infrastructure decision. A series of misleading choices often leads to over-engineering and thus overspending, or running systems that cannot meet the application demands. This webinar illustrates an approach for designing and configuring the compute and storage infrastructure for IoT. An ideal compute and storage infrastructure for IoT would have great agility and more than meet all of the technical requirements. It would have a variety of compute, and network personalities that were easy to change, and a storage layer that would support several storage protocols, contain multiple inline space saving technologies, and optimize the use of flash technology from a performance, capacity, and cost perspective.

    Modern flash optimized arrays are an ideal and unique storage infrastructure to meet these ever-changing requirements. In this webinar, we will examine the importance of:

    - Storage optimized along both the performance and capacity vectors of flash drive technologies providing great performance as well as extreme capacities.
    - Fully flexible infrastructure providing several storage configurations allowing for an increase of raw performance with the addition of flash modules or increased capacity by adding cost effective dense storage (flash and/or HDD).
    - Multi-pool internal architecture that is so in line with the “pooling” methodology internal to many IoT architectures that design and administration complexities are lessened or completely eliminated.
  • Building a DevOps Environment: How Containers on OpenStack can Help
    Building a DevOps Environment: How Containers on OpenStack can Help Scott McCarty, Sr. Cloud Infrastructure Architect, Red Hat Jun 13 2017 7:00 pm UTC 45 mins
    In this webinar, we'll discuss the crucial role automation plays at various levels, including the infrastructure level, the virtual machine level, and the container level. Topics will include:

    - How containers can be part of your DevOps transition
    - Providing resources and consuming resources and the importance of each
    - Why you need automation at all layers
    - Two products that can help you achieve this
    - What role OpenStack® plays and what role OpenShift plays
    - Examples of customers who are already doing this

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • Storage Architectures for IoT
    Storage Architectures for IoT John Webster, Sr. Analyst, Evaluator Group Jun 13 2017 7:00 pm UTC 60 mins
    Internet of Things applications present a complex challenge to the supporting storage infrastructure: large volumes of streaming data that often need to be analyzed in real time.

    IoT storage requires performance at scale and at a cost that won’t put projects out of reach. Join this webinar with John Webster, Sr. Analyst and data storage technologies expert, for a look at these requirements in more detail and new ways to prioritize them with today's storage technologies.