Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cloud File Services: SMB/CIFS and NFS…in the Cloud Cloud File Services: SMB/CIFS and NFS…in the Cloud John Reed, Product Manager, Windows File Services, NetApp; David Fair, SNIA-ESF Business Development Chair - Intel Recorded: Oct 1 2014 6:00 pm UTC 61 mins
    • What if you could have all of your data in the cloud with the same experience and level of control that you currently have on-premises? Introducing the concept of Cloud File Services: SMB/CIFS and NFS...in the cloud!

      Companies and startups abound offering "sync & share" solutions across multiple devices and locations, but for the enterprise, caveats are everywhere. Often, only one root folder can sync, applications can't write into it, the sync protocol latency is too long, or the size limit is too small. Plus, let's face it: File Services is about a lot more than simple homedirs.

      Imagine evaporating your existing file server into the cloud. Not only will the aforementioned issues cease to exist, but also you will have the same administrative experience, the same data management functionalities, and the same protocols - SMB 3 & NFS 4.1 - that have helped redefined File Services.

      Content to cover:
      • Existing environment on-premises
      • Split administration with sync & share solutions and on-premises file services
      • Applications over File Services on-premises (SMB 3, NFS 4.1)
      • Moving to the cloud: your storage OS in a hyperscalar or service provider
      • Accommodating existing File Services workloads with Cloud File Services
      • Accommodating cloud-hosted applications over Cloud File Services

      Read more >
    • Employee File Sharing: the Good, the Bad and the Ugly Employee File Sharing: the Good, the Bad and the Ugly Information Security Officer, Atos; VP Global Marketing, Ipswitch File Transfer Recorded: Jun 4 2013 2:00 pm UTC 57 mins
    • In a recent SC Survey of information security professionals 99% of those asked said it was ‘important’ that their organisation has secure file sharing. But 50% said they had ‘no real visibility’ of how data is being sent within and outside the company.

      That said, even IT security professionals resort to using insecure file transfer systems so they can get their job done, with many saying they have used the following to transfer sensitive information:

      · Email – 82%
      · USB device – 64%
      · Consumer cloud service (e.g. Dropbox) – 28%

      If IT professionals – who know the risks – are prepared to use such systems, what are employees not versed in security prepared to do?

      Tune in to hear our experts discuss these and the other quite surprising results, plus a look at how best to protect files shared inside and outside your organisation, while benefiting from the productivity boost such sharing can allow.

      Tim Burnett, ISO, Atos
      Jeff Whitney, VP Global Marketing, Ipswitch File Transfer

      Read more >
    • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Upcoming: Oct 25 2016 5:00 pm UTC 75 mins
    • Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

      But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

      This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
      •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
      •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
      •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

      This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!

      Read more >
    • The Evolution of File The Evolution of File Glen Olsen Product Manager Recorded: Aug 25 2016 2:00 pm UTC 54 mins
    • Over a decade ago, API-accessible key/value-based storage was introduced as a service by Amazon and as software by Caringo. Amazon’s service-based approach matured quickly, while the general storage market slowly adopted the API approach. The on-premise market demanded a traditional file interface, leading to various “gateway” products. However, for the majority of use cases, the logical file gateway architecture is flawed. Is it time for file to evolve with object? This webinar examines the past decade in file interface gateways and the needs of the market versus what is available.

      Read more >
    • Take Control of Unsecure File Sharing with Workshare Take Control of Unsecure File Sharing with Workshare Dave Ewart, Sr Director of Product Marketing Recorded: Sep 3 2015 3:30 pm UTC 48 mins
    • Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.

      Join us to learn 4 key best practices:
      1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
      2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
      3) Do make the experience better and faster for users (as opposed to more complicated and slower)
      4) Have a policy (and protection) that covers email-based sharing even when mobile

      With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.

      Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
      Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.

      Read more >
    • Peer To Peer Peril: How File Sharing Impacts Security Performance Peer To Peer Peril: How File Sharing Impacts Security Performance Mike Woodward, Program Director of Data Recorded: Jan 14 2016 6:00 pm UTC 39 mins
    • While many businesses these days have policies in place that prohibit employees from peer to peer file sharing in the office, this activity occurs on a significant percentage of company networks. Beyond the dangers of downloading copyrighted material and breaking corporate policies, employees that engage in peer to peer file sharing could be bringing malware onto corporate networks without their knowledge.

      BitSight recently observed the use of the BitTorrent protocol for over 37,000 entities and found that over 40% of torrented applications contain malicious software. Join Mike Woodward, Program Director of Data as he explains:

      - the correlation between BitTorrent activity and botnet infections
      - the percentage of torrented applications that contain malware
      - which industries face the greatest challenges with peer to peer file sharing

      Read more >
    • The New Alternative to Enterprise File Sync and Share The New Alternative to Enterprise File Sync and Share Brent Compton, Director Storage and Big Data Ecosystem, Red Hat & Matt Richards, VP of Products, ownCloud Recorded: Oct 16 2014 7:00 pm UTC 56 mins
    • Your company employees share data. Lots of it. With each other and across a spectrum of mobile devices. Your ability to ensure security and regulatory compliance becomes increasingly difficult with each new user, file and system. What if you could provide the ease and convenience employees demand, with the compliance control IT needs, while scaling capacity at a fraction of the costs of traditional storage?

      It’s a tall order, but one which Red Hat and ownCloud can deliver.

      Join us for this interactive webinar as we discuss how you can provide a single interface to your unstructured data—all in a single, streamlined solution with proven performance, efficiency and control.

      In this webinar, you will learn how ownCloud and Red Hat provide:
      - An infrastructure to support collaboration and file access needs of users wherever it is stored - without having to migrate or duplicate data
      - Open, software-defined storage that is density-optimized using standard servers and is easily scalable
      - Control of data and the access to it; configured to meet your compliance and security demands

      Read more >