Software Defined Storage: Bringing Remote and Branch Offices Together
Organizations are experiencing unprecedented data growth - while data is geographically distributed, organizations are under pressure to provide global visibility and cost effective management for all unstructured data, regardless of the location. Enterprises with branch and regional offices are further challenged with dispersed islands of storage that are costly and inefficient, while being difficult to reliably maintain and protect.
Learn how you can expand your data lake by consolidating data from remote office locations to your core data center, through simple Software Defined Storage – enhancing protection, and introducing business Analytics.
RecordedOct 27 201643 mins
Your place is confirmed, we'll send you email reminders
Cybersecurity continues to grow more complex as attackers devise new means of gaining access to networks, data and identities. At the same time, the number of disruptive cyber-attacks is increasing at an alarming pace.
IT executives understand the importance of monitoring their environments to detect and respond to more frequent and ever-evolving security threats. However, many organizations lack sufficient in-house resources with the specialized expertise, knowledge and tools needed to stop advanced threats.
Join this webinar to learn what it takes to effectively detect and respond to threats with 24x7 security operations that include security monitoring, incident analysis and incident response.
Dell Technologies security experts will share a real-life security event, and explain how our analysts:
• Discover an event’s origin and follow the paths spreading outward from the event
• Then ascertain whether there is malicious intent
• And determine remediation steps to neutralize the attack
This webinar will conclude with a review of managed detection and response services and what customer factors make this approach worth considering as well as characteristics that might favour developing internal capabilities.
It’s no secret that adoption of the as-a-Service model for on-premises data center infrastructure is growing rapidly. Through a collaboration between Dell Technologies and Equinix, APEX Data Storage Services can now also be deployed in a secure Dell-managed colocation facility. In this session you’ll hear directly from members of the Dell Technologies APEX and Equinix teams about how this partnership provides global scale, multi-cloud capabilities, leading technologies and IT expertise—so our customers can simplify operations and relieve the burden of data center management.
• Tony Frank, Global Client Executive, Equinix
• Ben Chused, APEX Offer Marketing, Dell Technologies
• Mick Turner, APEX Offer Marketing, Dell Technologies
Lloyd McGregor, Raquel Tabuyo and Maxime Fernandez
Now more than ever it's vital to ensure your IT environment is secure.
With Dell Technologies end-to-end security portfolio, you can protect, detect, respond, and recover quickly from cyber-attacks.
Join us to hear how Dell Technologies Managed Detection and Response, powered by Secureworks® Taegis™ XDR, can protect the data and devices that are essential to your business.
We will clarify where this fully managed, 24x7 service fits in your cyber security strategy. We will also share a demo of the software and explain how our security experts review and neutralize attacks, so that you can improve your security posture and reduce the burden on your IT team.
No other solution manages endpoints as efficiently as KACE. Dell's flexible management capabilities and direct integration with KACE also enable even greater hardware-level control for Dell endpoints. With features such as BIOS, firmware and driver updates, you can ensure your devices are up to date and vulnerabilities are detected and remediated in a timely manner. In this webcast, we will show you how to protect against cyber-attacks caused by vulnerabilities on endpoints and how to effectively secure Dell endpoints.
Antigoni Dova, Bruno Bajec, Dell Technologies ; Goran Medic, Microsoft
This Friday we are going to talk about how Dell Monitors & Peripherals redefined work, the ultimate Dell laptop companion, and our guest speaker will introduce us to Windows 11.
Redefined work with Dell Monitors & Peripherals; Antigoni Dova, Dell Technologies
Work from home, work from anywhere – this is work Redefined. At Dell, more than 65% of our global team members work in a flexible capacity, so you know you can rely on our expertise in empowering your productivity wherever you are. With Dell monitors & peripherals, you can build your connected workplace from any place.
The ultimate laptop companion: Dell 14’’ portable monitor | C1422H; Bruno Bajec, Dell Technologies
Dual monitor productivity is increasingly common, and something you will miss even more when you go out on the road with your compact laptop. Dell seeks to make this idea as appealingly simple and attractive as possible without losing focus on portability. This portable monitor is attractively thin, with minimal bezels and an overall styling which makes it look like it has been swiped from an XPS device.
Introducing Windows 11; Goran Medic, Microsoft
Windows 11 is the next evolution of Windows; it is the most significant update to the Windows operating system since Windows 10. It offers many innovations focused on enhancing end-user productivity in a fresh experience that is flexible and fluid. Let's have a look at some of the key features.
10:00 – 10:05 Welcome
10:05 – 10:25 Redefined Work with Dell Monitors & Peripherals; Antigoni Dova, Dell Technologies
10:25 – 10:40 The ultimate laptop companion: Dell 14’’ portable monitor | C1422H; Bruno Bajec, Dell Technologies
10:40 – 10:55 Introducing Windows11; Goran Medic, Microsoft
10:55 – 11:00 Kahoot quiz and awards
Extend and enhance native capabilities of Active Directory and Azure Active Directory with One Identity Active Roles. Accelerate account, group and directory management and eliminate manual processes to increase efficiency and security. Focus on other IT tasks knowing your critical data, user permissions and privileged access are under control.
Chris Thomas - Lead Systems Architect | Dell Technologies
We’re entering a new data era. By 2025, the total amount of digital data created worldwide will rise to 175 zettabytes, with 30% of data processing in real-time and much of it at the edge. The possibilities range from increasing effectiveness of workers in factories across the country to responding to disasters with real-time information and communications. But this all relies on connectivity, especially in rural areas.
At the same time, the greater connectivity powered by 5G provides seamless experiences that can close the digital divide for remote workers, support distance learning for every student and connect thousands of users simultaneously, whether they’re at a sports stadium or a disaster site.
To enable this, we need a network that can conduct the flow of this orchestra of data with zero limitations—we need the 5G networks that promise mobile gigabit connectivity, low latency and the ability to unleash access across distributed IT infrastructure from edge to core to cloud.
During this session, Chris Thomas 5G Solutions Architect will discuss:
• How Dell Technologies and its partners are supporting 5G advances in the public and private sectors
• Successes and challenges of 5G-enabled projects across education, manufacturing, government and more
• The building blocks needed to embrace the possibilities of 5G
How can you ensure that your organization’s cloud strategy is agile enough to power any use case? What is the best approach to leveraging public clouds and private clouds? Forrester Analyst Tracy Woo and Future-as-a-Service expert Neil Cattermull explore the misconception that you have to choose one cloud over the other. For organizations, leveraging a hybrid approach can maximize IT control and flexibility.
Session Lead: Luke Mahon, Director of APEX Technical Marketing, Dell Technologies
Panelist: Neil Cattermull, Director at the Future as a Service (social influencer)
Panelist: Tracy Woo, Forrester analyst
Joakim Zetterblad, Global Head of SAP Practice , Dell Technologies
Join this webinar to learn 3 critical success factors for running SAP in an “as-a-service” model. As you prepare for the migration to S/4HANA and broader adoption of new Data Driven business processes, you might consider running SAP “as-a-service". In this webinar, we will discuss the Good and Bad with an “as-a-service" approach and share 3 critical success factors to how you build a model that delivers to all promises. It's all about the results, and recent studies show that the main drivers behind running SAP “as-a-service" is Simplification, Cost reduction, Flexibility, and Scalability. But how do you get there? Is public cloud the answer? Should you put “all eggs in one basket”? In this webinar, you will get valuable insights into these questions and others. Welcome and looking forward to your participation.
We kindly invite the first 50 registered participants for a virtual lunch, (20 Euro virtual card) to join this Lunch & Learn event.
Mark Wilson, BMC Mainframe Services Technical & Security Director
Please join Dell Technologies and Mark Wilson to learn about effective data resiliency and recovery solutions to protect data against malicious attacks.
Regardless of the computing platform, thieves can compromise data. In 2020, cyber-attacks were estimated to be occurring every 39 seconds1. In 2019, Accenture forecasted that over $5T of global value would be at risk over the next 5 years2 due to cybercrime. And, unfortunately, 2020 kept this prediction on track. This no cost virtual event will give you valuable insight into how mainframes and storage can be (and are) compromised. You will learn about field-tested solutions for the protection and recovery of mainframe data in a world full of ransomware, phishing, data leakage, hacking and insider threats where “when, not if” is not a cliché.
• Is the mainframe really a desirable target for cyber criminals?
• Breaching mainframe security and compromising data is not an urban legend
• A solid, tested DR strategy is not enough
• Believe it or not, cyber resiliency and protection can SAVE storage capacity and reduce costs.
• Don’t know where to start? Dell Technologies Cyber Advisory and Implementation Services can help
Mark Wilson has an extensive background in cybersecurity. His specialties include: zSeries security, particularly, RACF Audits, training and penetration testing. He is a thought leader and international speaker in mainframe security and technology, IBM Champion and passionate advocate of all things Z. With over four decades of experience in IBM Z across diverse sectors and environments, Mark has worked in both hands-on technical and strategic roles. His deep insight and solutions-driven approach makes him highly valued by clients across the world as well as technology partners. In addition to leading the BMC Mainframe Services Technical and Security teams, Mark is also the Guide Share Europe (GSE) UK Region and conference Manager.
If all the growth in your business is like an airplane, your job in IT is to keep building the runway it needs for a smooth take-off. As you start moving applications and data to the cloud, are you sure you know how much it will cost? Are you sure you’re moving the right workloads to the cloud and keeping the right ones on premises? Are you sure you can monitor costs and performance to get the most out of cloud migration?
Join this webinar for some of the lessons our customers have learned. You’ll see how you can avoid the biggest cloud-migration budget pitfalls by:
Understand and control of your data before your cloud migration, not after.
Taking a hard look at which workloads to migrate and which to leave on premises
Monitoring all the resources your workloads are burning up, like compute, memory, network and storage
Communication service providers are under pressure to provide quality of service against increased bandwidth requirements while adding new edge services quickly to meet their customers' needs.
Virtual Edge Platform (VEP) allows many virtual network functions (VNFs) to run on a single x86 physical device. It also helps reduce both CapEx and OpEx by decreasing hardware expenses, power, operations, and management expenses. Join us to learn how the communication services providers can add more value to their business and their customers by taking advantage of the Dell EMC Virtual Edge Platform.
• Raghupathy N - Systems Engineering Director, EMEA Networking, Dell
• Bob Laliberte - Sr. Analyst, ESG
• Bill Mcdonald - Segment Manager for the Enterprise Edge, Intel
Michael O'Boyle, Thibaut Perrin, Jean-Christophe Marcelin
Times like these have required many organizations to scale up capacity and make changes to accommodate remote workers and other surges in demand that are almost unprecedented.
Join us for a webinar where we will show you the synergy between the ansible automation platform, the dell technologies integration and how our partner CrossVale can help you move forward with your digital transformation. You’ll also learn about how to use Ansible to manage, integrate, and support your growing environment – all while using tools you are familiar with to keep up with capacity demands of the shifting world.
Said Tabet, Dell Technologies ; Zohar Bronfman, Pecan ; Niranjan Ramsunder, UST ; Thomas Dickey, Johnson & Johnson
Navigating the Challenges of Driving and Scaling AI Adoption: Expert Insights from the Ecosystem
It’s been predicted that the global data analytics market will be valued at over $132 billion by 2026, and the business value of artificial intelligence will reach over $3.9 trillion within the same five years. Organizations from multiple industry verticals are looking to use their data to better understand and serve their customers and increase their bottom line.
Organizations understand that AI will power the next revolution in analytics, but at the same time rollouts of AI have been slow – and there’s a clear gap between the savings potential with AI and most organizations ability to implement and deploy models and scalable solutions.
During this virtual discussion, we plan to address why adopting AI is so challenging and what organizations can do to drive real business value to their customers. Please join us for a highly interactive discussion with exclusive insights from 4 experts that are shaping the AI ecosystem by creating innovative solutions, driving and scaling AI adoption successfully, and building out the larger data management context. You will hear firsthand what organizations can do to obtain tangible business value from AI, and what future use cases are most applicable.
• Brendan Donovan; Rick Carey; Marc O'Regan; Bruno Domingues; Martin Arnold
Banks, asset managers, insurers and other firms are realising that using several cloud service providers (CSPs) instead of one gives them greater flexibility and agility. An agile business is better able to address challenges and succeed in a financial services marketplace that has become increasingly competitive, less secure and more regulated.
The benefits of cloud – public, private and hybrid – are well-known. It is “always on”. Its applications are kept up to date. It is flexible because usage can be scaled up or down with ease, and firms only pay for what they use based on an “as-a-service” consumption model.
There are risks, as with any IT infrastructure. One is cyber security. Yet CSPs have robust security and recovery procedures in place which are often better than what individual firms can manage themselves. And, with multi-cloud, if one provider goes down there are others ready to take up the slack. Another risk is regulatory compliance. European supervisors like the EBA, ESMA, EIOPA, and national supervisors like FCA and BaFin, have set strict guidelines for firms outsourcing to cloud providers. Yet they make sense and are comparatively easy to follow.
This webinar, hosted by the Financial Times in partnership with Dell Technologies and Intel, brings together senior executives from major financial institutions and big technology companies. They will discuss how a flexible, multi-cloud strategy can enhance business agility.
Cyberattacks are increasing across all industries, and cybercriminals are savvier than ever. Businesses are at risk of disruption, incurring devastating financial and reputational damage.
Endpoint updates are becoming more complex and challenging than ever with Bring-your-own-device (BYOD) programs and internet-of-things (IoT) technologies. Each device connecting to your network increases the number of threats from malware and viruses.
Join this webinar to learn five steps for building a unified endpoint security strategy that will give you:
- Clear visibility into all the devices connecting to your network
- Automated patching and software deployment
- Protection from threats such as unpatched operating systems and applications
- Peace of mind that security compliance regulations are being met
Since the start of the 21st Century, the financial markets have become dominated by computer-based trading. Computers and electronic communication have all but consigned face-to-face trading to the history books. Algorithmic Trading (AT), trading where computers assist in the decision-making process, has come to dominate order volumes in most traded instruments. According to a 2021 consultation paper on Algorithmic Trading from ESMA, the European Union's regulatory body, 70-80% of all trading activity has included some form of algorithm in the decision process. Furthermore, in the most liquid markets, High-Frequency Trading (HFT), a subset of Algorithmic Trading, accounts for 60%+ of all trading volumes.
Both HFT and AT come under the umbrella of Electronic Trading. In this webinar, we consider the subset of Algorithmic and Electronic Trading that is latency-sensitive and referred to as low-latency trading. While HFT dominates this, we examine the more general latency-sensitive scenarios as well.
Webinar channel dedicated to IT and digital business transformation through trusted hybrid cloud and big-data solutions, built upon a modern data center infrastructure that incorporates industry-leading converged infrastructure, servers, storage, and cybersecurity technologies.