Please join Trace3 and Zerto for a discussion on Data Protection in a Multi-Cloud World.
Since all risks cannot be eliminated, implementing disaster recovery and business continuity plans to prepare for disruptive events is more important today than ever. BC/DR processes provide detailed strategies on how an organization will function after severe interruptions and/or disasters to the business.
What should an organization consider when implementing business continuity and disaster recovery plans in a multi-cloud world? How do organizations ensure maximum up-time of provided services when they encounter interruptions such as data center outages, loss of data/data corruption etc.? What available tools are there for on-premise and public cloud environments that will provide piece of mind in the event of a disruption?
Attend this webinar to learn about:
•BC/DR Definitions – They don’t mean the same thing?
•Evolution of BC/DR
•Application Awareness & Software Tools
RecordedMay 14 202044 mins
Your place is confirmed, we'll send you email reminders
Effective data management plays a key role in an organization's success. However, IT systems are becoming more complex, data continues to grow at an exponential rate, and budget cuts due to COVID-19 make effectively managing your IT infrastructure a daunting task. So how do you gain comprehensive visibility into your environment, so you can effectively manage your data and optimize costs?
Enterprise Strategy Group recently validated that Veritas’ APTARE IT Analytics solution provides not only detailed architecture, performance, and troubleshooting visibility, but also the insight needed to operate IT in a more cost-efficient manner. In fact, ESG confirmed that APTARE helped customers reduce total consumed resources by 28% in their existing production environments*.
(Source: ESG White Paper: Harnessing the Economic Benefits of Veritas APTARE IT Analytics).
Join Trace3 and Veritas on October 8th to learn how we can help you:
•Use a single tool to visualize storage from multiple vendors
•Optimize your storage utilization
•Improve budget planning and reduce costs
PLUS, receive a $25 Amazon eGift Card for attending the full duration of the live webinar!
Andy Vo, Engagement Architect, Trace3; Paul Lewis, Global CTO, Hitachi; Doug Matthews, VP of Product Mgmt, Veritas
Leading IT through a pandemic certainly has its challenges. Shifted priorities and a lean staff change what you’re able to successfully deliver. Working from home is now the new default, data is everywhere, and agile IT is the only IT. So how do you enable the “new normal”?
Join us on October 1st to hear Hitachi Vantara and Veritas leaders provide executive insights on how to implement:
•Successful collaboration across your workforce
•Increased IT resiliency and capacity
•Effective ransomware protection
•Infrastructure agility through digital transformation
Chad Routh, Infrastructure Engagement Architect- Trace3, James Keating,Technical Channel Manager- Riverbed
Dramatically accelerate the performance of your essential on-premise and SaaS applications, while gaining deeper insights into your cloud and hybrid IT environment. Join TRACE3 and Riverbed for an enlightening presentation that will offer strategies and solutions to elevate user experience for any application, in any location, across all devices. Chad Routh, Infrastructure Engagement Architect at TRACE3, and James Keating, Technical Channel Manager at Riverbed will provide a comprehensive overview of the technologies and services that can rev up your essential applications, and give you increased awareness and control over your cloud and hybrid network.
By the end of this webinar, you will be well equipped to confront and address technical and business challenges stemming from network latency and congestion, such as:
•Accelerating application performance as users adjust to the “new normal” of work from anywhere
•Achieving enterprise-scale network visibility and analytics down to the packet
•Enlisting the support of elite engineering and executive services to define and deploy solutions
William H. Miller- CIO, NetApp / Charity Barnes- VP of IT, Toyota Tsusho / Todd Colliver, Director Global IT, Sazarac Company
For years, the move toward a digital and remote work paradigm has been considered an inevitable shift. The current pandemic, however, has quickly escalated those theories into reality. Seemingly overnight, the shift of virtual workforce collaboration has transformed the new workplace normal.
In this webinar, you will hear case studies from CIO’s who are operating to achieve maximum productivity while keeping company culture thriving. Learn strategies on how to grow your business virtually and how to evolve with technology to enhance your organization’s long-term health.
Join Matt Fornito, former Data Scientist and Head of AI at TRACE3, through an AI journey.
Everyone at this point has heard of AI. You may even hear someone say, ‘We need some AI at our company.’ But what does that mean? Bypass the metaphysical mumbo jumbo black box and learn what AI actually is. More importantly, learn the recommended principles for implementing AI in your organization so that you can be a true data-driven company.
By attending this webinar, you will learn:
•What AI actually means and how it operates
•Understanding your organizations level of AI maturity
•Learn the recommended hardware, software, people, and processes to ensure successful AI implementation at your organization
What fundamental technology trends will shape Enterprise IT over the next decade? As the earliest stage investor, Ashmeet will share what he is investing in today, which will shape IT tomorrow. Understand how the disruptive economics of Cloud computing combined with the amazing capabilities of modern Artificial intelligence and the slow death of Moore’s law will coalesce to create a tsunami in enterprise IT. Get a glimpse of some of the “technologies of tomorrow”.
Cloud Cost Management is a critical priority for most companies during current times. For enterprises that depend on AWS cost visibility and optimization for business success, Yotascale is a cost management product that delivers the industry’s most accurate cost allocation and the most actionable cost optimization recommendations, leading to 50% or more in total savings.
Houman Haghighi Business Development Partner, Menlo Ventures & Muddu Sudhakar CEO, Aisera
The world as we know it continues to change, and the way we use to live, work and play continues to evolve. Houman will share highlights from their thesis areas and investments solving un-met needs in the enterprise. He will provide an overview of several trends driving adoption of transformative and disruptive companies that Menlo Ventures is investing in.
Remote Working Disruption with Scalable Enterprise Automation
Enterprises are challenged with how to support employees and customers across service organizations like IT, HR, Cloud/DevOps, and Customer Service. To digitally accelerate a remote workforce, AI automation has become critical to delivering self-service while maintaining business growth through challenging times. New AI technologies such as Conversational AI, Cognitive AI Search, and AI-driven RPA are now providing consumer-like service experience. By automating service desk tasks, requests, and services, businesses can auto-resolve user requests and improve employee productivity, as well as boost overall employee and customer experience.
Shepherding Digital Transformation in a Post-Covid World:
Post Covid-19, digital transformation is accelerating across every industry. When employees are empowered by consumerization and developers are driving adoption of open source tools, IT has a choice - slide into irrelevance or secure their role in shepherding the corporate digital landscape. Dharmesh dives into the history of how we got here and where innovation is taking place across the enterprise ecosystem, with some insights about how the Covid-19 crisis is actually aiding some innovative tech companies.
Bringing Ordr To Address The Explosive Growth In Unmanaged and IoT Devices:
In this session, veteran IT Industry Leader, Greg Murphy, CEO of Ordr, Inc, will speak to the rapid growth of unmanaged and IoT Devices across enterprise networks. These devices can’t be secured or managed like normal desktops, laptops and servers, typically cannot be patched or taken out of service. Threat actors have recognized this challenge and are actively targeting this new “endpoint”.
Ordr, the leader in enterprise IoT and unmanaged devices, has built industry’s first AI platform to discover and secure unmanaged and IoT devices. First, Ordr starts with high fidelity visibility and classification of IoT devices. Next, Ordr’s Flow Genome maps each device’s unique, communications patterns and profiles exactly how it should communicate and behave. Then Ordr proactively creates Zero Trust segmentation policies and enforces them on networking and security infrastructure to only allow these “sanctioned communications.”
All of this is done in an agentless and automated fashion. Ordr is deployed and proven in some of the largest and most complex IoT environments in the world today.
John Brennan Partner, YL Ventures & Avi Shua CEO, Orca Security
How can the cybersecurity industry marry the unparalleled concentration of technical talent in Israel with the burning business needs of enterprise customers? As a US-based seed stage investor in Israeli cybersecurity, John will share where he is spending most of his time and where there is strong overlap of customer need and entrepreneurial talent in trending areas of cybersecurity. He will also talk about how YL Ventures aims to bring value to both the Israeli & U.S. cybersecurity ecosystems through its concentrated style of investing and its hands-on customer-centric approach to the market.
Managing the IT security posture for on-prem networks is an unstable three-legged stool consisting of:
The breadth of asset coverage
The depth of insights into each asset
The friction in deploying tools to accomplish the above
We take it for granted that stabilizing one leg of the stool comes at the sacrifice of one or more of the others.
Does the same equation hold true to cloud environments? Yes, but only if we carry our biases from the physical world. If we simply adapt on-prem security approaches to the cloud then we’ve failed to extract the capabilities of the cloud.
Utilizing its patent-pending SideScanning™ technology, Orca provides workload-level security for AWS, Azure, and GCP without the gaps in coverage and operational friction of agents and network scanners. After an instant-on, read-only, and impact-free integration to the cloud provider, Orca detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and unsecured high-risk data － then prioritizes risk based on environmental context.
Jocelyn Goldfein, Managing Director, Zetta Ventures and Amir Sharif, VP of Product & Marketing, Opsani
AI and the Enterprise IT Stack:
Artificial Intelligence represents a generational shift in IT, and Jocelyn will discuss how she's seen enterprises IT stacks transform in response, and share best practices and lessons learned.
Higher SaaS Margins and Lower Cloud Costs:
Autonomous App Tuning at Scale:
Opsani autonomously tunes cloud workloads for better performance at the lowest possible cost. By using ML, Opsani continuously configures workloads for optimal settings, yielding up to a 70% reduction on computation costs while maintaining or improving application performance. Think of it as your copilot tuning engineer that gives you the highest horsepower and MPG in any driving condition.
Opsani serves any customer that offers a SaaS or heavily relies on the public cloud to deliver software services. Our reference customers include Intuit and Ancestry.com. Use cases are (1) improving financial margins for an existing SaaS product, (2) automatic cost reduction across all of your service delivery platform, and (3) increasing application performance and reliability.
Where is Silicon Valley heading post-pandemic? An update from the multi-generational venture capital firm, Mayfield, on trends in the VC industry, and how CXOs are leveraging innovation following this crisis.
A sound cloud key management strategy puts security professionals in the driver’s seat. This session will review best practices and the different approaches for maintaining access and control over your keys, so your organization will continue to benefit from the scale and cost effectiveness that the cloud provides, while ensuring shareholders that data is secure and financial risks are minimized.
The digital infrastructure -- distributed, ephemeral, dynamic -- has become the economy’s foundation, so ensuring its availability and reliability is essential. However, legacy IT tools fall short at this task. What’s the solution? In this session, Moogsoft CEO Phil Tee will explain that for full visibility into modern IT environments, Ops teams must marry observability with AIOps. In practice, this means feeding massive amounts of granular system data -- metrics, traces, logs -- to an AI-driven platform for automated analysis and insights. This key capability in the new cloud-native Moogsoft Express product brings the Moogsoft AIOps Platform into complex CI/CD environments where digital services are created and maintained.
Attend Tee’s session and learn how observability with AIOps:
Boosts IT productivity
Helps DevOps and SREs innovate more and operate less
Keeps CI/CD pipelines agile
Unlocks true operational visibility
Ensures uptime of key digital services
Delivers immediate business value
Samuel Hernandez EAM, Nutanix & Jeff Renard EAM, Nutanix
Traditional datacenter infrastructure is complex to deploy and manage, taking focus from the applications and initiatives that matter. Nutanix has been tackling this complexity head-on with a full suite of hybrid cloud solutions. Join Jeff and Sam as they explore how Nutanix runs any app – at any scale – across private and public clouds.
Doing what’s right every single time seems impossible but when it comes to stopping breaches in your organization it’s the only solution for protecting and securing your environment. That’s where we come in. Join Randy Watkins, CRITICALSTART’s CTO, as he explains how our Managed Detection and Response platform is built to investigate and resolve every alert. By adapting to the unique processes and requirements of your business, our MDR services reduce attacker dwell time and stops breaches. We realize that for many, resources are limited, leaving most vulnerable to new and evolving cyberattacks. Find out how our three-phase process helps secure your infrastructure on-premise or in the cloud, meets compliance standards, and reduces your exposure overall.
In most cases, the COVID-19 crisis has sped up the desire to engage in digital transformation for medium-to-large scale enterprises. Roadmaps are rarely implemented without challenges. During this session, MK Palmore, the Field CSO (Americas) for Palo Alto Networks and a former public-sector executive, will walk through the difficulties of crisis planning execution in the midst of an organization's digital changes. He will use a combination of industry insights through statistical observations and direct customer feedback to emphasize the importance of adopting new technologies to battle an ever-changing threat landscape.
Allen Clingerman Chief Technology Strategist, PowerEdge Server Workloads, NA Channel, Dell Technologies
VMWare 7 is the most advanced and highly performant version of VMWare ever released. The core Hypervisor has been upgraded to support more hosts per cluster, more VMs per Host and more CPUs per Host than ever thought possible. In addition to the increases in available ‘horsepower’, the core architectures of vMotion and DRS have been re-designed and optimized to support massive VMs hosting every type of workload, database or multi-tier application.
Even large, monolithic historically Scale Up only applications can run on ESXi 7. In addition, it supports new persistent memory technology from Intel which opens up unheralded performance and cost benefits to in memory database environments. This new capability requires a rethinking of the datacenter to one that’s more standardized, modern and flexible to support applications and workloads across 1,2 and specifically 4 socket server designs.
Join us for a discussion around these new technologies and why mainstream 4S servers are the new modern building block for VMWare 7 PODs!
It is estimated that 77% of companies have objectives to implement Artificial Intelligence (AI) into their organizations, but only 23% have successfully implemented AI into production. What is the cause of this large discrepancy between goals and reality? Join Matt Fornito, former Data Scientist and Head of AI at TRACE3, through an AI journey. Learn the critical requirements from infrastructure to people that help drive successful AI processes and discover why AI is necessary for companies to thrive in the 21st century.
Understand why aligning business objectives to data is critical to success
Learn best practices for AI implementations
Discover common pitfalls and failures that prevent successful AI integrations across organizations
Driven by the most significant change in personal, professional, and global priorities in our lifetime, organizations are responding by aggressively accelerating provocative digital/business initiatives. In this presentation, we will demonstrate how an organization can adapt and focus to achieve nearly a decade of digital transformation in a compressed timeframe We will explore the challenges of client value creation, resource prioritization, velocity of change and real-time risk management.
Describes the reprioritization of leading business initiatives for 2020/21 and how they correlate to new technology priorities. Discuss areas of controversy and best practices will include surrounding value creation, organizational focus, digital velocity and real-time risk management.
The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The Zero-Trust Access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.
Technology leaders are being asked to deliver business outcomes at scale and reduce costs without enough time, people, or budget. Trace3 understands that. We’ve built a business to help you deliver those outcomes and keep up with the rate of change.