Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment
Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-
Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-level agreements (SLAs), and require robust, effective and automated failover and failback. Unfortunately, traditional business continuity/disaster recovery (BC/DR) approaches are complex, rigid and inflexible, and IT departments have struggled to protect these applications in a virtual environment.
Want to learn how to mitigate data loss, minimize RPOs and RTOs, and ensure a high degree of service continuity? Join this interactive webinar and discover how to protect your applications, not just your data.
•Leading 451 Group Analyst Dave Simpson will discuss the industry drivers for virtualized mission-critical applications, core challenges of traditional BC/DR approaches, and the key features needed to ensure a robust, yet flexible, BC/DR solution for a virtual environment.
•Gil Levonai, VP of products for Zerto, will quickly highlight a revolutionary technology, hypervisor-based replication, which simplifies enterprise-class BC/DR in a virtual environment.
•Your peer, Mark Montagna, IT Infrastructure Manager for The Philadelphia Contributionship, will share his experience including: previous BC/DR challenges, selection process, the Zerto implementation and resulting benefits.
RecordedJun 13 2012
Your place is confirmed, we'll send you email reminders
Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
* Brian Boroff, Head of Customer Success and User Operations, Asana
* Jon Ferrara, CEO/ Founder Nimble
* Stewart Rogers, Director Marketing Technology, VentureBeat
Customer experience is a tough one -- we all have seen those businesses who think they're building a great scalable customer experience, but have customers who might not have the same opinion. And it's not enough to build a great product -- we define ourselves in the marketplace through each and every interaction we have with the customer.
You might understand that the reason you're doing something is for a very valid business reason, but the customer may interpret that action entirely differently. And your world class customer service can sometimes start to falter as your startup organization adds more resources and more layers -- good for your growth but sometimes risking the very people who made your company successful. Ouch.
Customer engagement doesn't take costly tools and high priced business analysts -- but it's also not always intuitive. We're going to show you some no-nonsense ways to keep customers loyal and driving growth while also building amazing customer experience that scales along with your business. Our panel of experts will share tactics and strategies that will help you kick start and refine your approach to delivering service -- and helps your company grow even faster.
In this webinar you'll:
* Understand what your customer wants and needs throughout the product lifecycle.
* Learn strategies for rethinking the role of customer service within the organization
* Create a new process for empowering employees to retain a top tier customer experience
* Identify potential obstacles that may be causing customer attrition
The webinar explores how the selection of a VNF manager impacts two significant challenges in deploying NFV:
1. How the use of a generic VNF manager helps ensure deployments remain open and vendor independent.
2. How managing VNF lifecycle management impacts the ability to ensure Carrier-Grade Operations.
The success of any NFV solution is how the system is managed in production after virtual function components are initially instantiated and operating. The need to manage carrier-grade production solutions across distributed systems at scale is operationally complex and particularly so when managing multi-vendor deployments. To date, VNF managers typically manage VNFs only at the virtual machine level, needing to fully stop and restart the complete virtual machine to carry out any update or upgrade procedures. Deployments that manage VNFs only at the VM level provide only infrastructure management, and they not only operate with coarse control and significant blind spots, they also make it difficult to ensure in-service upgrades, i.e., the ability to carry out updating or upgrading without impacting production traffic.
This webinar will discuss how to support efficient in-service VNF management. The VNF manager should provide VNF orchestration and management on two levels: software and infrastructure. Upgrading software and/or configurations within the existing VM instead of simply creating new VM instances greatly reduces the operational time and complexity by providing much better fine grain control and visibility over the deployed VNFs, resulting in maintenance procedures that are not only faster but also more robust and less error prone.
Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.
Join this webcast to learn:
What components make up EMS
How to get up and running with EMS
How to provide secure access to corporate data
Protect everything—across devices, operating systems and applications
The popularity of the smartphone and the bring your own device (BYOD) phenomena has given way to a new era in cybercrime – the era of mobile in which cybercriminals increasingly target phones and tablets as an attack vector. In fact, at any given time, mobile malware is infecting millions and millions of mobile devices globally, enabling criminals to get their hands on your personal information and money.
2015 was witness to the largest and most notorious mobile malware attacks in history. Considering that the number of smartphone users worldwide will surpass 2 billion in 2016 (emarketer), mobile app downloads will have increased to 268 billion (Gartner) by 2017, and that most companies have dedicated very little resources towards mobile application security, the industry is ripe for even bigger malicious attacks. Mobile malware will continue to grow, being destructive and costly to corporations and users.
Join (ISC)² EMEA and IBM as we demonstrate the effects of mobile malware and how to arm organisations to protect themselves against this growing concern.
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
Today’s technology leaders need to tackle the big trends—cloud, big data, the Internet of Things, mobility, social media—while lowering IT spend year over year. That’s a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs. This enables you to deliver software- defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more—all while maintaining the freedom to choose which platform to run on.
In this session you will learn more about the main kinds of software-defined storage technology landscape you’ll likely deploy:
Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.
Innovation continues to accelerate at a breakneck pace. Smart cities, Connected Vehicles, smart sensors and devices are driving the transformation of networks such as 5G. New types of service providers need to support smart infrastructure and applications that drive more throughput, enhanced network intelligence and an evolving security landscape. F5 Networks is collaborating with Intel to deliver a network infrastructure design to scale and secure the Gi-LAN using the F5 BIG-IP platform and Intel® Architecture.
The need for a secure, extremely agile, fast, scalable, and standardized architecture to support new usage models, new services with low latency and error apps is vital in a 5G world. Together we provide the flexibility and capability to ensure that services and apps run smoothly, reliably and securely. Intel and F5 are working together to realize the vision of 5G by transforming networks and service models.
In this seminar, attendees will learn how F5’s Carrier class security and traffic steering platforms are helping SP’s transform their network around innovative around new services and F5’s virtualized platforms enable SP’s deploy, highly agile, secure and fast networks.
As traditional enterprises look to experiment with emerging Docker use cases, the need to connect containers to persistent data or even just to share data between Docker containers becomes more obvious. However, this expansion has proven to be a challenge for infrastructure that relies on monolithic storage arrays. As a result, enterprises are looking to software-defined storage as a more attractive choice because of its flexibility, programmability and ability to provide well-managed, persistent storage. In this talk, you’ll get:
• What Docker is and is not, as well as container-specific storage challenges
• Why you need container-specific storage policies, SLAs, and classes of service (CoS)
• How to leverage software-defined storage solutions for Docker and containers
• When to use hyperconverged or hyperscale architectures for your Docker initiatives
Computing models in today’s dynamic data centers and clouds are changing dramatically. Application-centric enterprises are finding that they need to develop nimble operational models for infrastructure, networking, and application services. Application delivery controllers (ADCs) are an important part of the networking and application services considerations for software-defined data centers.
New software-defined load balancers are significantly improving the way that application services are delivered and scaled, while freeing IT from repetitive tasks through intelligent automation. Application developers and lines of business are benefiting from better APIs that align with their goals for continuous integration and delivery (CI/CD) and cloud-native applications.
In this webinar, you’ll learn:
– How to eliminate the overprovisioning and overspending that is typical with traditional hardware-based load balancing solutions?
– How to scale not just load balancers but also applications, elastically and predictively based on real-time traffic patterns?
– How to take advantage of x86 servers, VMs, or containers to deliver application services close to individual applications?
– What are the best ways to support multi-cloud deployments and cloud-native applications?
– Ways to troubleshoot applications in minutes with the ability to record and replay traffic events, security and client data.
– How to accelerate application services for SDN environments such as Cisco ACI and private clouds such as OpenStack or for container-based microservices applications?
– The move to agile infrastructure and operations is already happening and it is now reaching critical networking components in the stack such as ADCs.
Join us for our live webinar on May 11th at 1 p.m.ET and 10 a.m. PT when Storage Switzerland and Tegile Systems will discuss how the acquisition and operating costs of flash make it feasible to build a private cloud that is responsive to the needs of the business and cost effective.
Storage architectures have evolved to meet ever-changing business demands. Today’s enterprises need the flexibility to place workloads where they make the most sense and achieve objectives for resiliency and growth without introducing unnecessary complexity and cost.
If you have storage initiatives focused on virtualization, backup, archiving, or cloud, attend this session to learn new strategies for building a more agile, multi-site storage infrastructure at lower cost.
As organizations run more mission-critical applications within virtual environments, it's often a challenge to continue to meet performance and availability SLAs. Storage is usually the likely culprit. IT managers must have a keen understanding of the latest advancements in storage technology so they can recommend the best approach moving forward.
In this session, you’ll learn about the latest storage architectures (flash caching, server-side PCIe flash, hybrid, and all-flash) and the pros and cons for each. We’ll also discuss how a well-designed infrastructure can help you meet your performance requirements, drive efficiencies, and deliver high availability for your VMware environment.
Tell a friend! Share this webinar by clicking on the social icon above.
In this webinar Storage Switzerland, Hitachi Data Systems and Brocade discuss why enterprises need to invest in big data analytics, how they can make that investment and what are some of the key requirements in designing a system.
In the latest version of HPE NNMi, see how you can seamlessly monitor your physical and virtual network infrastructure end to end. NNMi discovers and visualizes connectivity for virtual network appliances hosted in your VMware environment, and provides root cause analysis and troubleshooting for outages that occur at the virtual network edge. See these features in action, as well as the lineup of new capabilities in NNMi 10.10:
See new mapping and visualizations to explore the virtual network edge
Learn how NNMi tracks workloads as they migrate within the data center
Learn how events, incidents, and root cause analysis capabilities extend into the virtual network edge
Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
Driven by the need for business agility, the infrastructure convergence and hybrid cloud trend are proliferating fast.
However, backup is often overlooked when new converged platforms and cloud services are inserted into existing environments. These new silos complicate management and introduce complexity by breaking down existing backup architectures, slowing down your data centre modernisation projects and putting your business at risk.
Join us on Wednesday, 20th January and learn how you can implement new data centre modernisation projects efficiently, identify and remove data protection blind spots and ease the transition of your applications to the cloud.
In this interactive webinar we will discuss the storage challenges that VMware creates for IT professionals and how flash-based storage systems can not only help solve storage performance challenges, they can also simplify storage management and increase storage efficiency. We will also speak to Fritz Gielow, IT Administrator with the County of Nevada to discuss how flash has solved their VMware storage problems.
Russ Fellows, Senior Partner & Analyst, Evaluator Group
Deploying Solid-State for Virtualized Environments: Use Cases for All Flash, Hybrid and Alternative Storage Implementations
This session dives into common use cases for all-flash and hybrid storage systems for virtualized environments in mid and large enterprises. Russ will focus on actual deployments, allowing listeners an opportunity to learn how to build a solid business case for solid-state, based upon findings from enterprise firms, as well as hands on performance testing with multiple systems in head to head comparisons, providing practical information.
Review the options and architectures that are best suited for server and desktop virtualization
Understanding of when and where to deploy solid-state storage or hybrid to maximize your IT budget and ROI.
This webinar presents a groundbreaking concept called "Orchestrated Assurance". For you as a service provider, this will dramatically change the way you deliver, operate and troubleshoot new services. Orchestrated Assurance is based around a model-driven service orchestrator that uses software-based active test agents in NFV to enable automated, agile and assured service deliveries.
David Hughes, CEO, Silver Peak and Tony Thompson, VP of Marketing, Silver Peak
Annual Crystal Ball Webinar - The Top Disruptive Networking Technologies Heading Your Way
Which new trends and technologies will be game-changing in 2016? What trends from last year will continue? What benefits will these new concepts bring and what challenges will you have to tackle?
Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball Webinar. David will share his predictions for the coming year and also look back at last year’s predictions that will continue to impact the world of networking. He will discuss technologies that took the industry by storm and ones that quite simply missed the mark. Find out for yourself how accurate David’s 2015 predictions were and more importantly, what’s in store for 2016.
Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade.
You should attend to:
•Hear about predictions that will signal market changes in end-user connectivity
•Learn about technologies that took off and went bust in 2015
•Find out how to dramatically drive down networking costs
•Get ahead for your 2016 WAN strategies
While virtualizing infrastructure is a method to help manage sprawl, it is not a solution by itself. Learn how and why a truly heterogeneous, software-defined storage approach is the key to reducing complexity, maximizing efficiency and lowering costs. It’s time for IT staff to stop reacting and gain back the freedom and flexibility to drive business.
Containers have become a huge area of interest in our industry with the introduction of Docker in Microsoft Azure and the announcement of Windows Server containers coming with Windows Server 2016. But have you heard about Turbo containers? Unlike Docker and others, Turbo containers by Spoon are for Server and Desktop applications. They are also super quick as the name suggests. CTO of Algiz Technology Rory Monaghan will provide an introduction to Turbo containers with some cool demos.
SAFEGUARDING THE ENTERPRISE WITH SECURE DATA AS A SERVICE
It seems like every other day another industry leader is caught off-guard by data theft. As data breaches continue to make headlines, commercial and public organizations are seeking solutions to protect sensitive customer data, including health, financial, and identity information.
What are the biggest challenges for organizations in securing sensitive data? What are some things that you can do to mitigate risk?
Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data masking approaches fail. With Delphix, application teams get full, fresh, and secure data sets in just minutes, via self service.
Key challenges organizations face in securing sensitive data
Why traditional approaches to data masking fail
How the combination of virtual data and service-based masking transforms security
How do YOU choose the ideal data storage solution for your virtual server environment? Do you need Flash/SSD?
This webinar focuses on common questions that data storage buyers ask when they are looking to purchase storage to handle their virtualized server environment and solutions that can increase their productivity while saving on costs.
While it is clear that data on mobile devices should be managed, many organizations struggle to choose between device management and containerization. In this session, an AirWatch expert will discuss the differences between native and proprietary containerization, how each approach addresses different use cases, and how AirWatch can help you meet security requirements with each approach.
Until now, delivering high performance graphics workstations remotely was cost prohibitive and complicated to setup and deliver. With VMware Horizon 6 and NVIDIA GRID vGPU, there has never been a better time to deliver high performance 3D desktops in a cost effective manner that is simple to setup and deploy. Bring your customers the security, performance, reliability, and colloboration needed to transform their business.
Virtualization is no longer a passing trend. Organization deploying it in their servers, desktops, storage and networks are experiencing increased performance and decreased costs, when implemented and managed properly. Join this channel to hear leading experts discuss this maturing technology and how you can create your own software-defined data center.