Balancing performance and cost are critical to a successful VDI project. A key component in this effort is architecting an efficient storage infrastructure, which can help reduce storage capacity requirements and simplify provisioning and management. This webinar will highlight recent advances and best practices in optimizing the storage infrastructure specifically for VDI environments.
Join us to learn how you can:
-Reduce the required storage footprint for large scale deployment
-Minimize infrastructure costs
-Automate data placement across multiple storage tiers for optimal performance and cost efficiency
-Achieve the best combination of performance and space utilization
Seyi Verma, Product Marketing, Druva; Michael Shisko, Director, Information Technology, Hitachi Consulting
Gartner just released their 2015 Critical Capabilities for Enterprise Endpoint Backup report. In this must-read for IT professionals, Gartner notes that endpoint backup has gone beyond simple backup to address broader end-user data protection and governance use cases.
Join us for an overview of the 11 critical capabilities that help you as an IT leaders evaluate enterprise endpoint backup solutions for your organization.
Michael Shisko, Director, Information Technology, at Hitachi Consulting, will provide a practitioner's view at how these capabilities support his organization’s ability to manage and govern sensitive data.
During this webinar, the speakers will discuss:
* Key report findings and recommendations
* New features that go beyond endpoint backup, such as Security, Data Governance, Public Cloud Integration, and Mobile Device Support
* Real-world advice for evaluating solutions for your organization
Find out why Gartner has rated Druva highest overall for Enterprise Endpoint Backup, for the third consecutive time.
Registrants will receive a free copy of the Gartner report.
Dave Minturn, Storage Architect, Intel; J Metz, SNIA Board Member, R&D Engineer, Office of the CTO, Cisco
Non-Volatile Memory Express (NVMe) has piqued the interest of many people in the storage world. Using a robust, efficient, and highly flexible transportation protocol for SSDs, Flash, and future Non-Volatile Memory storage devices, the NVM Express group is working on extending these advantages over a networked Fabric.
This live Webcast will explain not only what NVMe over Fabrics is, but also specifically pay attention to how it works. We’ll be exploring:
•Key terms and concepts
•Differences between NVMe-based fabrics and SCSI-based fabrics
•Practical examples of NVMe over Fabrics solutions
•Important future considerations
Come join us as we discuss the next iteration of NVMe.
Russ Fellows, Senior Partner & Analyst, Evaluator Group
Deploying Solid-State for Virtualized Environments: Use Cases for All Flash, Hybrid and Alternative Storage Implementations
This session is dives into common use cases for all-flash and hybrid storage systems for virtualized environments in mid and large enterprises. Russ will focus on actual deployments, allowing listeners an opportunity to learn how to build a solid business case for solid-state, based upon findings from enterprise firms, as well as hands on performance testing with multiple systems in head to head comparisons, providing practical information.
Review the options and architectures that are best suited for server and desktop virtualization
Understanding of when and where to deploy solid-state storage or hybrid to maximize your IT budget and ROI.
The bottleneck in flash storage is often the interface. SAS/SATA interfaces were designed specifically for hard disk drives not for flash media. For example, flash storage can support many more simultaneous I/O operations. The resolution to the problem is to use a different interface, one that is higher throughput and is more directly accessible from the CPU. Leveraging one of these interfaces and extracting optimal performance from the flash media means leaving the confines of the SCSI protocol with customized proprietary drivers. The result is complexity and slow innovation.
Join Storage Switzerland and OCZ, a Toshiba Group Company, for a live webinar “How NVMe Will Change Flash Storage”. In this webinar we will answer these questions:
- What is NVMe?
- Why is NVMe Flash superior to SAS/SATA SSDs?
- Is NVMe Flash superior to proprietary PCIe flash drives?
- How to get started with NVMe?
Joshua Thomas, Manager, Business Solutions Architecture, Fujitsu Caribbean
For Enterprise Architects, it can be difficult to relink Big Data to business goals since it requires a different way of looking at a business' capability and maturity model. This is particularly true in the Caribbean where traditional data warehousing is very much present, but means for processing and deriving value for unstructured data sources haven't yet fully caught on.
Join Joshua as he speaks on what an EA needs to understand about Big Data in order to capitalize on its capabilities for meeting business goals, without getting caught up in the 'shiny hammer' effect.
Today, cyber attacks are broader, deeper, and more sophisticated than ever before. Criminals view the network’s Edge as a soft target, since the distributed locations frequently process highly sensitive data while often employing weaker security practices. With security at forefront of every distributed enterprise’s consciousness, it’s more important than ever to cultivate a comprehensive solution for network security.
It takes a layered, scalable approach to check all the boxes that IT managers are responsible for — and preparing for the known unknowns — like phishing/spoofing attacks, defending IoT on-ramps, and how to respond using open source security analytics.
Join Cradlepoint Chief Security Officer, Kent Woodruff, a white-hat hacker, to learn about social engineering, spoofing, phishing, and a review of IoT attacks to learn best practices for defending enterprise networks.
SAFEGUARDING THE ENTERPRISE WITH SECURE DATA AS A SERVICE
It seems like every other day another industry leader is caught off-guard by data theft. As data breaches continue to make headlines, commercial and public organizations are seeking solutions to protect sensitive customer data, including health, financial, and identity information.
What are the biggest challenges for organizations in securing sensitive data? What are some things that you can do to mitigate risk?
Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data masking approaches fail. With Delphix, application teams get full, fresh, and secure data sets in just minutes, via self service.
Key challenges organizations face in securing sensitive data
Why traditional approaches to data masking fail
How the combination of virtual data and service-based masking transforms security
Chris Harrold, Global CTO for Big Data, EMC; and Anant Chintamaneni, VP of Products, BlueData
Join this webinar with EMC and BlueData for a discussion on cost-effective, high-performance Hadoop infrastructure for Big Data analytics.
When Hadoop was first introduced to the market 15 years ago, it was designed to work on dedicated servers with direct-attached storage for optimal performance. This was sufficient at the time, but enterprises today need a modern architecture that is easier to manage as your deployment grows.
Find out how you can use shared infrastructure for Hadoop – and separate compute and storage – without impacting performance for data-driven applications. This approach can accelerate your deployment and reduce costs, while laying the foundation for a broader data lake strategy.
Get insights and best practices for your Big Data deployment:
- Learn why data locality for Hadoop is no longer relevant – we’ll debunk this myth.
- Discover how to gain the benefits of shared storage for Hadoop, such as data protection and security.
- Find out how you can eliminate data duplication and run Hadoop analytics without moving your data.
- Get started quickly and easily, leveraging virtualization and container technology to simplify your Hadoop infrastructure.
And more. Don't miss this informative webinar with Big Data experts.
How do YOU choose the ideal data storage solution for your virtual server environment? Do you need Flash/SSD?
This webinar focuses on common questions that data storage buyers ask when they are looking to purchase storage to handle their virtualized server environment and solutions that can increase their productivity while saving on costs.
With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexible and simple and transparent security that while invisible, was highly secure.
Join us for the Nutanix – Vormetric webcast which will discuss the most common infrastructure and security concerns that are draining valuable resources in organizations like yours and how you can stop the bleeding. Join us to learn about the Nutanix Hyperconverged Infrastructure & Vormetric Transparent Encryption.
For fast-growing companies, it is difficult to build an IT infrastructure that meets the needs of today and the future. Faced with the same challenge of rapid growth at MuleSoft, we have deployed MuleSoft to decouple core systems and enable the automation of core business processes.
Hubert Yoshida, CTO, Hitachi Data Systems, Greg Knieriemen, technology evangelist, Hitachi Data Systems, Adrian De Luca, CTO
Innovative technology companies that quickly capitalize on business opportunities and satisfy the demands of today’s empowered consumer have caused a wave of disruption. In 2016, businesses will turn to IT for solutions that will keep them competitive. Chief information officers will invest in faster delivery of applications and analytics, and transform IT by leveraging the third platform, social, mobile, analytics and cloud to reduce infrastructure expenses. Learn how to avoid distractions and remain focused on the IT trends that matter in 2016, as well as gain the knowledge to help accelerate your IT transformation and success.
Ben Wilson, Senior Director, Product Management, Fortinet
Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?
This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
David Houlihan, ESQ, Principal Analyst & James Haight, Analyst, Blue Hill Research; Dave Packer, VP Product Marketing, Druva
Modern enterprise archiving is no longer about the long-term storage of data you’re required to keep and serves limited utility to the business. New cloud architectures are transforming what once was simply a means to protect corporate data to a more valuable information resource that helps address corporate compliance and litigation support needs.
Join analysts from Blue Hill Research for this live event and learn how progressive organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. During this webinar, the panel will review real life use cases and discuss:
• The risks of decentralized and dispersed enterprise data
• How unifying data availability and governance is bringing increased utility to organizations
• Key considerations for designing a modern enterprise archive strategy
Registrants will receive a complimentary copy of the full Blue Hill Research white paper on the subject.
David Houlihan researches enterprise risk management, compliance and policy management, and legal technology. He is an experienced advisor in legal and technology fields with a unique understanding of complex information environments and business legal needs. As an attorney, he has held roles in the United States Attorney’s Office and more.
For more: http://bluehillresearch.com/author/david-houlihan/
James Haight focuses on analytics and emerging enterprise technologies, including exploring the business case development and solution assessment for data warehousing, data integration, advanced analytics and business intelligence applications.
For more: http://bluehillresearch.com/author/james-haight/
Whether adopting Exchange Online, or rolling out Office 365 web or native mobile apps, many organizations are still trying to figure out a deployment and user management strategy that spans the mobile cloud. Learn how VMware Identity Manager can simply federate even the most complex Active Directory environments and then automate the provisioning and licensing of Office 365 accounts while users simply login with their existing credentials. Then learn how to integrate Office 365 for mobile platforms with AirWatch Mobile Management to secure data at rest on iOS, Android and Windows 10 devices.
Join this session to find out more about what's new with the Horizon portfolio of desktop and application virtualization solutions--including Horizon 6, Horizon Air and Horizon Flex and how these products tie into the software defined datacenter-understand how other customers are taking advantage of these technologies and map out a plan for when to deliver these services through a cloud provider and when to manage these on premises.
The retail industry is becoming more complex and changing faster than ever before. Join us as we talk about the latest industry trends and explore how retailers are adopting End User Computing solutions to revamp customer engagement, store operations, employee communication, and security.
The blending of our work and personal lives is a reality for many digital employees. While many organizations continue to maintain strong lines of division, other organizations are struggling to find the right balance of security and privacy. This session will review trends, myths and best practices with our own VMWare in-house privacy council for establishing and communicating Bring-Your-Own policies.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.