Hi [[ session.user.profile.firstName ]]

Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment

Enticed by the promise of greater availability and flexibility at a reduced cost, enterprises are virtualizing tier-one, mission-critical applications now more than ever. Those applications are typically comprised of several virtual machines, span servers and storage arrays, have aggressive service-level agreements (SLAs), and require robust, effective and automated failover and failback. Unfortunately, traditional business continuity/disaster recovery (BC/DR) approaches are complex, rigid and inflexible, and IT departments have struggled to protect these applications in a virtual environment.

Want to learn how to mitigate data loss, minimize RPOs and RTOs, and ensure a high degree of service continuity? Join this interactive webinar and discover how to protect your applications, not just your data.

•Leading 451 Group Analyst Dave Simpson will discuss the industry drivers for virtualized mission-critical applications, core challenges of traditional BC/DR approaches, and the key features needed to ensure a robust, yet flexible, BC/DR solution for a virtual environment.

•Gil Levonai, VP of products for Zerto, will quickly highlight a revolutionary technology, hypervisor-based replication, which simplifies enterprise-class BC/DR in a virtual environment.

•Your peer, Mark Montagna, IT Infrastructure Manager for The Philadelphia Contributionship, will share his experience including: previous BC/DR challenges, selection process, the Zerto implementation and resulting benefits.
Recorded Jun 13 2012 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Simpson, Analyst, The 451 Group; Mark Montagna, The Philadelphia Contributionship; Gil Levonai, VP of Products, Zerto
Presentation preview: Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Exploring Kubernetes and Containers for Edge Computing Aug 12 2020 3:00 pm UTC 45 mins
    Panel of experts
    Kubernetes has emerged as a hugely important foundation for edge computing. But should you incorporate Kubernetes and Containers into your Edge computing strategy? And if so, how?

    Join this expert panel on BrightTALK, where we discuss why Kubernetes is ideal for running containers in edge computing environments. We’ll cover:

    - The impact of using containers and orchestration as tools for enterprises to create small server farms at the edge
    - How Kubernetes enables developers and DevOps engineers to deploy applications and services in a standard way at the edge
    - Which orchestration tools make it easy to install Kubernetes on the edge infrastructure
  • A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming Jun 23 2020 5:00 pm UTC 75 mins
    Paul Burt, Technical Product Marketing Engineer, NetApp; Jim Fister, Principal, The Decision Place
    The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

    In this webcast we’ll dive into:
    •The history of multi-cluster Kubernetes
    •How multi-cluster setups could affect data heavy workloads (such as multiple microservices backed by independent data stores)
    •Managing multiple clusters
    •Keeping the business functioning if a cluster goes down
    •How to prepare for the coming datapocalypse
  • CI/CD Pipelines for DevSecOps with Hybrid Cloud Jun 18 2020 5:00 pm UTC 45 mins
    Mike Fraser, CEO, Refactr
    The days of manually deploying infrastructure are over. IT teams need automation tools to modernize towards IT-as-Code. This is achieved through flexibility; IT teams must operate on a platform that accommodates CI/CD pipelines. The pipelines, in turn, must meld with DevOps tools to integrate with ticketing systems, run security remediation playbooks, deploy Kubernetes with a security benchmark, and even harden on-premise sensors.

    - What is DevSecOps and what are CI/CD pipelines
    - How CI/CD Pipelines work for DevSecOps
    - Why enterprises need hybrid CI/CD pipelines
    - Use cases
  • The Hybrid Cloud: Key Takeaways from the Pandemic Jun 17 2020 9:00 pm UTC 45 mins
    David Ginsburg, Aryaka VP of Product and Solutions Marketing
    COVID-19 was (and is) a wake-up call for CIOs and their teams as to the flexibility, resiliency, and scalability of their hybrid cloud and WAN infrastructures. We look at how enterprises prepared for this ‘black swan’ event, how they were able to quickly adapt in a ‘lights-out’ operation, and best practices for the future. I’ll cover architectures, support for remote workers and remote operations, and what we’ve learned for the future.
  • Out of Many, One: Tying Together Your Hybrid Multicloud Jun 17 2020 3:00 pm UTC 60 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Enterprises accumulate new cloud solutions rapidly, but still run 40% of their workloads in their own data centers. Without a plan, the result is an unsupportable mess. Join Nemertes Research as we discuss how to pull all the pieces together to make a coherent hybrid multicloud IT can manage, and use to deliver real business value.
  • [Panel] Value-Driven Multi-Cloud Strategies Jun 16 2020 5:00 pm UTC 60 mins
    Jo Peterson, Clarity360 | Bobby Allen, CloudGenera | Matthew Douglas, Sentara Healthcare
    Discover how to adopt, migrate, scale and secure a multi-cloud infrastructure.

    Adoption of multi cloud is soaring. According to ITPro, 76% of the organisations surveyed reported that they were already using from two to 15 hybrid clouds. The transition to cloud introduces a very different operating model for IT.

    During this session the focus areas will include:

    - Utilizing a multi cloud strategy, formal multi cloud architecture and tooling
    - Discussion around running, connecting and securing workloads in this model
    - Defining the unique challenges for operations, security, networking, and development teams in the multi cloud model

    Moderated by:
    Jo Perterson, Vice President, Cloud and Security Services, Clarify360

    Bobby Allen, CTO & Chief Evangelist at CloudGenera, Inc.
    Matthew Douglas, Chief Enterprise Architect, Sentara Healthcare
    One panelist to be announced
  • Storage Scalability in Hybrid Cloud and Multicloud Environments Jun 11 2020 5:00 pm UTC 75 mins
    Robert Cone, Intel; Piyush Chaudhary, IBM; Pekon Gupta, SMART Modular
    As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services. This webcast will help architects and consumers of hybrid cloud storage solutions better understand:
    oTrends and benefits of hybrid cloud storage and multicloud deployments
    oThe range of technologies and capabilities under development to help enterprise hyperscalers and cloud service providers (CSPs) serve IT customers
    oHow scalability differs in block vs. file workloads
    oThe important requirements to keep in mind when considering a 'run anything anywhere' objective
  • Storage Networking Security Series – Key Management 101 Jun 10 2020 5:00 pm UTC 75 mins
    Judy Furlong, Dell Technologies; J Metz, Rockport Networks
    In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.

    This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.
  • Is FC-NVMe Ready for Prime Time? Jun 9 2020 5:00 pm UTC 75 mins
    Mark Jones, Broadcom; Nishant Lodha, Marvell; Marcus Thordal, Broadcom, Joe Kimpler, Independent Expert
    The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe over Fibre Channel solutions?

    This webcast will take an early 2020 point-in-time snapshot of where the industry is, discuss products available today, and address common questions around:

    •Which host environments can use FC-NVMe
    •What is required from the fabric
    •Breadth of supporting storage solutions
    •Application benefits we have seen so far
    •FC-NVMe strengths and differentiators

    And most importantly, is FC-NVMe ready for prime time?
  • Fast, Secure, Scalable: Why IoT Needs Automation to Succeed Jun 9 2020 5:00 pm UTC 60 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research; Russell Rice, VP Product Strategy at Ordr
    IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.

    Scaling these initiatives requires scaling not only the IoT solutions, but also the infrastructure and cybersecurity environments in which they operate. As enterprise technologists begin to apply next-generation cybersecurity approaches like zero-trust, they need to think seriously about how to automate the control and management of their cybersecurity and infrastructure.

    The answer? Automation. Successful organizations are more likely to automate earlier, more aggressively, and more comprehensively—with dramatic improvements in performance, security, and reliability.

    Find out why automation is critical to securing, managing, and scaling IoT—and what best practices can help ensure success in implementing it.
  • IO-Link enables Industry 4.0 - Getting the most out of IO-Link Recorded: Jun 3 2020 64 mins
    Ethan Goh, Product Specialist, Industrial Integration & IIoT, SICK
    Get an overview of the possibilities and ways of Industry 4.0 – starting with how you can benefit from IO-Link.

    IO-Link is a key pillar in the path to Industry 4.0. What exactly is it? And are you already embracing IO-Link? Let us show you how to get the most out of your IO-Link investment and how you can use it to enable real Industry 4.0 use-cases. You will walk away with know-how on real industrial applications of IO-Link and get set on a sustainable path to Industry 4.0

    What you will learn:
    - The Basics of IO-Link
    - How to use IO-Link in Automation Systems
    - Visualization of sensor data for efficient troubleshooting and predictive maintenance
    - Read/write process and service data as basis for flexible production (keyword lot size 1)
    - Outlook REST API - the way to the cloud (ERP, MES)

    Live demonstrations of:
    - Sensor self-diagnosis in action with IO-Link
    - REST API in action with an IO-Link Master
    - Data visualization and recording for Cloud applications
  • Navigating Digital Transformation and the Legacy Challenge Recorded: Jun 3 2020 65 mins
    Ruchir Shastri (SoftSys Hosting), Philip Ng (BitCyber), Adnyesh Dalpati (4 Marketing Technology Venture) + Okta speaker
    The APAC region reportedly spent $375 billion on Digital Transformation projects in 2019. According to IDC, “The adoption of emerging technologies supporting digital transformation strategies in APAC is shaping up as it’s helping organizations reimagine their businesses, re-evaluate their value chain, reconnect with their customers, and rebuild their organization into a digital native enterprise”.

    But with reimagining and reevaluating comes the challenge of navigating what’s currently in place. Nowhere is this more apparent than with technology and legacy systems. For organisations that have been around since before the internet, Digital Transformation has a whole host of extra challenges.

    Join this expert panel as they address these challenges, including:

    - How the functionality of legacy systems can make it tricky to know when to stick or twist
    - How to ensure your Digital Transformation strategy is robust enough to avoid failures and gain competitive advantage
    - How to manage the impact of Millennials in the workplace - who expect continuous change and evolution

    Ruchir Shastri, President & Founder, SoftSys Hosting (Moderator)
    Philip Ng, CEO, BitCyber
    Adnyesh Dalpati, Chief Technology Officer, 4 Marketing Technology Venture
    Okta, Speaker TBD
  • Backing Team Human: Implementing Successful DX strategies using SaaS Recorded: Jun 3 2020 50 mins
    Kobus Dippenaar & Blair Loveday
    Digital transformation has now become an important strategic choice for business and governments to deliver secure and fit for purpose solutions fast. Implementation methodologies like Agile and DevOps are tools in this transformational tool kit. You and your team’s creativity and innovation underpin success, and quality data is the currency that will create trust and unlock delighted customer and citizenry experiences, delivered quickly.

    Speed of implementation, ability to pivot and delivery resilience of the teams and the delivery environment have become foundational to how we need to approach delivery. Without a robust delivery chain in the SaaS implementation, you will be vulnerable - it is just a matter of time before the rainy day turns into a perfect storm. Data, data sovereignty and increasing awareness of privacy and social contracting is vital to create trust, and to keep it. SaaS vendors need to be able to respond regardless of set ideas, their economies of scale plans may have to be thought of from a geo-social perspective now also, not just a one-sided business argument. Customers and users vote with clicks and their feet. Ensure you are the on the receiving end of the shopping cart.

    Kobus Dippenaar, Director & Digital Transformation Implementer, The Practitioners Limited
    Blair Loveday, Co-Founder & Chief People Officer, CultureXP
  • Digital Resilience: Reshaping DX Recorded: Jun 3 2020 52 mins
    Rod Crowder, Managing Director, OpsCentre & Chris Shannon, Manager Product Development, 5G Networks
    The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital transformation (DX).

    Learn from industry experts Rod Crowder and Chris Shannon as they guide us through the key learnings from previous events and apply these to reshaping the new face of DX. They will analyse key requirements every market is demanding right now in the search for control, agility and speed.

    The presentation will also explore the key success factors for organisations considering changes to their digital strategy and outline why Digital Resilience has become the new currency for strategic transformation.
  • Uniting Compute, Memory, and Storage Recorded: Jun 2 2020 60 mins
    Alex McDonald, Eli Tiomkin, Jonmichael Hands, Jim Fister
    Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.
  • Storage Networking Security Series: Protecting Data at Rest Recorded: May 27 2020 40 mins
    Pierre Mouallem, Lenovo; Ahmad Atamli, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? What are the potential risks of the wrong people reading the data? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Legal and regulatory reasons to protect (or delete) data at rest
    • Where and how data could be attacked
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?
  • Storage Networking Security Series – Encryption 101 Recorded: May 20 2020 60 mins
    Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management

    After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
  • NGN [Ep.5] The New WAN Economics Recorded: May 19 2020 56 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Next-Generation Networking [Ep.5]: The New WAN Economics

    Enterprise WAN traffic patterns are shifting. The application mix is changing. And the WAN is becoming core to digital transformation (and to resilience in the post-COVID-19 era).

    The two fundamental questions that network and telecom managers must answer right now are these: How much should I be spending on my WAN to achieve measurable success, and what services and solutions deliver the greatest bang for the buck (in terms of quantitative success per dollars invested)?

    This webinar shares the findings of the 2020-2021 Next Generation Networks research study and compares a cost analysis of solutions such as:
    *WAN Cloud Exchanges (WAN-CX)
    * Direct Cloud Connect (DCC)
    * MPLS
    * Carrier Ethernet
    * SD-WAN
    * Business and Broadband Internet
    * Fiber and wavelength services

    We compare the network spend by users of solutions and services from providers such as AT&T, Centurylink, Cisco, Citrix, Comcast, Juniper, Oracle/Talari, VMWare Velocloud, Verizon and others. And we correlate the spend and provider with success overall.
  • The Influence of IoT on Data Strategy Recorded: May 14 2020 61 mins
    Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
    More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

    This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
    •New patterns generated by the explosion of the Internet of Things
    •How IoT is impacting storage and data strategies
    •Security and privacy issues and considerations
    •How to think about the lifecycle of our information in this new environment
  • CBA [Ep.3] Contact Center Costs & Provider Ratings Recorded: May 14 2020 54 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Cost-Benefit Analysis - Workplace Collaboration Series [Ep.3] Contact Center Costs & Provider Ratings

    As companies increase their focus on the customer experience, contact centers are front-and-center to any technology decision. Nemertes conducted a study of 564 organizations to gather real-world operational costs and provider ratings. In this webinar, you'll learn:

    *How much do companies spend on contact center licensing and IT staff to support the technology?
    *Do cloud contact center services cost less to operate than on-premises platforms?
    *Which contact center providers deliver the highest-rated customer service, technology, analytics, and more?
    *What do companies spend on operational costs, by provider?

    You'll be armed with information to make provider and architecture decisions based on costs and ratings from actual customers of contact center providers.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Apps, Not Just Data: Enterprise-class BC/DR in a Virtual Environment
  • Live at: Jun 13 2012 7:00 pm
  • Presented by: Dave Simpson, Analyst, The 451 Group; Mark Montagna, The Philadelphia Contributionship; Gil Levonai, VP of Products, Zerto
  • From:
Your email has been sent.
or close