Reducing the Risk of Catastrophic Failure in the Software Defined Data Center
The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power and cool the involved devices. Currently this abstraction is based upon the assumption that the physical resources underneath are essentially infinite in capacity. Most data center operators have not considered that these resources are in reality FINITE in nature and hence must be considered as part of their virtualization strategy. Simply put, movement of workloads to devices that do not have the appropriate resources (e.g., power and cooling) can lead to catastrophic failure of your data center.
This webinar will provide a brief overview of the Software Defined Data Center (including virtualization of servers, storage and networking) and then will focus on the expanded role of Critical Facilities and its coordination with IT Service Management in the software-defined data center.
Sponsored by Nlyte.
RecordedJul 9 201456 mins
Your place is confirmed, we'll send you email reminders
Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC
In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies
Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
James Chillingworth, Founder (CEO), The Consulting Practice Inc.
Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent
With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.
This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.
The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups.
This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds
Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
· What is monitoring with discipline?
· How do I optimize my backup and recovery process?
· How can I extend my current data recovery protocol to encompass ransomware protection?
Dustin Mackie, Managing Consultant at Avalution Consulting
Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.
This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam
Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?
In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.
* Cohesity - Patrick Rogers, VP Marketing & Product Management
* SimpliVity - Jesse St Laurent, VP of Product Strategy
* Unitrends - Joe Noonan, Director, Software Product Management
* Veeam - Rick Vanover, Director of Technical Product Marketing
Manjot Singh, Data & Infrastructure Architect at Percona
In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.
Peter Gossin, Digital Transformation Manager, Microsoft
Digital transformation is the process of using today’s technology to modernize outdated processes and meet the most pressing needs of your business.
Thanks to recent advances in lower cost tablet technology and Microsoft’s suite of cloud and productivity services, complete digital transformation is more accessible now than ever before. A new class of affordable devices is revolutionizing the way businesses and their employees work and interact with customers.
Sign up now to:
•Engage your customers
•Empower your employees
•Optimize your operations
•Transform your products
It’s critical to know what is going on inside your network, what technology is being snuck into your firm, and how to educate employees about security precautions. IT management has a clear responsibility to protect, defend and remain vigilant over all systems and it doesn’t stop at antivirus on the desktop and a firewall to the Internet.
Join this webcast to learn:
•Why SMB’s are a prime target
•How to help prevent your employees from being your biggest security threat
•Proper asset inventory – you cannot protect what you do not know about
•Protection and planning to prevent and/or mitigate a breach
Melinda Rahe, Business Continuity Program Manager Dell, Inc.
Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
Lilac Schoenbeck, VP of Product Management & Marketing and Dante Orsini, SVP of Business Development
Whether your nemesis is a malicious attack, a hurricane or (more likely) human error, have you collected all the tools you need to triumph and save the day?
There are a host of technologies available to those prepping for potential business disruptions: backups on-premise, backups in the cloud, on-premise failovers, Disaster Recovery as a Service, and, of course, delivering an offering of cable and silicon to your mainframe every Tuesday at noon.
Obviously, you don’t need all of these options – but which do you need? And why would you choose one over the other? Join this webinar to learn:
- What has changed since your tried-and-true backup plan was hatched in 2010
- How to evaluate on-premise vs. cloud-based options
- How to marry different technologies to create a complete solution
- What to consider when selecting a technology or cloud partner
With 10 years of experience leading the DRaaS and Backup market around the world, we’ve seen a lot of technologies come and go – and have some strong opinions and solid guidance for our customers on how best to evaluate options.
Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
Nick Serrecchia, Systems Engineer at Veeam and Terry Grulke, Sr. Technical Advisor at Quantum
With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
Jose Ruiz, VP Engineering Operations, Compass Datacenters
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.
Mike Tyson famously observed “Everybody has a plan until they get punched in the mouth.” The question is, will your Disaster Recovery plan survive that punch and save the day? In this presentation, Jim Whalen of Taneja Group and Dave LeClair of Unitrends will discuss cloud-based Disaster Recovery, how Recovery Assurance is an absolutely crucial component of any DR plan and why choosing a DRaaS provider needs to be on everyone’s short list of options when developing their Disaster Recovery plans.
Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?
If you answered yes to any of these questions, you need to register for this webcast. You will learn:
•How to replicate any workloads to Microsoft's global datacenters
•How to back up data and protect workloads with nearly infinite scalability
•How to implement a hybrid replication using both cloud and on-premises solutions
•How to create a backup without needing to buy more tape
•How to back up your Windows clients (including Windows 10) to remote storage
Register now to watch live or receive notification when this program is available on-demand.
Eric Bassier, Senior Director of Datacenter Products
Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will demonstrate how to use the cloud for disaster recovery, as well as archiving and cold storage with Q-Cloud Vault and Q-Cloud Archive. Find out how to leverage the public cloud for data recovery with a solution that plugs into your existing backup environment.
Liz Townsend, Director of Business Development, Townsend Security
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:
- Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
- Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
- How key management systems work and how to evaluate vendor solutions.
This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
What you'll learn:
- What is encryption key management and why is it important?
- Principles of industry-standard key management
- Industry must-haves for effective key management
- Challenges of home grown key management solutions
- Important certifications for meeting compliance and evaluation vendors
tactical solutions to help with your BCDR strategy
With the unexpected nature of natural disasters and other disruptive events, preparation is key when it comes to disaster recovery and business continuity processes. Join this channel for live and recorded presentations featuring thought leaders in the field discussing current topics that will help you with tactical solutions to all your BCDR issues.