Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
The architectural pattern of decomposing an application into microservices has proven extremely effective at delivering software faster. However, this type of an architecture comes with its fair share of challenges.
Fortunately, Amazon Web Services (AWS) offers many services that can be leveraged to overcome these challenges and adopt microservice best practices. If you are just starting to consider using AWS for running your microservices or if you have already started on the journey and looking for opportunities to improve, then this webinar will be beneficial for you.
Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.
Speakers:
Jonathan Jew, J&M Consultants
Glenn Sexton, President and Principal Consultant, NIS
1 BICSI CEC
About TR-42 Telecommunications Cabling Systems Committee:
The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.
The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.
From pilot to production, eG Enterprise empowers enterprise organizations to deliver a better user experience and increased ROI by delivering comprehensive, converged performance management of Java application services. With optimized Java platforms delivered through Zing, Azul Systems enables Java-based businesses to focus on functionality and long-term lower operating costs rather than daily firefighting. Together, eG Enterprise and Azul Systems offer a proven Java environment designed to optimize the deployment, management, and scale of Java application services.
Join us for this webinar where Bala Vaidhinathan, CTO of eG Innovations and Simon Ritter, Deputy CTO of Azul Systems will present how:
- Java Application Service Management can be simplified and made more cost-effective, while delivering a better user experience
- eG Enterprise enhancements provide insights into Java applications running on the Zing runtime
- eG Enterprise and Azul Zing working together in a production Java installation can reduce costs, optimize deployments and deliver optimum user satisfaction
Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.
In Episode 1, Your Path to Workspace ONE using Horizon you will learn:
About the benefits and value of the digital workspace
The prerequisites for integrating Horizon with Workspace ONE
The process for taking your Horizon and connecting it to Workspace ONE in the cloud
Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of service (DDoS) attacks of 2016. Join us for a webcast covering the essentials of malware detection, along with a demo of how to detect malware with AlienVault USM Anywhere.
In the webcast, you'll learn:
Common types of malware and the challenges of detecting them
Why you need both signature and anomaly detection to protect against malware
How USM Anywhere can alert you of malware infections so you can take action quickly
What to do when you detect malware activity on your network
Hosted By
Sacha Dawes
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.
Last year ransomware attacks targeting businesses grew exponentially, with 638 million reported attacks – that’s 167 times the number reported in 2016*. There’s no indication of the trend shifting in 2017. Attackers are continuing to target organizations and individuals for financial gain, and the attacks are escalating to potentially impact civilians if ransoms are not paid.
Attend this webinar for an in-depth, expert examination of ransomware – how it’s evolving, what you need to know to protect your organization as well as a demo of a simulated ransomware attack.
We’ll discuss:
•Findings from the research and analysis of hundreds of thousands of samples by the CyberArk Labs team
•Strategies on how to limit the damage that can be done by ransomware
•Recommendations on protecting you and your organization from falling victim to an attack
As you've likely heard, WannaCry is a new ransomware variant that takes advantage of a vulnerability in the Windows operating system (MS17-010) to encrypt the infected computer’s data and hold it hostage until a ransom is paid. In addition, the vulnerability enables WannaCry to quickly spread to other machines in the same environment – all without any human intervention. While Microsoft issued a patched to the vulnerability in March 2017, millions of computers have not been updated and remain susceptible to the attack.
Join us for a technical webcast to learn more about WannaCry, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.
What the AlienVault Labs security research team has uncovered about this threat
How to scan your environment (cloud and on-premises) for the vulnerability with USM Anywhere
How USM Anywhere leverages threat intelligence for early detection of threats like WannaCry
How built-in response orchestration capabilities in USM Anywhere can stop the threat from spreading
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
Speakers:
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
-- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
-- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at [email protected].
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
As part of the successful “Everything You Wanted To Know About Storage But Were Too Proud To Ask” series, we’ve discussed numerous topics about storage devices, protocols, and networks. As we examine some of these topics further, we begin to tease out some subtle nuances; subtle, yet important nevertheless.
In Part Sepia, we’re going to take a look at some of the terms and concepts that affect Storage Architectures as a whole. In particular, we’ll be looking at those aspects that can help or hinder storage systems inside the network:
•Encapsulation versus Tunneling
•IOPS vs Latency vs Jitter
•Quality of Service (QoS)
Each of these topics has a profound impact on storage designs and performance, but they are often misunderstood. We’re going to help you become clear on all of these very important storage concepts so that you can grok storage just a little bit more.
As communications service providers are figuring out their way towards wide-scale deployment of network functions virtualization, they need a practical approach to engineer their network and service architecture with the new technologies. In this webinar, RAD’s Dr. Yuri Gittik, Head of Strategic Developments and Innovation, and Ron Insler, AVP R&D, Head of Innovation Labs, will discuss the challenges and deployment scenarios of virtualized business services in 2017, for SD-WAN, security and other value added capabilities. They will explore various vCPE implementation options enabled by x86 to allow network operators to increase service agility and revenues..
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the fintech space
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.
The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.
During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:
1. Complete visibility of your IT environment
2. Deep visibility into assets
3. Continuous and automatic updates
4. Asset criticality ranking
5. Interactive, customizable dashboarding and reporting
6. Integration with your CMDB
Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.
Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.
Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:
•Different ransomware types
•Delivery methods, including drive-by downloads and fileless malware
•Why launching attacks is cheap and easy with ransomware-as-a service
•How Cylance prevents both file-level and disk-level encryption
We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.
Join our webinar in order to learn:
•Containers basics
•How a container engine uses namespaces and control groups to create containers
•What makes containers so appealing to developers
This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
If you're like most organizations we work with, your IT budget is not increasing at the same rate that your data needs are expanding. With the storage industry in considerable turmoil and the rise of the cloud, it's time to consider new technologies. Pure Storage is putting data to work by delivering a data platform powered by cloud-era flash. With explosive growth in data, increasing constituent demands, and the need for real-time analysis, Pure is helping organizations across the country accelerate into the future. Join us and learn:
· How flash is impacting state and local government organizations
· Discovering savings: a look at the total cost of ownership
· A data platform for the cloud era
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to launch a forensic investigation into a problem knowing that perhaps some pieces of the puzzle may be missing.
Please join us to learn how lossless network packet capture from Solarflare can provide agencies with an effective means of natively enhancing the security, and performance of their mission systems and applications.
Virtualization, hyperconvergence, and the cloud bring a host of benefits to IT landscapes, including management simplicity, enhanced resource utilization, better availability, and increased business agility. So what options are available for bringing these advantages to your business-critical SAP landscapes? And what considerations are involved when migrating your two or three-tier SAP architecture to a virtualized cloud platform built on hyperconverged infrastructure?
In this webinar, we’ll show you how to implement an optimized, protected and high performing cloud platform on HCI across your SAP landscape, including NetWeaver, S/4HANA and RDBMSs. You will hear real-world customer experiences and learn about:
• The technical details involved in a virtualized deployment of SAP Business Suite
• Performance, availability, and scalability best practices for using HCI to build a private cloud solution
• How to simplify and speed system copy and refresh with a web-scale architecture to benefit development, testing, quality assurance, copying, and migration in your SAP landscape
How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
- Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
- Provide relationship mapping of major IT events
- Visualize physical and logical dependencies in applications and service chains
- Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
- Enable operational insight into how all elements of traditional and overlay networks affect service integrity
Businesses are accelerating their shift to digital enterprises. IT must accelerate to the speed of DevOps to support this transformation, and must be able to iterate, deploy, and scale faster than ever before. To enable IT to meet these needs, the HPE ITOM suites are evolving to embrace agile best practices.
HPE announced the launch of containerized versions of its HPE IT Operations management suites on April 12, 2017.
In this webinar, HPE will present the new HPE ITOM go-forward strategy, discuss the role of containerized IT Operations management in accelerating and streamlining continuous operations and showcase the new HPE Container Deployment Foundation.
Attendees will learn about:
The core requirements for continuous operations
The benefits of the new ITOM containerized suites, whether you are leveraging container deployment or managing containers with the new features
Container Deployment Foundation – the future of IT Operations Management software
Latest transformative innovations from HPE
Proven ways to accelerate your IT to the speed of DevOps
In March of this year, the OPNFV community will make generally available its 4th release, OPNFV Danube. As always, this version includes hundreds of new features and fixes, but what does that really mean to you?
Our fast-paced, in-depth look at what's new in OpenStack Danube focuses on the major highlights of this release, but we'll also give you an idea of what's going on in the rest of the ecosystem -- now roughly 60 different projects -- so you'll know where to turn your attention next.
In this webinar, you will learn:
- How the OPNFV ecosystem has changed in the last year
- What new scenarios are covered by Danube
- What testing improvements will you find in Danube
- What new features has Danube influenced in the constituent upstream projects
- How can you get involved or take advantage of OPNFV Danube
According to Gartner, “By 2018, organizations with data virtualization capabilities will spend 40% less on building and managing data integration processes for connecting distributed data assets.” This solidifies Data Virtualization as a critical piece of technology for any flexible and agile modern data architecture.
This session will:
Introduce data virtualization and explain how it differs from traditional data integration approaches
Discuss key patterns and use cases of Data Virtualization
Set the scene for subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization.
Agenda:
Introduction & benefits of DV
Summary & Next Steps
Q&A
Feeling tethered to storage vendors whose boxes just can’t cut it? Innovation in hybrid cloud, primary storage, backup, and disaster recovery means enterprises should be able to free themselves – and transform how they consume storage and access data.
Join this live, interactive webinar to discuss:
- Ways to break the chains of traditional storage – and gain better performance and scalability – while minimizing on-prem investments
- What Partners Healthcare and other enterprises do to better manage costly, complex data, while taking advantage of hybrid cloud to extend their infrastructure
- The death of the traditional data center – and why it’s an opportunity for enterprises
- How to get on-demand primary storage with offsite backup and DR as a single service.
Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
Backup vendors know if ALL your data is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Join our webinar to learn how to remove fear by assuring recovery. We'll cover:
- The trends in Ransomware
- 5 steps to protecting your data
- How Unitrends ensures instant recovery from an attack
About the presenter:
Mark Jordan is VP of Technology at Unitrends and is responsible for building Unitrends’ advocacy program. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. At Unitrends, Mark has been manager of Unitrends presales, director of support services and was product manager of the first generation Unitrends data protection appliance. Follow Mark on Twitter @MarkCJordan.
Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.In Episode 2, Your Path to Workspace ONE using AirWatch you will learn:
The value of tying AirWatch to your digital workspace
The prerequisites for integrating AirWatch with Workspace ONE
The process for taking your existing AirWatch and connecting it to Workspace ONE in the cloud
While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.
Join this webinar to learn about:
- Challenges faced by telecom service providers while deploying NFV-based services.
- Understanding potential bottlenecks in NFV infrastructure.
- How to diagnose the bottlenecks and overcome them.
- How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure
Who should attend?
- Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
- Network engineering teams exploring service assurance and visibility tools.
- Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
- Application providers and system integrators designing and deploying NFV ecosystem.
- Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.
In Episode 3, Your Path to Workspace ONE using Identity Manager you will learn:
The need for identity management as the key component to the digital workspace.
The role of VMware Identity Manager
Opportunities to use other identity providers alongside Workspace ONE
Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.
Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.
Discover the importance of benchmarks in establishing baselines that:
1) Facilitate performance troubleshooting
2) Enable efficient use of existing hardware
3) Inform the hardware and software requisition narrative
Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.
In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.
Terri McClure, Senior Analyst, ESG
Vaughn Stewart, VP of Product, Pure Storage
Joel McKelvey, Infrastructure Solutions, Pure Storage
The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.
Qualys simplifies web app security with an end-to-end solution.
During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:
* Scan your apps using Qualys Web Application Scanning (WAS)
* Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
* Manage it all from a centralized, cloud-based portal
This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.
You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.
For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.
During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.
You will get practical advice on:
- What you need to focus on: data, assets, suppliers
- Who you should involve: key stakeholders and departments
- How you can automate processes with Qualys Security Assessment Questionnaire
With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.
Topics for discussion will include obligations to:
· Maintain a personal data inventory
· Map Data flow vs. Data Transfer Agreements
· Incident Response and obligations for mandatory data breach notification
CephFS is a scalable clustered POSIX filesystem built atop Ceph's reliable, autonomous, distributed object store. This talk will cover a quick introduction to Ceph and CephFS, its architecture and potential use cases. We will explore some of its impressive features and extensive configuration options. A look on CephFS' future challenges and road-map will conclude this talk.
It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.
Register for a chance to win an Apple Watch 2.
As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.
In this session, we will discuss:
- What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
- What benefits your organization should expect from SDS technology
- What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.
Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
Companies should be gearing up for May 25, 2018 when the General Data Protection Regulation (GDPR) comes into effect. GPDR will affect how businesses that serve the European Union collect, use and transfer data, forcing them to provide specific reasons and need for the personal data they gather and prove their compliance with the principles established by the regulation.
The regulation is already creating many challenges for companies, including:
- Ensuring secure access to most current data, whether on or off-premise
- Consistent security across all data sources
- Data access audit
- Ability to provide data lineage
This webinar aims to demonstrate how data virtualization has surfaced as a straight-forward solution to many of the challenges and questions brought on by the GDPR. It will also include a case study of how Asurion already achieved the desired level of security with data virtualization.
Join the webinar to learn more about the benefits of using data virtualization to smoothly comply with the GDPR.
Quantum Announces Unique DXi and Scalar Tape Integration with Veeam - DXi systems now integrated with Veeam Data Mover Service, new Scalar iBlade™ enables Veeam tape creation without separate physical server.
In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).
In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:
-Evaluate and understand the value and impact of PaaS in your organization
-Devise a migration vetting process
-Create a migration plan to optimize business value
-Use lessons learned from other organizations
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:
•What we can learn from Jason Bourne about knowing one's surroundings
•What we can learn from hackers to better protect valuable data
•What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
•How to change our mindset in a new era of a hacker-driven gold rush
With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?
In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.
Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:
• An Overview Understanding GDPR
• The key requirements and how they impact security teams at organizations both in and outside the EU
• Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
• Ways organizations can use segmentation to simplify and accelerate GDPR compliance
As healthcare organizations look to improve workflows to enable clinicians to spend more time with patients, IT organizations must find ways to keep patient data secure; while providing convenient access.
Join us for an informative session on how Imprivata OneSign® Single Sign On and PCoIP Zero Clients have improved clinician productivity and resulted in time savings for IT and medical staff; all while enhancing the security of patient data.
This open Q&A forum will cover how to:
•Streamline clinical workflows with No Click Access®
•Increase security to ensure the protection of electronic patient information
•Meet healthcare compliance requirements with joint solutions from Imprivata and Teradici
•Provide a consistent user experience that follows clinicians to the point of care
With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?
In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.
Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:
• An Overview Understanding GDPR
• The key requirements and how they impact security teams at organizations both in and outside the EU
• Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
• Ways organizations can use segmentation to simplify and accelerate GDPR compliance