Hi [[ session.user.profile.firstName ]]

Virtualization

  • Microservices as Containers on AWS…for Fun and Profit
    Microservices as Containers on AWS…for Fun and Profit Casey Lee, Senior DevOps Engineer at Stelligent, a division of HOSTING Recorded: May 17 2017 59 mins
    The architectural pattern of decomposing an application into microservices has proven extremely effective at delivering software faster. However, this type of an architecture comes with its fair share of challenges.

    Fortunately, Amazon Web Services (AWS) offers many services that can be leveraged to overcome these challenges and adopt microservice best practices. If you are just starting to consider using AWS for running your microservices or if you have already started on the journey and looking for opportunities to improve, then this webinar will be beneficial for you.
  • Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942
    Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942 Jonathan Jew - J&M, Glenn Sexton - NIS, Limor Schafman - TIA Recorded: May 17 2017 82 mins
    Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.

    Speakers:
     Jonathan Jew, J&M Consultants
     Glenn Sexton, President and Principal Consultant, NIS

    1 BICSI CEC

    About TR-42 Telecommunications Cabling Systems Committee:
    The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.

    The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.

    Participate in TR-42: Stephanie Montgomery: [email protected].
  • How to Ensure Top Enterprise Application Performance & Service Management
    How to Ensure Top Enterprise Application Performance & Service Management Bala Vaidhinathan, CTO of eG Innovations and Simon Ritter, Deputy CTO of Azul Systems Recorded: May 17 2017 62 mins
    From pilot to production, eG Enterprise empowers enterprise organizations to deliver a better user experience and increased ROI by delivering comprehensive, converged performance management of Java application services. With optimized Java platforms delivered through Zing, Azul Systems enables Java-based businesses to focus on functionality and long-term lower operating costs rather than daily firefighting. Together, eG Enterprise and Azul Systems offer a proven Java environment designed to optimize the deployment, management, and scale of Java application services.

    Join us for this webinar where Bala Vaidhinathan, CTO of eG Innovations and Simon Ritter, Deputy CTO of Azul Systems will present how:

    - Java Application Service Management can be simplified and made more cost-effective, while delivering a better user experience
    - eG Enterprise enhancements provide insights into Java applications running on the Zing runtime
    - eG Enterprise and Azul Zing working together in a production Java installation can reduce costs, optimize deployments and deliver optimum user satisfaction
  • Meet Your Digital Workspace Goals E1: Path to Workspace ONE using Horizon
    Meet Your Digital Workspace Goals E1: Path to Workspace ONE using Horizon Todd Dayton, Principal Systems Engineer, VMware Recorded: May 16 2017 25 mins
    Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.
    In Episode 1, Your Path to Workspace ONE using Horizon you will learn:

    About the benefits and value of the digital workspace
    The prerequisites for integrating Horizon with Workspace ONE
    The process for taking your Horizon and connecting it to Workspace ONE in the cloud
  • Arcserve UDP Archiving
    Arcserve UDP Archiving Chris Rockholt, Kervin Myrtil, Gary Sussman Recorded: May 16 2017 42 mins
    Protect your vital email records and simplify compliance with Arcserve UDP Archiving.
  • Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
    Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: May 16 2017 53 mins
    Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of service (DDoS) attacks of 2016. Join us for a webcast covering the essentials of malware detection, along with a demo of how to detect malware with AlienVault USM Anywhere.

    In the webcast, you'll learn:

    Common types of malware and the challenges of detecting them
    Why you need both signature and anomaly detection to protect against malware
    How USM Anywhere can alert you of malware infections so you can take action quickly
    What to do when you detect malware activity on your network

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.
  • Don’t Be the Next Victim of a Ransomware Attack
    Don’t Be the Next Victim of a Ransomware Attack Oliver Stimpson, Endpoint Product Specialist, CyberArk, Adrian Davis, Managing Director, (ISC)2 EMEA Recorded: May 16 2017 62 mins
    Last year ransomware attacks targeting businesses grew exponentially, with 638 million reported attacks – that’s 167 times the number reported in 2016*. There’s no indication of the trend shifting in 2017. Attackers are continuing to target organizations and individuals for financial gain, and the attacks are escalating to potentially impact civilians if ransoms are not paid.

    Attend this webinar for an in-depth, expert examination of ransomware – how it’s evolving, what you need to know to protect your organization as well as a demo of a simulated ransomware attack.

    We’ll discuss:
    •Findings from the research and analysis of hundreds of thousands of samples by the CyberArk Labs team
    •Strategies on how to limit the damage that can be done by ransomware
    •Recommendations on protecting you and your organization from falling victim to an attack
  • WannaCry Ransomware: How to Detect the Vulnerability and Exploits
    WannaCry Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: May 14 2017 57 mins
    As you've likely heard, WannaCry is a new ransomware variant that takes advantage of a vulnerability in the Windows operating system (MS17-010) to encrypt the infected computer’s data and hold it hostage until a ransom is paid. In addition, the vulnerability enables WannaCry to quickly spread to other machines in the same environment – all without any human intervention. While Microsoft issued a patched to the vulnerability in March 2017, millions of computers have not been updated and remain susceptible to the attack.
    Join us for a technical webcast to learn more about WannaCry, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.
    What the AlienVault Labs security research team has uncovered about this threat
    How to scan your environment (cloud and on-premises) for the vulnerability with USM Anywhere
    How USM Anywhere leverages threat intelligence for early detection of threats like WannaCry
    How built-in response orchestration capabilities in USM Anywhere can stop the threat from spreading
  • Real World Deployments of the oneM2M Standard
    Real World Deployments of the oneM2M Standard Ken Figueredo, Sookhyun Jeon, JaeSeung Song, David Wollman Recorded: May 10 2017 79 mins
    As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.

    Now in its second published release, it is being deployed in a number of projects.

    Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:

    • 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
    • In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
    • Overview of oneM2M certification(including background of the need for oneM2M certification program).
    • Introduction of Certified Product (Target service and use cases are included per each company).
    • An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.

    Speakers:
    -- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
    -- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
    -- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
    -- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST

    To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at [email protected].

    To learn more about oneM2M, visit: http://www.onem2m.org/
    To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php

    No BICSI Credit
  • Everything You Wanted To Know about Storage: Getting from Here to There
    Everything You Wanted To Know about Storage: Getting from Here to There Chad Hintz, Cisco, Fred Zhang, Intel, John Kim, Mellanox, Alex McDonald, NetApp Recorded: May 9 2017 58 mins
    As part of the successful “Everything You Wanted To Know About Storage But Were Too Proud To Ask” series, we’ve discussed numerous topics about storage devices, protocols, and networks. As we examine some of these topics further, we begin to tease out some subtle nuances; subtle, yet important nevertheless.

    In Part Sepia, we’re going to take a look at some of the terms and concepts that affect Storage Architectures as a whole. In particular, we’ll be looking at those aspects that can help or hinder storage systems inside the network:

    •Encapsulation versus Tunneling
    •IOPS vs Latency vs Jitter
    •Quality of Service (QoS)

    Each of these topics has a profound impact on storage designs and performance, but they are often misunderstood. We’re going to help you become clear on all of these very important storage concepts so that you can grok storage just a little bit more.
  • vCPE One, Two, Launch: Facilitating Practical NFV Deployment
    vCPE One, Two, Launch: Facilitating Practical NFV Deployment Dr. Yuri Gittik, head of Innovation; Yaron Shilo, Senior Director and Solutions Architect RAD Recorded: May 9 2017 49 mins
    As communications service providers are figuring out their way towards wide-scale deployment of network functions virtualization, they need a practical approach to engineer their network and service architecture with the new technologies. In this webinar, RAD’s Dr. Yuri Gittik, Head of Strategic Developments and Innovation, and Ron Insler, AVP R&D, Head of Innovation Labs, will discuss the challenges and deployment scenarios of virtualized business services in 2017, for SD-WAN, security and other value added capabilities. They will explore various vCPE implementation options enabled by x86 to allow network operators to increase service agility and revenues..
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto Recorded: May 9 2017 44 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the fintech space
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • Gain Visibility & Control of IT Assets in a Perimeterless World
    Gain Visibility & Control of IT Assets in a Perimeterless World Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys Recorded: May 4 2017 45 mins
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • How Cylance Prevents Ransomware Attacks
    How Cylance Prevents Ransomware Attacks Brian Robison, Senior Director, Technical Marketing at Cylance® Recorded: May 4 2017 56 mins
    Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.

    Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:

    •Different ransomware types
    •Delivery methods, including drive-by downloads and fileless malware
    •Why launching attacks is cheap and easy with ransomware-as-a service
    •How Cylance prevents both file-level and disk-level encryption
  • Containers from Scratch
    Containers from Scratch Liz Rice, Technology Evangelist Recorded: May 4 2017 46 mins
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Tech Talk: WAN Op on Tap
    Tech Talk: WAN Op on Tap Derek Granath and Chris Rogers Recorded: May 3 2017 50 mins
    This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
  • Putting Data to Work with Pure Storage
    Putting Data to Work with Pure Storage Jeff Buckley, Systems Engineer, Pure Storage Recorded: May 3 2017 57 mins
    If you're like most organizations we work with, your IT budget is not increasing at the same rate that your data needs are expanding. With the storage industry in considerable turmoil and the rise of the cloud, it's time to consider new technologies. Pure Storage is putting data to work by delivering a data platform powered by cloud-era flash. With explosive growth in data, increasing constituent demands, and the need for real-time analysis, Pure is helping organizations across the country accelerate into the future. Join us and learn:

    · How flash is impacting state and local government organizations
    · Discovering savings: a look at the total cost of ownership
    · A data platform for the cloud era
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Haluk Ulubay, Senior Director of Marketing, DataCore Software Recorded: May 2 2017 46 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Making Container Orchestration Easy
    Making Container Orchestration Easy Bich Le - Chief Architect, Co-founder Recorded: May 2 2017 44 mins
    Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
  • What is Lossless Network Capture, and Why it’s Vital to Your Mission
    What is Lossless Network Capture, and Why it’s Vital to Your Mission Scott Schweitzer and Les Davis Recorded: May 2 2017 42 mins
    It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to launch a forensic investigation into a problem knowing that perhaps some pieces of the puzzle may be missing.

    Please join us to learn how lossless network packet capture from Solarflare can provide agencies with an effective means of natively enhancing the security, and performance of their mission systems and applications.
  • It’s true, SAP can be virtualized – and it’s not difficult.
    It’s true, SAP can be virtualized – and it’s not difficult. Krishna Kattumadam, Sr. Director, Solutions & Engineering - Sachin Chheda, Director Product Marketing, Nutanix Recorded: May 2 2017 50 mins
    Virtualization, hyperconvergence, and the cloud bring a host of benefits to IT landscapes, including management simplicity, enhanced resource utilization, better availability, and increased business agility. So what options are available for bringing these advantages to your business-critical SAP landscapes? And what considerations are involved when migrating your two or three-tier SAP architecture to a virtualized cloud platform built on hyperconverged infrastructure?

    In this webinar, we’ll show you how to implement an optimized, protected and high performing cloud platform on HCI across your SAP landscape, including NetWeaver, S/4HANA and RDBMSs. You will hear real-world customer experiences and learn about:

    • The technical details involved in a virtualized deployment of SAP Business Suite
    • Performance, availability, and scalability best practices for using HCI to build a private cloud solution
    • How to simplify and speed system copy and refresh with a web-scale architecture to benefit development, testing, quality assurance, copying, and migration in your SAP landscape
  • Advanced SD-WAN Monitoring and Management
    Advanced SD-WAN Monitoring and Management Jeremy Rossbach, Sr. Principal Product Marketing Manager and Jason Normandin Sr Principal Product Manager Recorded: May 2 2017 44 mins
    How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
    - Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Provide relationship mapping of major IT events
    - Visualize physical and logical dependencies in applications and service chains
    - Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
    - Enable operational insight into how all elements of traditional and overlay networks affect service integrity
  • Accelerate IT to the Speed of DevOps with HPE ITOM
    Accelerate IT to the Speed of DevOps with HPE ITOM Roy Ritthaler, HPE, Tom Goguen, HPE Recorded: Apr 27 2017 57 mins
    Businesses are accelerating their shift to digital enterprises. IT must accelerate to the speed of DevOps to support this transformation, and must be able to iterate, deploy, and scale faster than ever before. To enable IT to meet these needs, the HPE ITOM suites are evolving to embrace agile best practices.

    HPE announced the launch of containerized versions of its HPE IT Operations management suites on April 12, 2017.

    In this webinar, HPE will present the new HPE ITOM go-forward strategy, discuss the role of containerized IT Operations management in accelerating and streamlining continuous operations and showcase the new HPE Container Deployment Foundation.

    Attendees will learn about:

    The core requirements for continuous operations
    The benefits of the new ITOM containerized suites, whether you are leveraging container deployment or managing containers with the new features
    Container Deployment Foundation – the future of IT Operations Management software
    Latest transformative innovations from HPE
    Proven ways to accelerate your IT to the speed of DevOps
  • What's New in OPNFV Danube?
    What's New in OPNFV Danube? Amar Kapadia, NFV Specialist at Mirantis and Serg Melikyan, Technical Customer Success Manager at Mirantis May 18 2017 3:00 pm UTC 60 mins
    In March of this year, the OPNFV community will make generally available its 4th release, OPNFV Danube. As always, this version includes hundreds of new features and fixes, but what does that really mean to you?

    Our fast-paced, in-depth look at what's new in OpenStack Danube focuses on the major highlights of this release, but we'll also give you an idea of what's going on in the rest of the ecosystem -- now roughly 60 different projects -- so you'll know where to turn your attention next.

    In this webinar, you will learn:

    - How the OPNFV ecosystem has changed in the last year
    - What new scenarios are covered by Danube
    - What testing improvements will you find in Danube
    - What new features has Danube influenced in the constituent upstream projects
    - How can you get involved or take advantage of OPNFV Danube
  • Data Virtualization: An Introduction (Packed Lunch Webinars)
    Data Virtualization: An Introduction (Packed Lunch Webinars) Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo May 18 2017 4:00 pm UTC 60 mins
    According to Gartner, “By 2018, organizations with data virtualization capabilities will spend 40% less on building and managing data integration processes for connecting distributed data assets.” This solidifies Data Virtualization as a critical piece of technology for any flexible and agile modern data architecture.

    This session will:

    Introduce data virtualization and explain how it differs from traditional data integration approaches
    Discuss key patterns and use cases of Data Virtualization
    Set the scene for subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization.
    Agenda:

    Introduction & benefits of DV
    Summary & Next Steps
    Q&A
  • Five steps to data protection success
    Five steps to data protection success Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance May 18 2017 5:00 pm UTC 90 mins
    Feeling tethered to storage vendors whose boxes just can’t cut it? Innovation in hybrid cloud, primary storage, backup, and disaster recovery means enterprises should be able to free themselves – and transform how they consume storage and access data.

    Join this live, interactive webinar to discuss:
    - Ways to break the chains of traditional storage – and gain better performance and scalability – while minimizing on-prem investments
    - What Partners Healthcare and other enterprises do to better manage costly, complex data, while taking advantage of hybrid cloud to extend their infrastructure
    - The death of the traditional data center – and why it’s an opportunity for enterprises
    - How to get on-demand primary storage with offsite backup and DR as a single service.
  • Optimizing Flash Storage for SQL Databases
    Optimizing Flash Storage for SQL Databases Storage Switzerland, Tegile May 18 2017 5:00 pm UTC 60 mins
    Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
  • 5 Ways Backup Kills Ransomware Threats
    5 Ways Backup Kills Ransomware Threats Mark Jordan, Vice President of Technology Unitrends May 18 2017 6:00 pm UTC 60 mins
    Backup vendors know if ALL your data is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?

    Join our webinar to learn how to remove fear by assuring recovery. We'll cover:

    - The trends in Ransomware
    - 5 steps to protecting your data
    - How Unitrends ensures instant recovery from an attack

    About the presenter:

    Mark Jordan is VP of Technology at Unitrends and is responsible for building Unitrends’ advocacy program. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. At Unitrends, Mark has been manager of Unitrends presales, director of support services and was product manager of the first generation Unitrends data protection appliance. Follow Mark on Twitter @MarkCJordan.
  • Meet Your Digital Workspace Goals E2: Path to Workspace ONE using AirWatch
    Meet Your Digital Workspace Goals E2: Path to Workspace ONE using AirWatch Todd Dayton, Principal Systems Engineer, VMware May 18 2017 7:00 pm UTC 30 mins
    Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.In Episode 2, Your Path to Workspace ONE using AirWatch you will learn:

    The value of tying AirWatch to your digital workspace
    The prerequisites for integrating AirWatch with Workspace ONE
    The process for taking your existing AirWatch and connecting it to Workspace ONE in the cloud
  • Extending Real-time Service Assurance with 360o Visibility to Telco Cloud
    Extending Real-time Service Assurance with 360o Visibility to Telco Cloud Anton Basil, Vice President – Technologyand Selvaraj Balasubramanian, Vice President – Products, Veryx Technnologies May 23 2017 3:00 pm UTC 60 mins
    While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.

    Join this webinar to learn about:
    - Challenges faced by telecom service providers while deploying NFV-based services.
    - Understanding potential bottlenecks in NFV infrastructure.
    - How to diagnose the bottlenecks and overcome them.
    - How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure

    Who should attend?
    - Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
    - Network engineering teams exploring service assurance and visibility tools.
    - Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
    - Application providers and system integrators designing and deploying NFV ecosystem.
    - Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
  • Meet Your Digital Workspace Goals E3: Path to WorkspaceONE using Identity
    Meet Your Digital Workspace Goals E3: Path to WorkspaceONE using Identity Todd Dayton, Principal Systems Engineer, VMware May 23 2017 4:00 pm UTC 30 mins
    Today, consumerization is driving Digital Transformation. VMware empowers the Digital Workspace your business needs through consumer simple, enterprise secure solutions. Workspace ONE is the simple and secure enterprise platform that delivers and manages any app on any smartphone, tablet or laptop. By integrating identity management, real-time application delivery, and enterprise mobility management, Workspace ONE engages digital employees, reduces the threat of data leakage, and modernizes traditional IT operations for the Mobile Cloud Era. Join our 3-part webcast series to learn the unique paths to move to Workspace ONE.
    In Episode 3, Your Path to Workspace ONE using Identity Manager you will learn:

    The need for identity management as the key component to the digital workspace.
    The role of VMware Identity Manager
    Opportunities to use other identity providers alongside Workspace ONE
  • Oracle Baselines and Benchmarks for the Business
    Oracle Baselines and Benchmarks for the Business Jonas Mason, Senior Consultant & Jim Hannan, Principal Architect; House of Brick Technologies May 23 2017 4:00 pm UTC 60 mins
    Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.

    Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.

    Discover the importance of benchmarks in establishing baselines that:

    1) Facilitate performance troubleshooting
    2) Enable efficient use of existing hardware
    3) Inform the hardware and software requisition narrative

    Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
  • Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG
    Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG Terri McClure, Senior Analyst; Vaughn Stewart, VP of Product; Joel McKelvey, Infrastructure Solutions May 23 2017 5:00 pm UTC 45 mins
    Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.

    In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.

    Terri McClure, Senior Analyst, ESG

    Vaughn Stewart, VP of Product, Pure Storage

    Joel McKelvey, Infrastructure Solutions, Pure Storage
  • Tech Talk: Security and SD-WAN
    Tech Talk: Security and SD-WAN Derek Granath and Anusha Vaidyanathan May 23 2017 6:00 pm UTC 60 mins
    The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
  • A Case Study on Improving SQL Server Performance 20x with Hyperconverged
    A Case Study on Improving SQL Server Performance 20x with Hyperconverged Sushant Rao, Senior Director of Product Marketing May 23 2017 6:00 pm UTC 45 mins
    How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
    In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS May 23 2017 6:00 pm UTC 60 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery May 24 2017 9:00 am UTC 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • GDPR: Countdown to Day0
    GDPR: Countdown to Day0 Neil Thacker, Forcepoint, Moyn Uddin, Cyber Counsel, Jonathan Armstrong, Cordery, Adrian Davis, (ISC)² EMEA May 24 2017 2:00 pm UTC 60 mins
    With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.

    Topics for discussion will include obligations to:

    · Maintain a personal data inventory
    · Map Data flow vs. Data Transfer Agreements
    · Incident Response and obligations for mandatory data breach notification
  • CephFS: A File System for the Future
    CephFS: A File System for the Future David Disseldorp & Jan Fajerski, SUSE May 24 2017 2:00 pm UTC 60 mins
    CephFS is a scalable clustered POSIX filesystem built atop Ceph's reliable, autonomous, distributed object store. This talk will cover a quick introduction to Ceph and CephFS, its architecture and potential use cases. We will explore some of its impressive features and extensive configuration options. A look on CephFS' future challenges and road-map will conclude this talk.
  • What Makes a Storage Solution TRULY  Software-Defined?
    What Makes a Storage Solution TRULY Software-Defined? Scott Sinclair, Senior Storage Analyst, ESG's Enterprise Strategy Group & Ashok Rajagopalan, Head of Product at Datera May 24 2017 5:00 pm UTC 60 mins
    It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.

    Register for a chance to win an Apple Watch 2.

    As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.

    In this session, we will discuss:

    - What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
    - What benefits your organization should expect from SDS technology
    - What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.

    Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
  • GDPR Compliance Made Easy with Data Virtualization
    GDPR Compliance Made Easy with Data Virtualization Mark Pritchard, Sales Engineering, Denodo May 24 2017 6:00 pm UTC 60 mins
    Companies should be gearing up for May 25, 2018 when the General Data Protection Regulation (GDPR) comes into effect. GPDR will affect how businesses that serve the European Union collect, use and transfer data, forcing them to provide specific reasons and need for the personal data they gather and prove their compliance with the principles established by the regulation.

    The regulation is already creating many challenges for companies, including:

    - Ensuring secure access to most current data, whether on or off-premise
    - Consistent security across all data sources
    - Data access audit
    - Ability to provide data lineage

    This webinar aims to demonstrate how data virtualization has surfaced as a straight-forward solution to many of the challenges and questions brought on by the GDPR. It will also include a case study of how Asurion already achieved the desired level of security with data virtualization.

    Join the webinar to learn more about the benefits of using data virtualization to smoothly comply with the GDPR.
  • New Quantum Integration with Veeam
    New Quantum Integration with Veeam Eric Bassier May 24 2017 6:00 pm UTC 30 mins
    Quantum Announces Unique DXi and Scalar Tape Integration with Veeam - DXi systems now integrated with Veeam Data Mover Service, new Scalar iBlade™ enables Veeam tape creation without separate physical server.
  • How to Develop a Container Migration Strategy for your Organization
    How to Develop a Container Migration Strategy for your Organization Eric Sauer, Red Hat Consultant, Architect, PaaS & DevOps May 24 2017 7:00 pm UTC 45 mins
    In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).

    In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:

    -Evaluate and understand the value and impact of PaaS in your organization
    -Devise a migration vetting process
    -Create a migration plan to optimize business value
    -Use lessons learned from other organizations
  • Turning the Table on Hackers through Situational Awareness
    Turning the Table on Hackers through Situational Awareness Jason Hart, CTO Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA May 25 2017 11:00 am UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    •What we can learn from Jason Bourne about knowing one's surroundings
    •What we can learn from hackers to better protect valuable data
    •What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
    •How to change our mindset in a new era of a hacker-driven gold rush
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 2:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients
    Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients Matt Erich, Dir. of Pre-Sales, Imprivata & Slaven Boskovic, Systems Analyst, Teradici , May 25 2017 3:30 pm UTC 30 mins
    As healthcare organizations look to improve workflows to enable clinicians to spend more time with patients, IT organizations must find ways to keep patient data secure; while providing convenient access.

    Join us for an informative session on how Imprivata OneSign® Single Sign On and PCoIP Zero Clients have improved clinician productivity and resulted in time savings for IT and medical staff; all while enhancing the security of patient data.

    This open Q&A forum will cover how to:
    •Streamline clinical workflows with No Click Access®
    •Increase security to ensure the protection of electronic patient information
    •Meet healthcare compliance requirements with joint solutions from Imprivata and Teradici
    •Provide a consistent user experience that follows clinicians to the point of care

    Q&A will follow at the end of the session.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 5:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance