Resources (204)

  1. Emerging Innovations Virtual Summit

    As the pace of change in the business landscape increases on a daily basis, businesses are scrambling to develop strategies to stay ahead of the curve and leverage technology to deepen ties with their customers. Maintaining this breakneck pace requires a steady hand and a deep understanding of technology and of the market. At the same time, other forces pressure business and technology leaders. Th… Learn More

  2. Data Protection, Disaster Recovery, DRaaS Megacast

    With massively growing data sets and expectations of 100% uptime with long term retention, companies are struggling to meet data protection and disaster recovery demands. These problems are prevalent, no matter the size of the organization. To compound that, IT organizations simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data pr… Learn More

    • Data Protection
    • DRaaS
  3. Simplifying Data Protection Management in the Cloud

    From reducing costs to decreasing the time-to-market for the key applications that run the business, the cloud has forever changed how companies compete. But when it comes to protecting business data, using a combination of backup, disaster recovery, and archive strategies in multiple locations gets complicated. Veeam and iland have simplified data protection management, no matter where the dat… Learn More

  4. Optimizing your Virtual Environment

    Most virtual environements were installed quite a few years ago and, typically, much isn't done around optimization. Over time, isn't common to experience growing pains around scalability, performance, capacity, disaster recovery, and data protection. Additionally, since the virtual environment was originally designed, there have been tremendous improvements in all of these areas - things that wer… Learn More

    • Containers
    • Virtualization
  5. Emerging Enterprise IT Security Innovations EcoCast

    With the cost of a cyber-attack hitting over $5 million on average (per the Ponemon survey), most companies simply can’t afford a data breach yet, according to Cybersecurity Ventures, there is a ransomware attack on a business every 14 seconds. How can you keep your data safe and your company secure? For those in IT, question like those are a constant concern and they are looking for security so… Learn More

    • Enterprise
    • Security
  6. Deliver Digital Success with High Performance EUC on HCI & GPU

    Performance is a key tenet of any successful end-user computing (EUC) environment. When combined with hyperconverged infrastructure (HCI), GPUs can positively impact virtual application and desktop performance and deliver a delightful experience to end-users. But with great power comes great responsibility, as cost often balances pure performance benefits. Getting this equation right is the dif… Learn More

  7. Paying the “Inaction Tax”: The Cost of Status Quo Security

    Securing the perimeter is no longer enough to prevent breaches. Numerous regulations, such as PCI and SWIFT, now deal with data security and mandate segmenting your applications. If you’re looking to build a business case for securing your high value applications, tune in and take notes. Learn More

    • Security
  8. PanelCast - Preventing and Recovering From Ransomware

    Ransomware is costing companies millions of dollars in downtime plus there's no way to account for the true cost of your company's name in the headlines as having been breached. There's no denying that ransomware is impacting every company, large and small. The question is - how can you protect yourself? And if you are hit with ransomware, how can you rapidly recover without business impact? On… Read More

    • Data Protection
    • Security
  9. Understanding Private and Hybrid Cloud for SAP + 2 Case Studies

    The rise of cloud technologies has fundamentally reset expectations for enterprise IT services. As a result, today’s CIOs and infrastructure, Basis, developer, and DBA teams are looking to have the same agility, scalability and simplicity of public clouds along with the control of on-premises IT datacenters to stay competitive and to support their business goals. They must also plan for and supp… Learn More

  10. Building a Next Generation Data Center EcoCast

    As organizations continue their digital transformation efforts, their datacenter environments will also need to undergo continuous transformation to keep pace with the organizational shifts. Even more challenging, the entire concept of the “datacenter” itself is undergoing its own transformation as organizations continue their hybrid and multi-cloud endeavors that augment their on-premises sys… Learn More

    • Convergence
    • Enterprise
    • Hyperconvergence
    • SDDC
    • Storage
    • Virtualization
  11. Achieve File Storage Resiliency with Nutanix and Commvault

    We’re in a new world in which hyperconverged infrastructure and the Enterprise Cloud are growing in dominance and importance.  As a leader in HCI, Nutanix has developed enterprise-class services which can replace traditional infrastructure and provide organizations with far more resilient and cost-effective capabili… Learn More

  12. How It Works: Pure Storage ObjectEngine and AWS

    Flash for backup?  At first, it seems like overkill, until you realize that backups are really about recovery. In that context, flash for recovery makes perfect sense.  You also need a second site for backups, to ensure maximum recoverability.. The hybrid cloud era is upon us and with it comes the need for data protection that leverages the power of flash and the AWS cloud.  The Pure Storage… Learn More

  13. How to Secure Your Crown Jewel Applications with Micro-Segmentation

    Breaches are inevitable—are your high value assets adequately secured? Learn best practices for valuing your information security, why and how large enterprises are protecting their applications with segmentation, and how to choose the solution that's right for your organization. Learn More

    • Cloud
  14. Containers EcoCast

    Just about every IT professional agrees that containerized applications are the future as they allow you to run your applications more efficiently and securely while achieving greater portability, reliability, and scalability. However, exactly how to migrate to containers, store container data, and manage containers is still complex and unclear for most IT organizations. This is your opportunity t… Learn More

    • Containers
  15. Maximizing Insights, Minimizing Infrastructure – Optimize Running Splunk with Nutanix

    As organizations look at additional ways to gather insights, they have discovered how Splunk Enterprise can help them leverage new and existing data sources to achieve greater operational intelligence.  However, like any powerful application, the infrastructure platform chosen to run it on is critical.  In this session you will learn about the evolution of traditional infrastructures to private… Learn More

  16. 10 Incredible Ways to Hack Email and How to Stop the Bad Guys

    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users… Learn More

  17. Cloud Solutions Megacast

    There's a ton of hype around public cloud offerings but what's typically left unsaid is that public cloud can be much more complex and costly than anticipated. What IT organizations need to know is that there are new and innovative solutions for on-premises data centers that make leveraging public cloud easier and more affordable. These new solutions bring the availability, data protection, and sc… Learn More

    • Cloud
    • Storage
  18. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  19. Disaster Recovery in the Cloud EcoCast

    When the inevitable disaster strikes your company, you need a disaster recovery plan AND the technology behind it to make sure it actually works. With ever changing infrastructures and applications, most IT organizations struggle to, not only keep their plan up to date, but to keep the disaster recovery infrastructure in sync with production, ensure that data is always protected, and periodically… Learn More

    • Cloud
    • Data Protection
  20. Audience Q&A Event: Securing the Human Layer

    It’s common knowledge that humans are the leading cause of IT security incidents.  Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident. You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of securi… Learn More

    • Cloud
    • Security