Resources (105)

  1. Simplifying Data Protection Management in the Cloud

    From reducing costs to decreasing the time-to-market for the key applications that run the business, the cloud has forever changed how companies compete. But when it comes to protecting business data, using a combination of backup, disaster recovery, and archive strategies in multiple locations gets complicated. Veeam and iland have simplified data protection management, no matter where the dat… Learn More

  2. Deliver Digital Success with High Performance EUC on HCI & GPU

    Performance is a key tenet of any successful end-user computing (EUC) environment. When combined with hyperconverged infrastructure (HCI), GPUs can positively impact virtual application and desktop performance and deliver a delightful experience to end-users. But with great power comes great responsibility, as cost often balances pure performance benefits. Getting this equation right is the dif… Learn More

  3. Paying the “Inaction Tax”: The Cost of Status Quo Security

    Securing the perimeter is no longer enough to prevent breaches. Numerous regulations, such as PCI and SWIFT, now deal with data security and mandate segmenting your applications. If you’re looking to build a business case for securing your high value applications, tune in and take notes. Learn More

    • Security
  4. Understanding Private and Hybrid Cloud for SAP + 2 Case Studies

    The rise of cloud technologies has fundamentally reset expectations for enterprise IT services. As a result, today’s CIOs and infrastructure, Basis, developer, and DBA teams are looking to have the same agility, scalability and simplicity of public clouds along with the control of on-premises IT datacenters to stay competitive and to support their business goals. They must also plan for and supp… Learn More

  5. Achieve File Storage Resiliency with Nutanix and Commvault

    We’re in a new world in which hyperconverged infrastructure and the Enterprise Cloud are growing in dominance and importance.  As a leader in HCI, Nutanix has developed enterprise-class services which can replace traditional infrastructure and provide organizations with far more resilient and cost-effective capabili… Learn More

  6. How It Works: Pure Storage ObjectEngine and AWS

    Flash for backup?  At first, it seems like overkill, until you realize that backups are really about recovery. In that context, flash for recovery makes perfect sense.  You also need a second site for backups, to ensure maximum recoverability.. The hybrid cloud era is upon us and with it comes the need for data protection that leverages the power of flash and the AWS cloud.  The Pure Storage… Learn More

  7. How to Secure Your Crown Jewel Applications with Micro-Segmentation

    Breaches are inevitable—are your high value assets adequately secured? Learn best practices for valuing your information security, why and how large enterprises are protecting their applications with segmentation, and how to choose the solution that's right for your organization. Learn More

    • Cloud
  8. Maximizing Insights, Minimizing Infrastructure – Optimize Running Splunk with Nutanix

    As organizations look at additional ways to gather insights, they have discovered how Splunk Enterprise can help them leverage new and existing data sources to achieve greater operational intelligence.  However, like any powerful application, the infrastructure platform chosen to run it on is critical.  In this session you will learn about the evolution of traditional infrastructures to private… Learn More

  9. 10 Incredible Ways to Hack Email and How to Stop the Bad Guys

    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users… Learn More

  10. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  11. Audience Q&A Event: Securing the Human Layer

    It’s common knowledge that humans are the leading cause of IT security incidents.  Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident. You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of securi… Learn More

    • Cloud
    • Security
  12. Audience Q&A Event: Cloud Security 101

    “To the cloud” is simple in theory, but far more complex in practice, particularly as organizations seek to adopt multiple cloud platforms for different purposes.  Today, the hybrid cloud reigns supreme with multi-cloud coming quickly behind it.  These mash ups of public and private clouds raise brand new security concerns as well as a not-inconsequential level of uncertainty. We want to… Learn More

  13. End User Best Practices for Multi-Cloud Digital Workspaces

    As the consumption of public cloud services continue to grow, customers are embracing bimodal IT practices. Mode ONE encompasses well understood, predictable workloads – something that most people want to run in their datacenters -- while mode TWO explores innovation areas and elastic workloads – for which public cloud infrastructure is great. In essence, think of bi-modal like this: Wit… Learn More

    • Cloud
    • DRaaS
  14. How One IT Manager is Driving Digital Engagement Hyperconverged Infrastructure

    IT organizations have grown accustomed to traditional IT infrastructure and virtualization technology that requires care, feeding and large budgets. Sadly, this keeps them focused on the speeds and feeds and not on what matters most – business outcomes and customer experiences. Join us to hear how Faisal Jawaid, IT Manager at TELUS Spark, a leading science museum in Calgary, CA, rose above th… Learn More

  15. Desktop-as-a-Service (DaaS) 101

    When it comes to the desktop, there’s tremendous interest in the rapidly-emerging managed desktop market, commonly known as ‘Desktop-as-a-Service’ or DaaS. In fact, in the 2018 Gartner Market Guide, Gartner states that 50% of new VDI seats will be deployed on DaaS. Organizations without the CapEx or highly-specialized and certified staff to deploy and manage VDI properly are looking fo… Learn More

    • DRaaS
  16. Application Awareness with the Power to Take Action

    Managing and securing a network often feels like navigating a ship in a turbulent storm at night. You hear thunder and see brief flashes of reality when lightning strikes, but you never really know when the next wave or hazard will appear. You need a way to permanently illuminate the path forward to avoid peril and to discover previously undiscovered lands. As is the case for a ship on the high… Learn More

  17. How One CIO Succeeded in Disaster-Proofing his Data in the Cloud

    Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one! Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products (Com… Learn More

  18. Implementing a Full-Spectrum Internet of Things Environment

    The datacenter as we know it is fracturing. What was once a single entity inside four walls now spans the cloud, our own datacenters, and the edge. As organizations transition from private datacenters to full-spectrum hybrid and multi-cloud entities, IT organizations are struggling to manage, rein in, and protect a tsunami of data. To top it off, companies are also adopting more devices than ever… Learn More

  19. Preventing Cyberattacks Before They Happen

    $7.6 million.  The average cost of a data breach. 196 days.  The average number of days it takes to identify a breach. Yikes!  It’s no wonder that security and breach-prevention is top-of-mind for the C-suite! The unfortunate reality is that the devices that your staff rely on day in and day out are one of the most common entry points for cyber-attackers, which is why they must be pr… Learn More

  20. The Role of Hyperconvergence in Retail Environments

    With 41% of consumers worldwide reporting that they use two or more channels during their purchase process, 90% of retailers are already implementing or planning to invest in omnichannel.  Most retailers recognize the importance of providing a seamless consumer experience, but many organizations are struggling to define their path to success. To achieve omnichannel success, retailers need to m… Learn More