Resources (156)

  1. A.I. from the Front Lines

    Welcome to the first episode in HPE’s 'Accelerate A.I. Webinar' Series! If you are an IT leader or influencer/decision maker on IT-related directions within your company, this webinar series is tailored just for you... By now, you may have heard about numerous use cases of companies across a variety of industries using Artificial Intelligence (A.I.) to drive their business decisions or perhap… Learn More

    • A.I.
  2. On-Demand Disaster Recovery for Virtual Desktop Infrastructure Environments

    Managing a robust and growing VDI environment, such as VMware Horizon, is already onerous without mishaps. With the increase in ransomware attacks, it's much more challenging for IT teams to protect their data centers and also prepare for natural disasters. Disaster Recovery has never been more critical, and until now, it’s been out of reach for many companies due to the cost and complexity o… Learn More

  3. Microsoft Office 365 and Mimecast: Reaping the Benefits of Cloud Without Increasing Risk

    Remember when Microsoft Exchange on-premises was the default option? Great email solution, a lot of gaps from a security and resilience standpoint. As migrations to Office 365 continue to grow, the hosting method may have changed, but the security challenges remain. Join this session for a deep-dive into how to reap the benefits of cloud without increasing your cybersecurity risk. We’ll discu… Learn More

    • Cloud
  4. IT Operations Management and Your Move to Azure

    Hybrid, cloud, on-premises, all-of-the-above? The name of the game is availability, and modern enterprises are evolving quickly to adapt to both new technologies and new economics to achieve it. Whether you’re moving more workloads to the cloud, increasing the number of databases running in the cloud (such as Azure® SQL Database), or migrating to SaaS applications, IT headcount isn’t increasi… Learn More

  5. How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user. In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, S… Learn More

  6. Applying an ROI framework to your Vulnerability Management Program

    Join this webcast to learn how to quantify the value of switching to InsightVM, and also how to quantify the value of a vulnerability management solution in general. Learn more about the benefits of InsightVM from a security, financial, and business perspective. We’ll deep dive into the cost, benefit, flexibility, and risk factors that go into purchasing InsightVM. These will provide you with… Learn More

  7. Top Five Criteria For Evaluating a Modern Data Warehouse

    Many organizations face a two-fold challenge with changing business requirements and massively growing datasets. Before selecting a modern data warehouse solution, organizations should first understand the use cases, potential pitfalls, and what to look for in evaluating the best modern data warehouse solution to meet their specific needs. Don't select a modern data warehouse until you've atten… Learn More

  8. Modernizing Data Protection with Pure Storage

    Increasing Data Volumes? Aggressive recovery SLA’s? Running scared of Ransomware attacks?  Sitting around waiting for restores? Are you modernizing your data protection architecture to solve some of these technology issues? Confused about the many options that are available? Just as Flash revolutionized the primary storage market, learn how Flash is now disrupting the data protection market… Learn More

  9. Security Segmentation for the Modern, Agile, Innovative Data Center

    The modern data center is agile, shouldn’t your segmentation be as well? Traditional segmentation solutions such as internal firewalls or SDN segmentation are cumbersome, costly, and complex. These legacy approaches tie security segmentation to network infrastructure, meaning the segmentation policy cannot move at the speed of the business. Join our webcast, led by experts from Illumio, to di… Learn More

  10. Do You Really Know What’s Running on Your Network?

    Everyone thinks they know what applications and data are on their network, but is that really the case? Find out November 14 when we partner with ActualTech Media for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from our industry-leading Gigamon expert. Be sure to join and win in th… Learn More

  11. Transform Your Database into an Engine of Innovation

    Do you have critical databases with a high cost of ownership, dedicated infrastructure, and management nightmares? What if you could eliminate dedicated database storage arrays and migrate to a simplified platform that consolidates all of your databases while providing optimized workload performance, integrated security and availability across the entire database estate, and operational efficiency… Learn More

  12. Data Resiliency Moves to the Cloud, Featuring Forrester

    Why should your business adopt a modern data-resiliency mindset? Data is becoming increasingly distributed across on-premises and multi-cloud environments and according to Forrester “this scattering of data requires infrastructure and operations leaders to take a fresh approach to data resiliency.”* To address today’s IT challenges, companies are looking for innovative data-resiliency sol… Learn More

  13. Modernize Your Data Protection Infrastructure with PureStorage and Veeam to Recover from Cyber Attacks

    Organizations are facing ransomware more and more frequently today. Without proper protection, the only option is to pay the ransom and hope cybercriminals unlock your data. Simple data backup is no longer enough with ransomware even targeting backups, rendering entire environments unavailable with valuable services interrupted in the meantime. A new approach to Data Protection from Pure Storag… Learn More

  14. Ransomware is Not Going Away: Protect Yourself with Cyber Insurer-Endorsed Solutions

    Across all sectors, ransomware incidents increased by 118 percent during the first quarter of 2019 alone and can cost $4M+ in lost information [1]. Marsh, the world’s leading insurance broker and risk adviser, just announced the 2019 class of Cyber Catalyst designated cybersecurity solutions. This is the first-of-its-kind evaluation program designed to bring organizations greater clarity in the… Learn More

  15. Pure on AWS – Enabling an Enterprise Hybrid Cloud Experience

    Join AWS and Pure Storage on this interactive session to explore how you can leverage the power of the AWS cloud and Pure's Cloud Data Services to deliver solutions for enterprise use cases and address critical business requirements. Learn how you can realize your cloud strategy by unlocking new hybrid cloud use cases and enabling mission-critical applications to run on AWS cloud with enhanced… Learn More

    • Cloud
  16. Best Practices for Architecting End-User Computing (EUC) Solutions

    EUC solutions are fundamental to workforce efficacy and security. However, there remains challenges in architecting solutions for EUC with rigor and discipline. Join Nutanix and our EUC design expert, Brian Suhr, to learn how to overcome challenges like poor user experience, unpredictable availability and security, long cycles from pilot to production, and unexpected costs and complexities. Learn More

  17. Cloud Plumbing - The Pumps, Valves, and Pipes of a Successful Private Cloud

    While the public cloud is making the news, real-world companies are quickly learning that, while public cloud has some valid use cases, it’s private and hybrid cloud that are the smart move for enterprise applications. Many companies are even bringing workloads back on premises after being hit with large public cloud bills! By combining hyperconvergence, virtual networking, and compute servic… Learn More

  18. Finally Fire Your Firewall for Segmentation

    It is no secret that attackers move laterally to find and exfiltrate data. To combat this, we segment data centers with complex, expensive firewalls, for better or worse. Nor is it a secret that IT is evolving, with DevOps and hybrid cloud at the forefront, but the 90’s firewall hasn’t evolved to keep pace with this. Complex rulesets, slow deployment times, hair-raising (and weeks long) cha… Learn More

  19. Supercharging your Oracle Database Workloads

    Find out how Nutanix can help you consolidate your Oracle workloads saving both time and money on management and licensing. Improve your business' operational efficiency by as much as 61% with simplified one-click operations to deploy, manage, and support your entire Oracle estate. Learn how a Nutanix Solution for Oracle databases platform can remove complexity while improving performance to yo… Learn More

  20. Accelerate VM and Container Workload Deployments with Rack-Scale Composability

    New applications slowing you down? What if you could deploy, manage and scale new apps faster than you ever dreamed? Perhaps the answer is rack-scale composability. A composable platform with rock-solid compliance and security, end-to-end automation, built-in AI operations, and an innovative composable, scalable fabric just might be the ticket. Learn how HPE Composable Cloud supports bare metal… Learn More

    • A.I.
    • Monitoring