Webcasts


Upcoming

Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

While many businesses are eager to take advantage of the increased efficiencies and improved cash flow the cloud offers, security requirements inherited from the traditional on-premise model can make migrating to the cloud computing a painful journey. CloudFlare provides a suite of security features that will help IT professional tackle complex information security issues with relative ease. Register now and learn more!

Date: 06/21/2016

Time: 11:00 AM PT

Duration: 1 Hour


RedHat

Comparing Red Hat Gluster Storage with EMC Isilon for File Storage Workloads

Learn how both public sector and enterprise organizations can benefit by migrating from inflexible, proprietary storage, such as EMC Isilon, to scalable software-defined storage from the leader in open source. Red Hat Storage solutions offer cost efficiencies, petabyte scalability, and flexibility without sacrificing the durability, security, and data integrity required for enterprise-grade storage deployments. Read on.

Date: 06/16/2016

Time: 11:00 am PT


Bringing Private Cloud to Everyone

In this interactive webcast, join experts as they explore your private cloud choices and what do you really need in a private cloud. Learn more.

Date: 05/31/2016

Time: 11:00 am PT


supercast

From Hyper-Convergence to Hyper-Consolidation

This supercast, helmed by Jon Toigo, provides insights into the current capabilities and limitations of hyper-converged infrastructure and guidance for using the technologies to realize greater agility and reduced capital and operating expenses. Read on.

Date: 06/22/2016

Time: 11:00 am PT


On Demand

Logo: Violin Memory

Scaling Options for Enterprise Storage

Join industry experts to learn more about the pros and cons of all three scaling options for enterprise storage and have an opportunity to present your questions to the experts. Register now!

Duration: 1 Hour


Virtual Data + Data Masking = The New Approach to Security

A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior—the data itself. Learn more!


Keys to Adopting a Cloud-first IT Development Strategy

Join us for this webinar to learn about a transformation strategy that impacts IT, processes, and skills in your organization, driven by a cloud-first approach to IT development. Read on.


Logo: Veeam -It Just Works!

18 Things NOT To Do with Your vSphere Backups

There are plenty of best practices for the modern data center; but what about the pitfalls to avoid? What do you need to know NOT to do so that you can ensure the highest levels of availability for your vSphere VMs? Attend this webinar with data protection expert Rick Vanover and learn immediate practical tips on how to increase your data center availability. Register now!

Duration: 1 Hour


Logo

How to Embrace Security in DevOps with Automation

Join this webcast to explore how you can embrace security in DevOps with automation. You'll learn why DevOps is good for security and how to overcome DevSecOps challenges with automation. Read on.