El Paso Nov 20 Seminar: Cloud/Storage, Security, Wireless/BYOD
Program Description: This tightly-focused 1/2 day seminar starting with a full hot breakfast covers the increasingly related topics of security/compliance, wireless/byod/network and storage/cloud/virtualization. Angelbeat coordinates expert speakers from leading firms shown below who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 3 CPE credit hours for attending. As one Wal-Mart… Show more attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.” Join your peers from El Paso Schools, Canutillo Schools, UTEP, El Paso Community College, Texas Tech University Health Sciences, University Medical Center, Helen of Troy, Western Refining, TSSI, El Paso First, El Paso Central Appraisal, Datamark and other leading employers who are confirmed attendees. Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Click here to see biographies of some of the outstanding speakers . Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Meals, Wi-Fi and parking are normally provided at no charge. 7:30 - 8:30: Full Hot Breakfast, Registration, Product Demonstrations 8:30 - 9:30: Security/Compliance: Solutions to the Ever-Growing Threat and Vulnerability Landscape, with Infoblox, Palo Alto Networks and Varonis Security and compliance vulnerabilities will only grow in 2013, driven by these trends: - Virtualization and cloud computing, with sensitive/confidential information and programs stored in multiple and possibly unsecured third-party locations - Secure remote access requirements from an ever growing list of devices - laptop, netbook, home PC, MAC, smartphone and tablet - accessing behind-the-firewall data via multiple networks including corporate LAN, home wifi, public wifi and 3G/4G cellular. - Hackers targeting facebook, linkedin, youtube and twitter, as social media can no longer be blocked at work, plus web-filtering cannot always block tinyurl's which are automatically truncated. There is also an alarmingly high percentage of downloadable apps containing malware, across all smartphone and desktop platforms. - Web-based or SaaS enterprise applications, with browser vulnerabilities that are often the weakest link in a defense-in-depth strategy exposing organizations to substantial risk - Foreign-based DDOS (distributed denial-of-service) attacks, from either rogue organizations or even pseudo-government agencies, seeking to crash American website operations. - Newly-created exploits targeting vulnerabilities in existing IDS/IPS, Firewall, Anti-Spam and Patching/Update platforms - Zero day attacks that exploit a previously unknown vulnerability in a computing application, with developers having zero days to address and patch the vulnerability. These exploits (including the software and/or strategies that use a security hole to carry out a successful attack) are used or shared by attackers before the developer of the target software even knows about the vulnerability. - Advanced persistent threat (APT) malware, which remains undetected for extended periods while collecting data and/or executing malware. This class of malware exploits DNS for communications and data transfer, and is almost impossible to find with traditional security solutions. - The growing need to protect unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - stored in file servers, NAS devices, SharePoint, Exchange and cloud-based services such as Box, Google Drive, SkyDrive, etc. Who should and shouldn't have access, which data is highly sensitive and of greatest value/risk, etc. Learn from Infoblox, Palo Alto Networks and Varonis how to enhance existing defense-in-depth security architecture with the latest solutions, such as deploying both a DNS and next-generation firewall, keeping you one step ahead of hackers and maintaining compliance with all applicable internal, regulatory and government guidelines. 9:30 - 9:50: BYOD Bring Your Own Device, High-Speed Wireless, 802.11n/ac Migration Gartner estimates that manufacturers will ship one billion smartphones and 184 million tablets this year. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Learn from Xirrus how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/4G wireless strategy for your mobile workers. 9:50 - 10:10 Veeam: Virtual & Cloud Backup/Disaster Recovery/Business Continuity Today’s IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization™ and the Cloud—a perfect fit for the modern data center. Veeam Backup & Replication delivers backup, recovery and replication for VMware and Microsoft Hyper-V. This #1 VM Backup™ solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam's advanced monitoring and reporting capabilities help organizations of all sizes protect virtualization, increase administrator productivity and mitigate daily management risks. Its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft System Center. 10:10 - 10:30 Commvault: Cloud and Data Management Tools Cloud deployments continue to grow in scope and scale - especially as organizations recognize the benefits of moving to a shared services infrastructure model for IT. With a more efficient utilization of resources and a greater responsiveness to dynamic workloads, cloud computing promises the compelling value of a more cost-effective, "utility-based" IT enterprise. To maximize these cloud infrastructure benefits, IT requires data management capabilities that that can keep up with the new dynamics of shared service infrastructures. This means data management that can track to the rapid and dramatic shifts in resources and workloads while maintaining secure multi-tenant controls over the management of and access to data. It also means the optimization of data retention and underlying resource pools for cost-effective data management and rapid access to critical data. CommVault's Simpana software delivers data management optimized for your cloud infrastructure including: - Software-based data management automation and orchestration - Secure, policy-based multi-tenancy - Self-service access and management - Cloud-accelerated disaster recovery using "Virtualize Me" tools - Extend backup and archive to cloud storage tiers seamlessly Break, Product Demonstrations, Peer Networking 11:15 - 11:35: Network/LAN/WAN: Fiber Optic Infrastructure, End User Performance/QoS, WAN Optimization, Network Analysis, with Transtelco This section focuses on the end user experience and overall system performance/reliability, covering Fiber Optic Infrastructure, Local and Wide Area Networks, plus Application issues. - Understand the value of high-performance wide area networks (WAN), a critical issue with today's cloud-based architecture - Learn about fiber-optic strategies for effective and reliable cross-border communications - Improve and ensure performance/QoS of virtualized and/or cloud-based applications that can be delivered/hosted anywhere and accessed by any device over any network. - Identify the root cause of performance issues (network vs application), then take corrective action through WAN optimization, load balancing, etc., without overspending on bandwidth. Product Demonstrations, End of Event, Raffle Drawings for Great Prizes FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at email@example.com. What are my transport/parking options getting to the event Angelbeat has arranged for complimentary self-parking for all attendees. Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. Where can I contact the Angelbeat event team with any questions? Please email firstname.lastname@example.org with any questions.
Created by eventbrite | Claim this event
|Check Site||Buy Now|
1600 Airway Blvd.
El Paso, TX 79925