El Paso September 16
Program Description: This comprehensive mid-morning seminar, concluding with a full hot lunch, covers the increasingly related topics of security/compliance, mobility/wireless/BYOD and cloud/storage/backup. Angelbeat coordinates expert speakers from many leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 3 CPE credit… Show more hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace. Meals, self-parking and Wi-Fi are provided at no charge. Given the recent announcement about Russian hackers stealing one billion passwords, you definitely want to attend and learn how to protect your data against the latest threats. Click http://youtu.be/NK10AuWN5AA to watch Angelbeat CEO Ron Gerber on Youtube discuss the value of the seminar for IT Professionals. Join your peers from UTEP, Texas Tech University, New Mexico State, El Paso Community College, El Paso Schools, Ysleta Schools, Canutillo Schools, Harmony Schools, St. Raphael, Helen of Troy, El Paso First, Hunt Companies, Genpact, Lauterbach Borschow, ScottHulse, Transtelco, DATAMARK, TSSI, Capital Bank, FirstLight Credit Union, El Paso Electric, El Paso Water Utilities, El Paso Central Appraisal, Federal Government and many more leading employers who are confirmed attendees. 9:45 - 10:45: Registration, Exhibit Area Open, Peer Networking, Product Demonstrations 10:45 - 11:00: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data;documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level. Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged. Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently. 11:00 -11:15: Protection against Phishing Attacks with Kaspersky Kaspersky is the world's largest privately held, and among the top four, security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Their talk will focus on protecting your IT infrastructure and confidential data against the latest and most sophisticated phishing attacks. 11:15 - 11:30: Security/Cloud Demo from iScan Online iScan Online provides cloud-based security scanning solutions, enabling organizations to scan any endpoint, anytime and anywhere, proactively identifying devices at risk before a data breach occurs. iScan Online was born in the cloud and provides a secure scalable multi-tenant platform for discovering unencrypted data, vulnerability and compliance scanning, assessing laptops, servers, smartphones and tablets. iScan Online is the recipient of SC Magazine’s Security Industry Innovator of the Year Award and CIO Review Magazine’s Most Promising Top 20 Security Companies of 2014. Their President/Co-Founder/CTO Billy Austin will conduct a live demonstration of this innovation technology during lunch. Billy is a passionate security veteran with over 20 years in the industry and is a frequent speaker on the topics of exploits, threats and regulatory compliance. He has performed numerous security assessments for commercial and government organizations worldwide. 11:30 - 11:50:Next-Generation Firewall Architecture, Preventing Zero Day Attacks, with Palo Alto Networks The Palo Alto next-generation security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these capabilities are natively-built into the platform and share important information across the respective disciplines, Palo Alto customers have significantly better security than legacy firewalls, UTMs, or point threat detection products. Organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks including zero-day and advanced persistent threats, known and unknown. 11:50 - 12:10: BYOD Bring Your Own Device, High-Speed 802.11n/ac WiFi, the "Internet of Things", with Xirrus During 2013, Apple sold 150 million iPhones and 70 million iPads, while Google and its partners sold over 200 million Android-powered smartphones and 130 million tablets, with significantly higher sales expected in 2014. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Plus each device creates exponential growth in network traffic and data - the Internet of Things. Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? What is the best approach for providing guest access to visitors on my corporate network, without any performance degradation or security risks? How can you create an integrated WiFi/cellular strategy that provides for secure and speedy access over any wireless network? Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. For instance, attendees will learn about rf antennae design and controller architecture, and why different vendor's access points, even if they all operate under the same 802.11 standard, nonetheless may have vastly different performance. 12:10 - 12:30 Flash Primary Storage with Pure Flash storage has revolutionized everything from smart phones and mobile computers, to web searches and social media. Unfortunately, its been nearly impossible to deploy flash across a data center without breaking the bank. Pure Storage has cracked the code and destroyed the disk status quo, which is facing performance limitations due to physical constraints on spindle speeds. All-flash storage from Pure is now affordable enough to use broadly across any enterprise. Organizations of all sizes can enjoy the performance, space and efficiency advantages of flash plus lower maintenance, power, cooling, rack space and management costs. No more wondering how much data you can analyze, how fast you can respond to a customer, or how quickly you can launch a new service. Its time to unlock the productivity and creativity of your company while delivering a responsive experience to both customers and employees. 12:30 - 12:45: Backup/Disaster Recovery/Business Continuity for VMware and Hyper-V with Veeam Today's IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable backup, recovery and replication solutions that are Built for Virtualization™ and the Cloud, work on both VMware and Microsoft Hyper-V platforms, and are a perfect fit for the modern data center. Their solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Built-in advanced monitoring and reporting capabilities help organizations of all sizes increase administrator productivity and mitigate daily management risks, plus its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft. Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations End of Event, Raffle Prize Drawings for a Gift Cards and other great items! FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at email@example.com. What are my transport/parking options getting to the event Angelbeat has arranged for complimentary self-parking, with detailed driving directions and parking instructions to be sent out to all attendees one week before the event. Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. Where can I contact the Angelbeat event team with any questions? Please email firstname.lastname@example.org with any questions.
Created by eventbrite | Claim this event
|Check Site||Buy Now|
1600 Airway Blvd.
El Paso, TX 79925