Angelbeat Columbus Mar 12: Security, Mobility, Cloud/Virtualization/Storage
Program Description: This comprehensive yet tightly-focused seminar, ending in early afternoon after a full hot lunch, covers the increasingly related topics of security/compliance, wireless/byod/vdi, network/application performance, storage/backup and cloud/virtualization/sdn. Angelbeat coordinates expert speakers from many leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to… Show more maximize learning. CISSP's and other individuals can receive 5 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.” Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Meals including a full hot lunch, Wi-Fi and parking are provided at no charge. There are drawings for gift cards and other great prizes at the end. Click here for a Toshiba laptop discount from Angelbeat, very useful for XP migration. Join your peers from Nationwide, Scotts, GE, DSW, SafeAuto, Safelite Glass, Stanley Steemer, Akzo Nobel, Dayton Superior, NexisLexis, Batelle Institute, Norman Jones Enlow, Crane Group, Hy-Tek Material Handling, Allied Mineral, Crown Equipment, Corporate One Federal Credit Union, Cooper State Bank, Columbus Dispatch, TRECA, Franklin County, State of Ohio, Columbus Airport, Ohio State University, Bowling Green State, Hondros College, Walsh University, Central Ohio Tech, South-Western City Schools, OhioHealth O’Bleness Hospital and many more leading organizations who are confirmed attendees. 7:30 - 8:35: Breakfast, Registration, Exhibit Area Open, Peer Networking, Product Demonstrations 8:35 - 8:50: Anti-Virus, Malware Detection, Virtual/Cloud Security with Kaspersky Kaspersky is the world’s largest privately held, and among the top four, security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Because malware is becoming increasingly sophisticated, traditional defenses are no longer sufficient to ensure adequate protection. In addition to award-winning anti-malware. Kaspersky will discuss vulnerability scanning and patch management technologies that eradicate vulnerabilities within both operating systems and application software. Flexible encryption functionality will be covered, that protects confidential data on a laptop and/or removable storage device that is lost or stolen. Although shared storage offers many advantages, the presence of one infected file can spread malware across the corporate network. Kaspersky's anti-malware protection for file servers helps your business to benefit from shared storage, without compromising on security. Many traditional, agent-based anti-malware products are not well suited to virtualized environments, e.g. they require antivirus and signature database installed on every virtual machine, which partly defeats the object of virtualization. Kaspersky Security for Virtualization delivers award-winning anti-malware protection for virtualized servers, desktops and data centers. An agentless anti-malware solution is a highly efficient way to protect your virtualized infrastructure, with greater performance and less impact on virtualization density. It is easy to deploy and includes advanced management features to simplify security management across both physical and virtual computing assets. 8:50 - 9:05: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level. Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged. Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently. 9:05 - 9:25: Next Generation Firewall with Dell SonicWALL Dell SonicWALL Next-Generation Firewalls (NGFW) deliver superior intrusion prevention, malware protection, application intelligence and control, real-time traffic visualization and inspection for SSL encrypted sessions at the gateway by tightly integrating a patented Reassembly-Free Deep Packet Inspection engine with multi-core hardware. Essential to an intelligent and highly adaptive security system, they scan every byte of every packet for the deepest level of network protection and massively scale to extend state-of-the-art security to growing and distributed enterprise networks. Dell NGFW provide a comprehensive layer of defense by combining gateway content filtering, anti-spam, anti-virus, anti-spyware, intrusion prevention, and regain visibility into the network through application intelligence and visualization. 9:25 - 9:45: Understanding Security Challenges in Application Delivery from F5 Securing technology is an age-old struggle. As attackers have moved ‘up the stack’, applications have become the target for more sophisticated attacks. The next attacker will most likely be talking through a secured connection and acting like a real client; are you prepared to handle their intrusion attempts? Learn from F5 how to guarantee secure application delivery with no performance/QoS impact. Please click here to read an F5 security/application blog, to join a community of IT professionals interested in F5, and to download an informative white paper for security and network architects on designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks. 9:45 - 10:05: BYOD Bring Your Own Device, High-Speed Wireless, 802.11n/ac Migration with Xirrus Gartner estimates that manufacturers will ship one billion smartphones and 184 million tablets this year. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Learn how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/4G wireless strategy for your mobile workers. 10:05 - 10:25: User-Driven Virtualization Stratgies and Platforms with Appsense From Bring Your Own Device, to Bring Your Own App, Bring Your Own Cloud, Bring Your Own Identity......through to Bring Your Own ‘You’, people are now using technology to create their own set of tools to do their job. This is the new IT world - focusing on the user and not the device/hardware - and if leveraged effectively, can have a fundamental and positive impact on business. And not just newbies coming into the workforce. Appsense's approach to user virtualization is driven by this user-centric thinking. It unlocks the user from their devices, their operating systems and applications. For the first time, IT managers only need to manage a single layer of an individual’s digital existence, instead of an exploding number of devices and applications, with millions of potential user configurations. Its policy templates can manage thousands of users; automatically and intelligently re-configuring for each device, location and application, with massive improvements in security and reliability. User virtualization means people can now choose the device that suits them, instead of the application choosing the device. That’s why thousands of people at leading, forward-thinking companies rely upon Appsense to free IT staff from the ever-growing burden of user complexity. They’ve liberated their workforce from device-based technology. Their workforce has become the technology. Break, Product Demonstrations, Exhibit Area Open, Peer Networking 11:05 - 11:25: Flash Technology and Hybrid Storage Architecture with Fusion-io For decades, CPU manufacturers have innovated to increase processing power and performance, while disk-drive manufacturers have focused on increasing capacity. These contrasting goals have exacerbated a utilization problem with today’s IT infrastructures. CPUs have tremendous processing power that can perform billions of calculations per second. So much so that until recently, applications couldn’t leverage CPU performance efficiently. Virtualization has made it possible to run many applications on multicore processors, promising new levels of utilization efficiency and consolidation. While disk drives deliver the capacity needed for these applications, their performance capabilities have not kept up with today’s requirements. Further complicating the matter, virtualization randomizes the aggregate I/O, creating what is often referred to as the I/O blender effect. For shared storage, this is the most difficult type of workload to handle. Thus, the failure of disk drives to deliver performance to I/O hungry applications in a timely manner results in processors being greatly underutilized, and limits the consolidation potential of virtualization. While flash offers the requisite raw performance, it must be engineered and implemented correctly to deliver this performance to applications. Fusion-io has done this, by taking what was traditionally a consumer technology and transforming it into an enterprise solution. Many storage vendors have implemented flash as simply a faster disk drive in the form of an SSD. While this provides a modest performance gain, implementing flash as a persistent memory tier is the best way to deliver consistently fast performance to applications. In addition, unlike SSDs, which protect reliability with traditional RAID technology, Fusion-io’s flash memory products use Adaptive Flashback to protect data without excessive overprovisioning. Fusion-io architecture is unique and takes advantage of flash’s architectural differences, allowing companies to maximize the performance of flash technology while delivering enterprise-grade reliability. 11:25 - 11:45 Backup/Disaster Recovery/Business Continuity for VMware and Hyper-V with Veeam Today's IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization™ and the Cloud—a perfect fit for the modern data center. Veeam Backup & Replication delivers backup, recovery and replication for VMware and Microsoft Hyper-V. This #1 VM Backup™ solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam's advanced monitoring and reporting capabilities help organizations of all sizes protect virtualization, increase administrator productivity and mitigate daily management risks. Its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft. 11:45 - 12:05: Dell Backup/DR/Data Protection for Physical, Virtual, Cloud and Other Platforms Dell offers a broad portfolio of scalable solutions to protect data and deliver rapid recoverability across physical, virtual and cloud environments. Working with regional partners, its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. With tools and improved replication off site, you will learn about ways to improve your existing backup and disaster recovery strategy: • Review trends in data protection, based on current IT needs and how cloud hosting, big data and an increasingly mobile workforce affects your business continuity plans • Protect legacy physical servers plus virtual/cloud data across multiple platforms • Get data offsite to your DR facility and/or the cloud 12:05 - 12:25: Next-Generatio Data Center Infrastruture and Virtual Computing Platforms with Nutanix Nutanix delivers web-scale IT infrastructure to medium and large enterprises with its software-driven Virtual Computing Platform, natively converging compute and storage into a single solution to drive unprecedented simplicity in the datacenter. Customers can start with a few servers and scale to thousands, with predictable performance and economics. With a patented elastic data fabric and consumer-grade management, Nutanix is the blueprint for application-optimized and policy-driven infrastructure. 12:25 - 1:40: Silver Peak WAN Optimization and Application Performance/Delivery Top IT organizations around the globe choose Silver Peak WAN optimization to overcome network performance challenges and lower ongoing WAN costs. Its solutions stands out for its: - Virtual flexibility . Silver Peak offers the industry’s only multi-gigabit virtual WAN optimization solution that supports every major hypervisor. - Highest capacity . With the broadest range of physical and virtual products, cost-effective solutions are available for the smallest branch offices, the largest data centers, and everything in between. - Any application . Silver Peak works on all applications, regardless of transport protocol or version, without risk of corrupting data or altering behavior. No plug-ins are required, which expedites deployment and saves both time and money. Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations 1:40 - 2:00: User-Centric and Self-Service IT Management with LANDesk LANDesk's systems management platform complements your wi-fi/network infrastructure and provides greater freedom, productivity and choice for the user, together with cost-effective control for IT, to make mobility and BYOD rollouts even more successful across your organization. It no longer matters how many devices your employees use or bring to work. With LANDesk, users have the freedom to choose their preferred smartphone/tablet/laptop and can access the necessary mobile tools and applications to maximize their productivity. Most importantly and strategically, you can configure this "self-service" access to IT services with the appropriate level of control and oversight. IT management will no longer be burdened by tedious and costly requests, freeing up resources and time for more strategic projects. 2:00 - 2:15: Verizon Wireless : The "Internet of Things" and Machine-to-Machine (M2M) Wireless Communications It is projected that 50 Billion "Things" will be connected on the web by 2020, chaning the way we live and do business. The fastest growing segment in cellular industry is no longer the smartphone; but rather, the plethora of other devices offering valuable information by connecting to the wireless Internet. Machine-to-Machine (M2M) technologies can automate the way you work by using sensors and devices to consistently exchange and capture data. IT departments can improve customer service and overall financial/organizational performance by providing marketing/line-of-business executives with the data - and automatic analysis of the data - leading to better decisions. 2:15 - 2:45: Microsoft Windows Azure Cloud & Infrastructure Services Cloud computing in its broadest sense is the usage of external IT resources. Microsoft will provide an overview of cloud computing options/strategies, plus discuss their Azure and Hyper-V cloud/virtualization platforms: - Distinction between private cloud and virtualized/in-house data center - Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite? - Tradeoff between purchasing public cloud services (operating expenses) versus expanding internal IT infrastructure (capital spending) - Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a public cloud provider to handle peak/high-volume customer web demand only? - Recommendations for an integrated or hybrid public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications - Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards - Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be defined. Windows Azure is a cloud solution platform with a set of capabilities enabling IT to define, deploy, and manage workloads. This presentation provides an opportunity to witness the capabilities in action by demoing the deployment of an application architecture in a self-service manner in minutes with Windows Azure. End of Event, Raffle Drawings for Gift Cards and Other Great Prizes FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at firstname.lastname@example.org. What are my transport/parking options getting to the event Angelbeat has arranged for complimentary self-parking for all attendees. Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. Where can I contact the Angelbeat event team with any questions? Please email email@example.com with any questions.
Created by eventbrite | Claim this event
|Check Site||Buy Now|
4140 Executive Pkwy.
Westerville, OH 43081