" rel="stylesheet">
Skip Main Navigation
Page Content
This event has ended

Fargo August 11

Ron Gerber

Monday, August 11, 2014 from 10:00 AM to 3:15 PM (CDT)

Fargo August 11

Registration Information

Type End Quantity
Angelbeat Fargo August 11 Ended Free  

Who's Going

Loading your connections...

Share Fargo August 11

Event Details

Program Description:
This comprehensive mid-day seminar including a full hot lunch, Microsoft keynote and tablet raffle, covers the increasingly related topics of security/compliance, mobility/BYOD/wireless, storage/backup/DR and cloud/virtualization/SDN. Angelbeat coordinates expert speakers from many leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.

Join your peers from First State Bank of North Dakota, Bank of North Dakota, Bank Forward, Bell State Bank, American Federal Bank, First Community Credit Union, Farmers Union Mutual Insurance, TMI Hospitality, Moore Engineering, Petro-Hunt, Cass County, Clay County, Forum Communications, Lutheran Social Services, West Fargo Schools, Concordia College and many more leading employers who are confirmed attendees.

Angelbeat CEO Ron Gerber on Youtube discuss why you should attend. Meals, self-parking and Wi-Fi are provided at no charge. Given the recent announcement about Russian hackers stealing one billion passwords, you definitely want to attend and learn how to protect your data against the latest threats.


10:00 - 10:45: Registration, Exhibit Area Open, Peer Networking, Product Demonstrations

10:45 - 11:00: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.

Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.

11:00 - 11:20: Protection against DNS-based Attacks Including DDoS from Infoblox
The news is full of stories about disastrously successful cyberattacks. In many cases, the companies attacked have sophisticated security systems in place. So how does this happen when appropriate measures are seemingly taken?

The truth is the bad guys have found a chink in your armor called ‘DNS’ and cybercriminals can exploit it. Layered security, next-generation firewalls, and secure web gateways were not designed to protect DNS against attacks with scary names like “DrDos” and “DNS cache poisoning.”

Infoblox will discuss two solutions to protect your infrastructure. Its Advanced DNS Protection automatically drops the attack traffic while responding to legitimate traffic, plus is continually updated and offers the latest protection against new and emerging attacks as they happen. The Infoblox DNS Firewall protects against DNS-based malware by proactively preventing clients from becoming infected and by disrupting infected clients’ ability to communicate with the Botnet master controller.

11:20 - 11:35: Mobile Information/Device Security with FRSecure and NetWork Center, Inc.
The increased usage of mobile devices such as laptops, tablets, smartphones, and PDA’s are causing a growing unease for IT professionals and management regarding information security. Along with the growth of the BYOD (Bring Your Own Device) movement employed by some firms to trim technology costs, there is an increased risk of confidential business information being accessed, disclosed, distributed or even destroyed.

Learn from Bryan McGowan, security analyst at FRSecure, plus Fargo-based Network Center, about the growing danger of mobile device usage in the corporate environment, plus hear recent case studies of costly security failures. Then get practical recommendations on what you can do to protect your organizations' valuable data. Recent studies by Dimensional Research have found that “customer data stored on mobile devices increased from 47% in 2012 to 53% in 2013. Corporate information on mobile devices through business apps installed on mobile devices saw the greatest increase with a 17% rise from 2012 to 2013”.

11:35 - 11:50: Next Generation Security for Virtualized Datacenters with Bitdefender
Virtual and hybrid cloud environments are increasingly vulnerable to cybercriminals; they rapidly and dynamically change, moving from one host to another, and can remain dormant/offline for extended periods of time. Although not best practice, organizations often deploy typical endpoint antivirus solutions designed for physical platforms. Lacking virtualization awareness and optimization, these traditional solutions greatly increase your security exposure/vulnerability risk and can cause massive degradation of service during periodic maintenance or scanning processes.

BitDefender will discuss how its "Security for Virtualized Environments" product addresses these issues by providing highly-optimized protection with minimal resource requirements. Addressing even the most demanding performance requirements, Bitdefender provides virtualization-smart security, without hampering shared computing and storage pools. Its world-class level of security, plus overall simplicity and flexibility, makes it perfect for your virtualized infrastructure and cloud applications.

11:50 - 12:10: BYOD Bring Your Own Device, High-Speed 802.11n/ac WiFi with Ruckus
During 2013, Apple sold 150 million iPhones and 70 million iPads, while Google and its partners sold over 200 million Android-powered smartphones and 130 million tablets, with significantly higher sales expected in 2014. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?

Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Network and security personnel will learn how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/cellular wireless strategy that maximizes mobile worker productivity, in a secure and cost-effective manner.

12:10 - 12:30: User-Driven Virtualization Stratgies and Platforms with Appsense
In the world of IT today there is an all too familiar problem that companies need to resolve: The balance of giving users the experience they crave while still maintaining control and compliance. In the past this was an easier task as all work was done on company provided PCs. With the constant wave of new technology users are not just asking, they are demanding the ability to work from wherever they want and with whatever they want. IT departments in many organizations are struggling to keep up with concepts like BYOD, Mobile, Cloud, and Virtualization.

AppSense technology allows you to take a new approach to solving this problem. Rather than focusing on management of the device, you can instead turn that focus to managing the users themselves and controlling the critical information important to the organization. With AppSense DesktopNow organizations have a platform to manage Profile, Policy, Privilege, and Data. Now IT can ensure users get a consistent level of experience across all devices, while still maintaining a level of protection for their data and the company.

Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations

1:20 - 1:40: Primary Storage and Flash Technology with Tegile
Tegile is pioneering a new generation of flash-driven enterprise storage arrays that balance performance, capacity, features and price for virtualization, file services and database applications. Its hybrid arrays are significantly faster than legacy arrays and significantly less expensive than all solid-state disk-based arrays. Featuring both NAS and SAN connectivity, these virtual data storage systems are easy-to-use, fully redundant, and highly scalable, plus come with built-in snapshot, replication, near-instant recovery, and virtualization management features.

1:40 - 2:00 Backup/Disaster Recovery/Business Continuity for VMware and Microsoft Hyper-V with Veeam
Today's IT requirements have changed and legacy backup problems - high costs, increased complexity and missing capabilities - are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable backup, recovery and replication solutions that are Built for Virtualization™ and the Cloud, work on both VMware and Microsoft Hyper-V platforms, and are a perfect fit for the modern data center.

Their solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Built-in advanced monitoring and reporting capabilities help organizations of all sizes increase administrator productivity and mitigate daily management risks, plus its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft.

2:00 - 2:20: HP: Software Defined Networks (SDN)
The world is moving faster than ever. Transactions must be processed at lightning speed. Mountains of data must be transformed into insights. Customers want exceptional service. Employees want access to information and applications from any device. Delivering on those expectations requires data centers that are more powerful, agile, and automated than ever before, and a campus environment that responds to a dynamic and changing workforce.

Server and storage architectures have modernized to keep pace with the unyielding expectations of an always-on world, but the underlying network has not. The data center network itself, while certainly bigger and faster, has largely been built the same way for two decades. Evolution of campus networks has been slow, despite the mobility revolution. Whether in the data center or on the campus, when legacy networks are pushed to the limit, they become fragile, difficult to manage, vulnerable, and expensive to operate. Manual configuration and operation simply won’t scale to the demands of today’s applications, users, and business requirements. Businesses whose networks are at this breaking point risk missing the next wave of opportunity.

This session provides an overview of the HP Virtual Application Networks (VAN) SDN Controller and how HP is fostering the development of a vibrant SDN ecosystem to help enterprises, cloud providers, and developers unleash new levels of automation and efficiency in data center and campus networks.

2:20 - 2:30: The Internet of Things (IOT) and Big Data with Verizon Wireless
Today there are more things connected to the Internet than there are people in the world. The explosive growth of "Big Data", machine-to-machine plus machine-to-people mobile communications and the "Internet of Things (IOT)" are creating new opportunities and challenges for IT professionals.

In this session attendees will learn about trends, drivers, applications, architecture and real life IOT case studies. Organizations in all verticals and of all sizes are considering or deploying IOT initiatives to stay competitive, capture new revenue streams, increase efficiency, increase safety and reduce costs.

2:30 - 3:00 Microsoft: Windows Azure Cloud and Infrastructure Services
Windows Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed by Microsoft technical expert/evangelist Keith Mayer during this informative session:

- Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure.
- Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license.
- Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world.
- Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.
- Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance.

End of Event, Raffle Prize Drawings for a Tablet, Gift Cards and other great items!


What are Angelbeat's privacy and optin/optout policies

Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.

However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.

If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.

What are my transport/parking options getting to the event
Angelbeat has arranged for complimentary self-parking, with detailed driving directions and parking instructions to be sent out to all attendees one week before the event.

Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.

As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.

All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.

Where can I contact the Angelbeat event team with any questions?
Please email registration@angelbeat.com with any questions.

Have questions about Fargo August 11? Contact Ron Gerber

When & Where

Radisson Hotel
201 5th St N
Fargo, ND 58102

Monday, August 11, 2014 from 10:00 AM to 3:15 PM (CDT)

  Add to my calendar


Ron Gerber

Ronald J. Gerber is the CEO of Angelbeat, Founder of Gerber & Company, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates via social media on Gerber and Angelbeat (common hashtag #angelbeat), click here for Twitter, Linkedin, Facebook, Youtube, and Instagram, plus read Gerber's widely-respected blog at www.angelbeat.com.

Angelbeat is the largest technology event company in North America, based on its 100+ city 2015 geographic coverage, and has held over 1,000 seminars since its founding in 1999. These forums bring together tens of thousands of IT professionals with global technology leaders from Microsoft, Cisco, VMware, Citrix, Amazon, Google, HP, Dell, Juniper and many others. Content is updated annually and focus on the related areas of security/compliance, cloud/virtualization/sdn, storage/backup/infrastructure/data center, network/wireless/mobility/voip and big data/hadoop/Internet-of-Things. To complement their participation in live programs, IT vendors use Angelbeat's 350K contact database for webinar promotions, email blasts and online/social media campaigns.

Through these activities Ron Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on the mobility and security topics for the New York Times. Further details are available at www.angelbeat.com.

Before starting Angelbeat, Ron Gerber founded and managed Gerber & Company (“GC”), a specialized event firm holding sponsor-funded training in non-IT fields. GC held seminars for government inspectors on new building codes that were supported by construction firms, for example.

Ron Gerber served as an M&A/restructuring consultant to $4 billion Harris Corporation (NYSE:HRS), leading to a spin-off of its Authentec biometric fingerprint unit (purchased by Apple in 2012), Terion wireless two-way dispatch system for fleet management, and Intersil semiconductor operations specializing in Wi-Fi 802.11 chipsets. For $2 billion Systemax (NYSE:SYX), Gerber negotiated and implemented their ISP partnership with MSN, auction alliance with Amazon and on-line financial services tie with USABancShares.com.

From 1992 to 1996, Mr. Gerber worked for Honeywell, holding senior management positions including Vice President of Marketing, Vendor Relationships and Purchasing for its $1.2 billion ADI distribution subsidiary and Vice President, Business Development for its Ademco security manufacturing subsidiary. He launched their website, coordinated biometric initiatives such as incorporating voice recognition technology in alarm equipment, expanded sales of wireless alarm systems using low-cost, high-reliability and low-data-content transceivers, created new marketing programs for its Alarmnet wireless/cellular alarm monitoring network, developed an OEM spread spectrum product for high-reliability, low cost and low data content applications, advised its Cylink affiliate on new markets for its encryption technology and divestiture of its high data content wireless transmission business unit and structured an innovative home networking joint venture with Microsoft, Comcast and PG&E.

From 1988 to 1992, Mr. Gerber worked for the AVX Kyocera Corporation (NYSE:AVX). Gerber was in charge of and led a successful turnaround of its $400M Surface Mount Manufacturing Division, reversing a (10%) loss to 9% profitability in just two years while growing sales by 30%. Key customers included the world’s leading telecommunication firms such as Lucent, Nortel, IBM, Motorola, etc. Many of its products were used for military and NASA/satellite applications. He has also worked for Accenture.

Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York and previously served as President of both the Harvard Business School Club of New York and the Harvard Business School Club of Dallas.

Ron Gerber can be reached at rgerber@angelbeat.com or 516-277-2057 . He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd. The Gerber’s reside in Long Island, New York.

  Contact the Organizer

Interested in hosting your own event?

Join millions of people on Eventbrite.

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.