San Francisco, California
London, United Kingdom
This comprehensive and tightly-focused 1/2 day seminar (with a full hot lunch) covers the increasingly related topics of wireless/byod, private/public cloud architecture, virtualization/SDN (software defined network) and hosted/cloud-powered unified communications/voice applications. Angelbeat coordinates expert speakers from Avaya, VMware, Microsoft, AT&T, McAfee, Shoretel and other leading firms listed below - scroll down to see the full agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”
Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Meals including a full hot lunch, Wi-Fi and parking are provided at no charge.
Join your peers from JEA, CSX, Landstar, Everbank, Lender Processing Services, Diversified Service Options, FIS Global, Bank of America, Florida Capital Bank, Citi, Honeywell, Haskell, Kemper, Convergys, ADT, Worksource, Miller Electric, Regency Centers, River Garden, City of Fernandina Beach, City of Palm Coast, City of Jacksonville, University of North Florida, Trinity Baptist Church, Mayo Clinic, Borland-Grover Clinic, Florida Blue, Florida School Boards Insurance Trust (FSBIT) and many more leading organizations who are confirmed attendees.
7:30 - 8:40: Breakfast, Registration, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00 Big Data Security, Security Information and Event Management (SIEM) Solutions that Identify and Help Stop Today's Hackers, with McAfee
Every year the threat landscape gets more sophisticated. In the early 2000s, when the world was getting online, attacks were much easier to spot. Executed mostly by Amateurs, the lack of security technology allowed them to be noisy. Unsophisticated detection techniques allowed common attacks to be run off of scripts that were shared within the hacker community. In addition, the business of black market data was in its infancy – leaving the majority of attacks to be untargeted and focused on curiosity and mischief. Over the past 10 years, security technology has become more sophisticated. Intrusion prevention systems now inspect packets and files, endpoint security has moved beyond simple Anti-virus to comprehensive security suites and organizations have learned that looking at security activity is important.
As security has grown more sophisticated, so has the business of cybercrime, the attackers and the techniques used to steal data, take down systems, and perform hacktivism. Attackers are now professionals – and the tools they use, such as Zeus, have followed suit. Attacks today are stealthy and targeted with a purpose. No longer can prevention techniques alone serve to protect enterprises. Finding this new “needle in a stack of needles” requires an intelligent use of security data.
McAfee will discuss its latest event data collection program, which goes well beyond firewall and IDS events and adds data, application and system relevance, ensuring that organizations can truly gain actionable intelligence.
9:00 - 9:30: BYOD/Wireless, Mobile Device Management, Cloud-based VoIP/Unified Communications Platforms, with AT&T, Liveops, Shoretel, Quorum, Ruckus Wireless, IPC
During the last year, Apple sold 150 million iPhones and 70 million iPads, while Google and its partners sold over 200 million Android-powered devices. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Network and security personnel will learn how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/cellular wireless strategy that maximizes mobile worker productivity, in a secure and cost-effective manner.
With a robust and secure wireless infrastructure now in the place, the final section focuses on cloud-based or hosted applications. The growing importance of unified communication applications in today's always-on, always-connected world is widely accepted by all IT professionals. Understand the evolution of telephone systems - from premise-based PBX or VoIP installations to hosted or cloud-based delivery platforms - and see what changes are recommended within your own organization, based on workforce demographics. See how you can provide your employees with a common unified communications and video platform, with the same user interface across all desktop, smartphone, laptop and tablet devices. See how Shoretel's docking station seamlessly converts your iPad/tablet into an enterprise-class communications/telephone system, untethering your mobile workers from their desktop phone. Learn how to combine Twitter, Facebook, YouTube and other social networking applications with email, instant messaging, voice mail, call center and traditional telephone communications, further increasing the productivity of your workforce and enhancing customer service.
9:30 - 9:50: Video Communication Challenges and Solutions with Avaya
This section will provide detailed information on challenges and solutions tied specifically to video solutions in the workplace. Video now has widespread application/usage in organizations of all sizes, not just for teleconferencing to reduce air travel expenses but for many uses tied to customer service and collaboration. To successfully deployment video, you must address several unique challenges. A 1/2 second delay in email traffic goes unnoticed while this latency creates choppy and unacceptable video quality, especially in HD. Avaya experts will share with you best practices and recommendations to seamlessly integrate video into your network architecture and workforce applications.
9:50 - 10:10: User-Centric and Self-Service IT Management with LANDesk
LANDesk's systems management platform complements your wi-fi/network infrastructure and provides greater freedom, productivity and choice for the user, together with cost-effective control for IT, to make mobility and BYOD rollouts even more successful across your organization.
It no longer matters how many devices your employees use or bring to work. With LANDesk, users have the freedom to choose their preferred smartphone/tablet/laptop and can access the necessary mobile tools and applications to maximize their productivity. Most importantly and strategically, you can configure this "self-service" access to IT services with the appropriate level of control and oversight. IT management will no longer be burdened by tedious and costly requests, freeing up resources and time for more strategic projects.
10:10 - 10:40 Microsoft Windows Azure Cloud & Infrastructure Services, Windows 8.1
Cloud computing in its broadest sense is the usage of external IT resources. Microsoft will provide an overview of cloud computing options/strategies, plus discuss their Azure and Hyper-V cloud/virtualization platforms:
- Distinction between private cloud and virtualized/in-house data center
- Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite?
- Tradeoff between purchasing public cloud services (operating expenses) versus expanding internal IT infrastructure (capital spending)
- Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a public cloud provider to handle peak/high-volume customer web demand only?
- Recommendations for an integrated or hybrid public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications
- Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards
- Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be defined.
Windows Azure is a cloud solution platform with a set of capabilities enabling IT to define, deploy, and manage workloads. This presentation provides an opportunity to witness the capabilities in action by demoing the deployment of an application architecture in a self-service manner in minutes with Windows Azure.
Microsoft will also preview Windows 8.1, which now includes a start button and other widely-requested features that were not part of the initial product launch.
Break, Product Demonstrations, Exhibit Area Open, Peer Networking
11:30 - 12:00: VMware: Private/Public Hybrid Cloud, Software Defined Data Center and Virtual Desktops/End User Computing
VMware and its partner Virtualization Performance will first discuss their vCloud® Hybrid Service™ (vCHS) , an exciting hybrid cloud offering. vCHS is a VMware owned and operated external cloud offering that uses the same software stack as our customers and thus provides unmatched operational efficiencies that reduce operational complexity, risk and TCO. In essence, it is infrastructure as a service (IaaS) or capacity on demand recognized in an OpEx model that will enable firms to easily and confidently execute your Hybrid Cloud strategy. (Throughout this session, you will also get insights on securing virtual/cloud environments from Palo Alto Networks.)
Along with inherent data center compatibility and agility benefits, vCloud Hybrid Service offers:
- Seamless networking, burstable traffic and security (use your same IP and MAC addresses, FW, LB, NAT and VXLAN).
- Common management and orchestration platform (automation and provisioning) that spans on-premise and off-premise.
- No changes to new or legacy applications - move workloads to and from our external cloud without having to make any changes to the VM, vApp, network configurations or security policies.
- VMware world class support
Enterprises worldwide have used VMware vSphere® to significantly improve IT efficiency and performance, yet the mobile cloud era presents new challenges. To meet this challenge, IT organizations need to virtualize the rest of the data center so all infrastructure services become as inexpensive and easy to provision and manage as virtual machines.
The answer is the software-defined data center (SDDC): the ideal architecture for private, public, and hybrid clouds. Pioneered by VMware and recognized by the industry and analysts alike, SDDC extends the virtualization concepts you know— abstraction, pooling and automation — to all data center resources and services. Components of the SDDC can be implemented together, or in phases:
- Compute virtualization, network virtualization and software-defined storage deliver abstraction, pooling and automation of the compute, network, and storage infrastructure services.
- Automated management delivers a framework for policy-based management of data center application and services.
In a software-defined data center, policy-driven automation enables provisioning and ongoing management of logical compute, storage and network services. The result is unprecedented IT agility and efficiency, with flexibility to support today and tomorrow’s hardware and applications. Benefits include:
- Virtualization economics across your data center: Software-defined data center technology helps attain new levels of infrastructure utilization and staff productivity, substantially reducing both capital expenditures and operating costs.
- Applications at business speed: Enabling deployment of applications in minutes or even seconds with policy-driven provisioning that dynamically matches resources to continually changing workloads and business demands.
- Business-aware IT control: Driving right availability, security and compliance for every application via automated business continuity, policy-based governance and virtualization-aware security and compliance.
- Your data center on your terms: The software-defined data center can be leveraged as a private, hybrid or public cloud—in each case, infrastructure is fully abstracted from applications so they can run on multiple hardware stacks, hypervisors and clouds.
The final section of this VMware keynote will focus on today's modern, mobile workforce, which demands access that extends mobility and productivity beyond traditional confines. What users now need to be productive is a virtual workspace: a central hub for accessing all of their desktops, business applications, services and files. VMware's Horizon family of products transforms desktops, business applications and data into centrally managed IT services, so IT can deliver a consistent, intuitive end-user experience across multiple devices—anytime, anywhere.
Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations
End of Event, Raffle Prize Drawings
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at email@example.com.
What are my transport/parking options getting to the event
Angelbeat has arranged for complimentary self-parking for all attendees.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
Where can I contact the Angelbeat event team with any questions?
Please email firstname.lastname@example.org with any questions.
When & Where
Ronald J. Gerber is the CEO of Angelbeat, Founder of Gerber & Company, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates via social media on Gerber and Angelbeat (common hashtag #angelbeat), click here for Twitter, Linkedin, Facebook, Youtube, and Instagram, plus read Gerber's widely-respected blog at angelbeat.tumblr.com.
Angelbeat is the largest technology event company in North America, based on its 109-city 2015 geographic coverage, and has held over 1,000 seminars since its founding in 1999. These forums bring together thousands of IT professionals with global technology leaders from Microsoft, Intel, VMware, Citrix, Amazon, Google, HP, Dell, Verizon Wireless, Juniper, Cisco and many others. Content is updated annually and focus on the related areas of security/compliance, cloud/virtualization/sdn, storage/backup/infrastructure/data center, network/wireless/mobility/voip and big data/hadoop/Internet-of-Things. To complement their participation in live programs, IT vendors use Angelbeat's 300K contact database for webinar promotions, email blasts and online/social media campaigns.
Through these activities Ron Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on the mobility and security topics for the New York Times. Further details are available at www.angelbeat.com.
Before starting Angelbeat, Ron Gerber founded and managed Gerber & Company (“GC”), a specialized event firm holding sponsor-funded training in non-IT fields. GC held seminars for government inspectors on new building codes that were supported by construction firms, for example.
Ron Gerber served as an M&A/restructuring consultant to $4 billion Harris Corporation (NYSE:HRS), leading to a spin-off of its Authentec biometric fingerprint unit (purchased by Apple in 2012), Terion wireless two-way dispatch system for fleet management, and Intersil semiconductor operations specializing in Wi-Fi 802.11 chipsets. For $2 billion Systemax (NYSE:SYX), Gerber negotiated and implemented their ISP partnership with MSN, auction alliance with Amazon and on-line financial services tie with USABancShares.com.
From 1992 to 1996, Mr. Gerber worked for Honeywell, holding senior management positions including Vice President of Marketing, Vendor Relationships and Purchasing for its $1.2 billion ADI distribution subsidiary and Vice President, Business Development for its Ademco security manufacturing subsidiary. He launched their website, coordinated biometric initiatives such as incorporating voice recognition technology in alarm equipment, expanded sales of wireless alarm systems using low-cost, high-reliability and low-data-content transceivers, created new marketing programs for its Alarmnet wireless/cellular alarm monitoring network, developed an OEM spread spectrum product for high-reliability, low cost and low data content applications, advised its Cylink affiliate on new markets for its encryption technology and divestiture of its high data content wireless transmission business unit and structured an innovative home networking joint venture with Microsoft, Comcast and PG&E.
From 1988 to 1992, Mr. Gerber worked for the AVX Kyocera Corporation (NYSE:AVX). Gerber was in charge of and led a successful turnaround of its $400M Surface Mount Manufacturing Division, reversing a (10%) loss to 9% profitability in just two years while growing sales by 30%. Key customers included the world’s leading telecommunication firms such as Lucent, Nortel, IBM, Motorola, etc. Many of its products were used for military and NASA/satellite applications. He has also worked for Accenture.
Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York and previously served as President of both the Harvard Business School Club of New York and the Harvard Business School Club of Dallas.
Ron Gerber can be reached at email@example.com or 516-277-2057 . He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd. The Gerber’s reside in Long Island, New York.