San Antonio July 22
Tuesday, July 22, 2014 from 7:30 AM to 3:00 PM (CDT)
San Antonio, TX
San Francisco, California
London, United Kingdom
This comprehensive seminar, including a full hot lunch and ending with a Microsoft keynote, covers the increasingly related topics of security/compliance, mobility/VDI/BYOD, storage/backup/DR and cloud/virtualization/SDN. Angelbeat coordinates expert speakers from many leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”
Join your peers from HEB, Broadway Bank, Farm Bureau Bank, Capital Group, SACU, General Dynamics, L-3 Stratis, L&L Broadcasting, Methodist Healthcare Ministries, River City Imaging, Leidos, UT Health Science Center, UT San Antonio, Texas State University, Texas A&M University, Alamo Colleges, South San Antonio Schools, San Antonio Schools, Northside Schools, La Vernia Schools, Beeville Schools, San Antonio River Authority, Bexar Metro, City of San Antonio, State of Texas, US Air Force and many more leading organizations who are confirmed attendees.
Watch Angelbeat CEO Ron Gerber on Youtube discuss why you should attend. Meals, self-parking and Wi-Fi are provided at no charge.
7:30 - 8:40: Breakfast, Registration, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 8:55: Protection against Phishing Attacks with Kaspersky
Kaspersky is the world’s largest privately held, and among the top four, security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Their talk will focus on protecting your IT infrastructure and confidential data against the latest and most sophisticated phishing attacks.
8:55 - 9:10: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.
Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.
9:10 - 9:30: NO DNS, NO INTERNET, NO BUSINESS; Protect your DNS from attacks and secure your Business with EfficientIP
All business applications rely on DNS: emails, web apps, mobile apps, CRM, etc. Companies cannot neglect security against DNS attacks and afford the impact/damage to their brand/businesses. Unfortunately, according to a recent IDC survey, 98% of businesses are in danger; their DNS security investment is almost nonexistent and/or rely upon basic security solutions that have no effect.
DNS threats are multiple, from DDoS attacks to DNS Cache poisoning or Zero Day Vulnerability. IT departments should be able to answer with different (integrated or not) technologies to mitigate those attacks and secure their business.
EfficientIP will discuss which technologies/products are the best answer for each threat. For instance its SOLIDserver provides 3 DNS engines to stop the impact of any Zero Day Vulnerability, while being able to absorb up to 17 million DNS queries per second in one appliance during a DDoS attack.
9:30 - 9:45: Security/Cloud Demo from iScan Online
iScan Online provides cloud-based security scanning solutions, enabling organizations to scan any endpoint, anytime and anywhere, proactively identifying devices at risk before a data breach occurs.
iScan Online was born in the cloud and provides a secure scalable multi-tenant platform for discovering unencrypted data, vulnerability and compliance scanning, assessing laptops, servers, smartphones and tablets. iScan Online is the recipient of SC Magazine’s Security Industry Innovator of the Year Award and CIO Review Magazine’s Most Promising Top 20 Security Companies of 2014.
Their President/Co-Founder/CTO (and proud Texan) Billy Austin will conduct a live demonstration of this innovation technology during lunch. Billy is a passionate security veteran with over 20 years in the industry and is a frequent speaker on the topics of exploits, threats and regulatory compliance. He has performed numerous security assessments for commercial and government organizations worldwide.
9:45 - 10:00: BYOD Bring Your Own Device, High-Speed 802.11n/ac WiFi, the "Internet of Things", with Xirrus
During 2013, Apple sold 150 million iPhones and 70 million iPads, while Google and its partners sold over 200 million Android-powered smartphones and 130 million tablets, with significantly higher sales expected in 2014. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Network and security personnel will learn how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/cellular wireless strategy that maximizes mobile worker productivity, in a secure and cost-effective manner.
10:00 - 10:20: Virtual Desktop Enablement and Management from VDIworks:
There are many components in a typical Desktop Virtualization system, and these pieces are often provided by different vendors and are not integrated. This segregation can lead to complexity, IT staff training issues, management complexity and vendor management issues. Whether you choose to provide virtual desktops through sessions by using RDS (Remote Desktop Services) or provide a full blown operating system by setting up a VDI (Virtual Desktop Infrastructure), the complexity remains. Tracking down problems in this piece-meal environment is difficult operationally, and it's even harder to get a vendor to accept responsibility as blame shifts from one provider to the other.
An RDS system gives access to windows sessions from a server based operating system (typically windows 2008 or 2012) where multiple users can log on to the same operating system copy having the same software installed on the base OS. The number of users accessing the same OS copy depends on the client access licenses (CAL’s or RDS CAL’s) one has installed on the base machine.>
On the other hand, a VDI system gives users a high performance desktop experience through centralized, virtual machines (VMs). In such a solution each user is guaranteed an independent operating system with their personalized set of software installed. There are multiple benefits to desktop virtualization and this is undoubtedly a trend that will experience significant growth in the immediate future. VDIworks simplifies all the key aspects of a VDI environment, including physical and virtual machines.
For over a decade VDIworks has developed the industry’s most powerful Virtual Desktop Platform (VDIworks’ VDP) which consolidates the protocol, virtual management platform, session broker, and profile & data redirection components into one single platform.
10:20 - 10:40 Flash Primary Storage with Pure
Flash storage has revolutionized everything from smart phones and mobile computers, to web searches and social media. Unfortunately, its been nearly impossible to deploy flash across a data center without breaking the bank. Pure Storage has cracked the code and destroyed the disk status quo, which is facing performance limitations due to physical constraints on spindle speeds. All-flash storage from Pure is now affordable enough to use broadly across any enterprise. Organizations of all sizes can enjoy the performance, space and efficiency advantages of flash plus lower maintenance, power, cooling, rack space and management costs. No more wondering how much data you can analyze, how fast you can respond to a customer, or how quickly you can launch a new service. It’s time to unlock the productivity and creativity of your company while delivering a responsive experience to both customers and employees.
Break, Product Demonstrations, Exhibit Area Open, Peer Networking
11:20 - 11:40: Backup/Disaster Recovery/Business Continuity for VMware and Hyper-V with Veeam
Today's IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable backup, recovery and replication solutions that are Built for Virtualization™ and the Cloud, work on both VMware and Microsoft Hyper-V platforms, and are a perfect fit for the modern data center.
Their solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Built-in advanced monitoring and reporting capabilities help organizations of all sizes increase administrator productivity and mitigate daily management risks, plus its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft.
11:40 - 12:00: Zerto: DR, Backup and Business Continuity for Tier One Virtual Applications
Zerto provides enterprise-class business continuity and disaster recovery (BCDR) solutions for the virtualized infrastructure. Zerto won Best of Show at VMworld 2011, as well as 2011 Product of the Year Gold Award because our software, Zerto Virtual Replication, is the industry’s first hypervisor-based replication solution for tier-one applications. Zerto Disaster Recovery solutions replace traditional array-based BCDR that was not built to deal with virtual environments.
12:00 - 12:20: Software-Defined Networking with Brocade
The increased use of mobile, cloud, and video technologies is placing new performance, capacity, and service demands on the network. As organizations work to meet the demands of increasingly global and virtualized customers, they are realizing the limitations of their hierarchal network infrastructures. In fact, many IT professionals surveyed cite the network as the number one barrier for cloud adoption.
Software-Defined Networking (SDN) offers a way to achieve the network agility required by increasingly virtualized and dynamic applications. SDN is an emerging concept that proposes to disaggregate traditional, vertically integrated networking stacks to improve network service velocity and customize network operations for specialized environments.
In order for SDN to deliver on its full promise, it must be enabled by open networking technology that can be easily integrated with current infrastructures. SDN has potential use cases and benefits for almost every part of the network, so it is important to have SDN-enabled or SDN-ready infrastructure at all points, with the ability to scale to real-world applications.
An early supporter of SDN initiatives, such as OpenFlow and OpenDaylight, Brocade is helping organizations realize the promise of SDN through innovative open and standards-based technologies and solutions. The Brocade approach will enable organizations to ease the transition to SDN and evolve their networks as standards and technologies mature. This flexibility to control the network programmatically will transform the network into a platform for innovation through new applications and services.
12:20 - 12:35: ROI of Performance Management with Network Instruments
Network downtime and delay can cause companies to lose billions of dollars every year. According to an Aberdeen Group Report, the average downtime cost per hour in 2012 was over $150,000. Application challenges wreak havoc with their complex and highly distributed nature. When something goes wrong, it is often difficult and time-consuming to find the root cause of the problem. Technologies like cloud and virtualization can compound these issues by reducing visibility even further, making it critical for companies to take a proactive role in their network monitoring solutions.
In this session, you'll learn monitoring strategies for a variety of technologies, how to troubleshoot workflows and clearly identify the root cause of application/network performance delays, and build an irrefutable business case for better Performance Management in your organization. This content is especially useful as organizations transition away from a local/wired/client-server architecture to hosted/cloud-based applications.
Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations
1:35 - 1:50: Cloud-based Networking & Wi-Fi Management from Adtran
User expectation around Wi-Fi in the enterprise is changing dramatically. Fueled by consumerization, BYOD, and new standards such as 802.11ac, the conventional approach to deploying Wi-Fi is often problematic and cannot satisfy these increasingly higher end user expectations. Recent developments in cloud control, network virtualization and Wi-Fi management are opening up a whole new approach to the deployment of Wi-Fi. In this session, you will learn how cloud-based network management tools are changing Wi-Fi economics and offering much more flexible deployment models.
1:50 - 2:20: Intel Corporate Strategy Keynote, The Changing IT Landscape Through 2020: Chipset Technology Innovations Across Smartphones, Tablets, Laptops, Desktops & Servers, Security & Security Emphasis Driven by McAfee Acquisition
Intel will share its vision of the rapidly changing world of IT, and how its corporate strategy and technology offerings are being enhanced to match these changes. Several of its top experts will discuss chipset innovations across smartphones, tablets, laptops, desktops and servers, compare x86 architecture versus ARM, describe the value of standardizing all devices on a common silicon platform, and how its McAfee acquisition reflects the growing importance of security and software within Intel.
2:20 - 2:50 Microsoft: Windows Azure Cloud and Infrastructure Services
Windows Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed by Microsoft during this informative session:
- Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure.
- Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license.
- Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world.
- Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.
- Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance.
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at email@example.com.
What are my transport/parking options getting to the event
There is complimentary self-parking at the hotel. Detailed driving directions will be sent out to all attendees one week before the event.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
Where can I contact the Angelbeat event team with any questions?
Please email firstname.lastname@example.org with any questions.
When & Where
Ronald J. Gerber is the CEO of Angelbeat, Founder of Gerber & Company, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates via social media on Gerber and Angelbeat (common hashtag #angelbeat), click here for Twitter, Linkedin, Facebook, Youtube, and Instagram, plus read Gerber's widely-respected blog at angelbeat.tumblr.com.
Angelbeat is the largest technology event company in North America, based on its 82-city 2014 geographic coverage (expanding to 109 locations, including Mexico and Canada in 2015), and has held over 1,000 seminars since its founding in 1999. These forums bring together thousands of IT professionals with global technology leaders from Microsoft, Intel, VMware, Citrix, Amazon, Google, HP, Dell, Verizon Wireless, Juniper, Cisco and many others. Content is updated annually and focus on the related areas of security/compliance, cloud/virtualization/sdn, storage/backup/infrastructure/data center, network/wireless/mobility/voip and big data/hadoop/Internet-of-Things. To complement their participation in live programs, IT vendors use Angelbeat's 300K contact database for webinar promotions, email blasts and online/social media campaigns.
Through these activities Ron Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on the mobility and security topics for the New York Times. Further details are available at www.angelbeat.com.
Before starting Angelbeat, Ron Gerber founded and managed Gerber & Company (“GC”), a specialized event firm holding sponsor-funded training in non-IT fields. GC held seminars for government inspectors on new building codes that were supported by construction firms, for example.
Ron Gerber served as an M&A/restructuring consultant to $4 billion Harris Corporation (NYSE:HRS), leading to a spin-off of its Authentec biometric fingerprint unit (purchased by Apple in 2012), Terion wireless two-way dispatch system for fleet management, and Intersil semiconductor operations specializing in Wi-Fi 802.11 chipsets. For $2 billion Systemax (NYSE:SYX), Gerber negotiated and implemented their ISP partnership with MSN, auction alliance with Amazon and on-line financial services tie with USABancShares.com.
From 1992 to 1996, Mr. Gerber worked for Honeywell, holding senior management positions including Vice President of Marketing, Vendor Relationships and Purchasing for its $1.2 billion ADI distribution subsidiary and Vice President, Business Development for its Ademco security manufacturing subsidiary. He launched their website, coordinated biometric initiatives such as incorporating voice recognition technology in alarm equipment, expanded sales of wireless alarm systems using low-cost, high-reliability and low-data-content transceivers, created new marketing programs for its Alarmnet wireless/cellular alarm monitoring network, developed an OEM spread spectrum product for high-reliability, low cost and low data content applications, advised its Cylink affiliate on new markets for its encryption technology and divestiture of its high data content wireless transmission business unit and structured an innovative home networking joint venture with Microsoft, Comcast and PG&E.
From 1988 to 1992, Mr. Gerber worked for the AVX Kyocera Corporation (NYSE:AVX). Gerber was in charge of and led a successful turnaround of its $400M Surface Mount Manufacturing Division, reversing a (10%) loss to 9% profitability in just two years while growing sales by 30%. Key customers included the world’s leading telecommunication firms such as Lucent, Nortel, IBM, Motorola, etc. Many of its products were used for military and NASA/satellite applications. He has also worked for Accenture.
Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York and previously served as President of both the Harvard Business School Club of New York and the Harvard Business School Club of Dallas.
Ron Gerber can be reached at email@example.com or 516-277-2057 . He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd. The Gerber’s reside in Long Island, New York.