This comprehensive and tightly-focused seminar including a full hot lunch covers the increasingly related topics of security/compliance, wireless/byod/network, storage/cloud/virtualization and big data/infrastructure. Angelbeat coordinates expert speakers from many leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 5 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”
Join your peers from the University of Tulsa, University of Oklahoma Health Sciences Center, Oral Roberts University, Meridian Tech, Oneok, Williams, Mid-Continent Group, Mill Creek Lumber, Rheem, PennWell, Case, Trase Miller, Helmerich & Payne, Tulsa Winch, Muscogee Creek Nation, Buffalo Run Casino, Associated Mortgage, Graham-Roders, BTC, American Airlines, Parent Child Center, St. John Health, Parkside Hospital, Blue Cross Blue Shield, City of Tulsa, Tulsa County, Tulsa Schools, Sapulpa Schools and many more leading organizations who have already signed up.
Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Click here to read speaker biographies. Meals, Wi-Fi and parking are provided at no charge. There are raffle drawings at the end for an iPad, HP Slate 7 and gift cards.
7:30 - 8:40: Breakfast, Registration, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 8:55: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.
Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.
8:55 - 9:15: Next-Generation Firewall Architecture, Preventing Zero Day Attacks, with Palo Alto Networks
Palo Alto Networks has pioneered the next generation of network security with an innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is its next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
The Palo Alto platform uniquely offers IT Professionals the ability to identify, control, and safely enable applications while inspecting content for all threats and malware, all the time, including zero-day attacks. These capabilities, combined with superior performance, surpass all traditional approaches including UTM and software blade. This approach allows you to simplify your network security infrastructure and eliminate a variety of stand-alone and bolt-on security devices. With an increasingly diverse workforce, this platform can address a broad range of your network security requirements - from your datacenter to your enterprise perimeter, to the far edges of your network and more - including branch offices and mobile devices.
9:15 - 9:35: Mobile Security Solutions from Kaspersky, Thin Client/Wyse Solutions for VDI from Dell
Kaspersky Security for Mobile is a new application based on a uniform set of world-class anti-malware and other core technologies. It offers easy-to-use, easy-to-manage security to protect confidential data on corporate mobile devices from loss, theft, unauthorized access and malware, wherever your employees travel, with features such as Encryption, Anti-Virus, Firewall, and Anti-Spam for Voice & SMS, plus Anti-Theft with remote lock / wipe and GPS tracking capabilities.
Dell Wyse is the global leader in Cloud Client Computing. The Dell Wyse portfolio includes industry-leading thin, zero and cloud PC client solutions with advanced management, desktop virtualization and cloud software supporting desktops, laptops and next generation mobile devices. Cloud client computing replaces the outdated computing model of the unsecure, unreliable, energy-intensive and expensive PC, all while delivering lower TCO and a superior user experience. Dell Wyse has shipped more than 20 million units and has over 200 million people interacting with their products each day, enabling the leading private, public, hybrid and government cloud implementations worldwide.
9:35 - 9:50: Understanding Security Challenges in Application Delivery from F5
Securing technology is an age-old struggle. As attackers have moved ‘up the stack’, applications have become the target for more sophisticated attacks. The next attacker will most likely be talking through a secured connection and acting like a real client; are you prepared to handle their intrusion attempts? Learn from F5 how to guarantee secure application delivery with no performance/QoS impact.
9:50 - 10:05: BYOD Bring Your Own Device, High-Speed Wireless, 802.11n/ac Migration with HP
Gartner estimates that manufacturers will ship one billion smartphones and 184 million tablets this year. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Learn from HP how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/4G wireless strategy for your mobile workers.
10:05 - 10:35: HP Software Defined Networks (SDN) and Deployment Scenarios with Resilient
HP Software-Defined Networking (SDN) provides an end-to-end solution to automate the network from data center to campus and branch.
The world is moving faster than ever. Transactions must be processed at lightning speed. Mountains of data must be transformed into insights. Customers want exceptional service. Employees want access to information and applications from any device. Delivering on those expectations requires data centers that are more powerful, agile, and automated than ever before, and a campus environment that responds to a dynamic and changing workforce.
Server and storage architectures have modernized to keep pace with the unyielding expectations of an always-on world, but the underlying network has not. The data center network itself, while certainly bigger and faster, has largely been built the same way for two decades. Evolution of campus networks has been slow, despite the mobility revolution. Whether in the data center or on the campus, when legacy networks are pushed to the limit, they become fragile, difficult to manage, vulnerable, and expensive to operate. Manual configuration and operation simply won’t scale to the demands of today’s applications, users, and business requirements. Businesses whose networks are at this breaking point risk missing the next wave of opportunity.
This session provides an overview of the HP Virtual Application Networks (VAN) SDN Controller and how HP is fostering the development of a vibrant SDN ecosystem to help enterprises, cloud providers, and developers unleash new levels of automation and efficiency in data center and campus networks.
It will conclude with Resilient Intelligent Networks, a strategic partner of HP, discussing how to deploy SDN solutions in your environment, covering topics such as compatibility across multiple vendors and various hardware/software platforms.
Break, Product Demonstrations, Exhibit Area Open, Peer Networking
11:15 - 11:35 Flash Primary Storage with Pure
Flash storage has revolutionized everything from smart phones and mobile computers, to web searches and social media. Unfortunately, it’s been nearly impossible to deploy flash across a data center without breaking the bank. Pure Storage has cracked the code and destroyed the disk status quo. We made all-flash storage affordable enough to use broadly across any enterprise. We believe every company should enjoy the performance, space and efficiency advantages of flash as well as the lower maintenance, power, cooling, rack space and management costs. With Pure Storage, your business can achieve things that weren’t even imaginable with disk. No more wondering how much data you can analyze, how fast you can respond to a customer, or how quickly you can launch a new service. It’s time to unlock the productivity and creativity of your company while delivering a responsive experience to both customers and employees. All applications. All customers. All budgets.
11:35 - 11:55 Backup/Disaster Recovery/Business Continuity for VMware and Hyper-V with Veeam
Today’s IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization™ and the Cloud—a perfect fit for the modern data center.
Veeam Backup & Replication delivers backup, recovery and replication for VMware and Microsoft Hyper-V. This #1 VM Backup™ solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam's advanced monitoring and reporting capabilities help organizations of all sizes protect virtualization, increase administrator productivity and mitigate daily management risks. Its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft.
11:55 - 12:15: Data Management/Governance from Commvault
Simpana® software solutions from Commvault enable organizations of all sizes to protect, manage, search and access data across the enterprise. This single-platform software takes a holistic approach to data management, with a flexible and extensible architecture that helps enterprises to reduce risk, improve operational efficiencies, cut costs and derive more value from their data and information. Learn how to modernize your data protection and management operations without the complexity of multiple point products and silos, and discover the unparalleled advantages of its singular information management approach. Understand how you can help transform your business by turning managed data into an easily accessible asset, while dramatically reducing IT costs.
In 2013 both Gartner and Forrester named CommVault a "Leader" based on its vision, strategy, and innovative Simpana 10 software. Click here to download the Gartner magic quadrant report and here to download a Commvault Efficient Data Management whitepaper
12:15 - 12:30: ROI of Performance Management with Network Instruments
Network downtime and delay can cause companies to lose billions of dollars every year. According to an Aberdeen Group Report, the average downtime cost per hour in 2012 was over $150,000. Application challenges wreak havoc with their complex and highly distributed nature. When something goes wrong, it is often difficult and time-consuming to find the root of the problem. Technologies like cloud and virtualization can compound these issues by reducing visibility even further, making it critical for companies to take a proactive role in their network monitoring solutions.
In this session, you’ll learn monitoring strategies for a variety of technologies, how to utilize reports and views associated with Performance Management solutions, troubleshooting workflows and perhaps most importantly, building an irrefutable business case for better Performance Management in your organization.
Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations
1:15 - 1:45 Microsoft Windows Azure Cloud & Infrastructure Services, Windows 8.1
Cloud computing in its broadest sense is the usage of external IT resources. Microsoft will provide an overview of cloud computing options/strategies, plus discuss their Azure and Hyper-V cloud/virtualization platforms:
- Distinction between private cloud and virtualized/in-house data center
- Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite?
- Tradeoff between purchasing public cloud services (operating expenses) versus expanding internal IT infrastructure (capital spending)
- Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a public cloud provider to handle peak/high-volume customer web demand only?
- Recommendations for an integrated or hybrid public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications
- Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards
- Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be defined.
Windows Azure is a cloud solution platform with a set of capabilities enabling IT to define, deploy, and manage workloads. This presentation provides an opportunity to witness the capabilities in action by demoing the deployment of an application architecture in a self-service manner in minutes with Windows Azure.
Microsoft will also preview Windows 8.1, which now includes a start button and other widely-requested features that were not part of the initial product launch.
1:45 - 2:15: VMware: Private/Public Hybrid Cloud, Software Defined Data Center and Virtual Desktops/End User Computing
VMware will first discuss their vCloud® Hybrid Service™ (vCHS) , an exciting hybrid cloud offering. vCHS is a VMware owned and operated external cloud offering that uses the same software stack as our customers and thus provides unmatched operational efficiencies that reduce operational complexity, risk and TCO. In essence, it is infrastructure as a service (IaaS) or capacity on demand recognized in an OpEx model that will enable firms to easily and confidently execute your Hybrid Cloud strategy.
Along with inherent data center compatibility and agility benefits, vCloud Hybrid Service offers:
- Seamless networking, burstable traffic and security (use your same IP and MAC addresses, FW, LB, NAT and VXLAN).
- Common management and orchestration platform (automation and provisioning) that spans on-premise and off-premise.
- No changes to new or legacy applications - move workloads to and from our external cloud without having to make any changes to the VM, vApp, network configurations or security policies.
- VMware world class support
Enterprises worldwide have used VMware vSphere® to significantly improve IT efficiency and performance, yet the mobile cloud era presents new challenges. To meet this challenge, IT organizations need to virtualize the rest of the data center so all infrastructure services become as inexpensive and easy to provision and manage as virtual machines.
The answer is the software-defined data center (SDDC): the ideal architecture for private, public, and hybrid clouds. Pioneered by VMware and recognized by the industry and analysts alike, SDDC extends the virtualization concepts you know— abstraction, pooling and automation — to all data center resources and services. Components of the SDDC can be implemented together, or in phases:
- Compute virtualization, network virtualization and software-defined storage deliver abstraction, pooling and automation of the compute, network, and storage infrastructure services.
- Automated management delivers a framework for policy-based management of data center application and services.
In a software-defined data center, policy-driven automation enables provisioning and ongoing management of logical compute, storage and network services. The result is unprecedented IT agility and efficiency, with flexibility to support today and tomorrow’s hardware and applications. Benefits include:
- Virtualization economics across your data center: Software-defined data center technology helps attain new levels of infrastructure utilization and staff productivity, substantially reducing both capital expenditures and operating costs.
- Applications at business speed: Enabling deployment of applications in minutes or even seconds with policy-driven provisioning that dynamically matches resources to continually changing workloads and business demands.
- Business-aware IT control: Driving right availability, security and compliance for every application via automated business continuity, policy-based governance and virtualization-aware security and compliance.
- Your data center on your terms: The software-defined data center can be leveraged as a private, hybrid or public cloud—in each case, infrastructure is fully abstracted from applications so they can run on multiple hardware stacks, hypervisors and clouds.
The final section of this VMware keynote will focus on today's modern, mobile workforce, which demands access that extends mobility and productivity beyond traditional confines. What users now need to be productive is a virtual workspace: a central hub for accessing all of their desktops, business applications, services and files. VMware's Horizon family of products transforms desktops, business applications and data into centrally managed IT services, so IT can deliver a consistent, intuitive end-user experience across multiple devices—anytime, anywhere.
End of Event, Raffle Prize Drawings for an iPad, HP Slate 7 and gift cards!
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at firstname.lastname@example.org.
What are my transport/parking options getting to the event
Angelbeat has arranged for complimentary self-parking for all attendees.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
Where can I contact the Angelbeat event team with any questions?
Please email email@example.com with any questions.
When & Where
Ronald J. Gerber is the CEO of Angelbeat, Founder of Gerber & Company, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates via social media on Gerber and Angelbeat (common hashtag #angelbeat), click here for Twitter, Linkedin, Facebook, Youtube, and Instagram, plus read Gerber's widely-respected blog at www.angelbeat.com.
Angelbeat is the largest technology event company in North America, based on its 100+ city 2015 geographic coverage, and has held over 1,000 seminars since its founding in 1999. These forums bring together tens of thousands of IT professionals with global technology leaders from Microsoft, Cisco, VMware, Citrix, Amazon, Google, HP, Dell, Juniper and many others. Content is updated annually and focus on the related areas of security/compliance, cloud/virtualization/sdn, storage/backup/infrastructure/data center, network/wireless/mobility/voip and big data/hadoop/Internet-of-Things. To complement their participation in live programs, IT vendors use Angelbeat's 350K contact database for webinar promotions, email blasts and online/social media campaigns.
Through these activities Ron Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on the mobility and security topics for the New York Times. Further details are available at www.angelbeat.com.
Before starting Angelbeat, Ron Gerber founded and managed Gerber & Company (“GC”), a specialized event firm holding sponsor-funded training in non-IT fields. GC held seminars for government inspectors on new building codes that were supported by construction firms, for example.
Ron Gerber served as an M&A/restructuring consultant to $4 billion Harris Corporation (NYSE:HRS), leading to a spin-off of its Authentec biometric fingerprint unit (purchased by Apple in 2012), Terion wireless two-way dispatch system for fleet management, and Intersil semiconductor operations specializing in Wi-Fi 802.11 chipsets. For $2 billion Systemax (NYSE:SYX), Gerber negotiated and implemented their ISP partnership with MSN, auction alliance with Amazon and on-line financial services tie with USABancShares.com.
From 1992 to 1996, Mr. Gerber worked for Honeywell, holding senior management positions including Vice President of Marketing, Vendor Relationships and Purchasing for its $1.2 billion ADI distribution subsidiary and Vice President, Business Development for its Ademco security manufacturing subsidiary. He launched their website, coordinated biometric initiatives such as incorporating voice recognition technology in alarm equipment, expanded sales of wireless alarm systems using low-cost, high-reliability and low-data-content transceivers, created new marketing programs for its Alarmnet wireless/cellular alarm monitoring network, developed an OEM spread spectrum product for high-reliability, low cost and low data content applications, advised its Cylink affiliate on new markets for its encryption technology and divestiture of its high data content wireless transmission business unit and structured an innovative home networking joint venture with Microsoft, Comcast and PG&E.
From 1988 to 1992, Mr. Gerber worked for the AVX Kyocera Corporation (NYSE:AVX). Gerber was in charge of and led a successful turnaround of its $400M Surface Mount Manufacturing Division, reversing a (10%) loss to 9% profitability in just two years while growing sales by 30%. Key customers included the world’s leading telecommunication firms such as Lucent, Nortel, IBM, Motorola, etc. Many of its products were used for military and NASA/satellite applications. He has also worked for Accenture.
Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York and previously served as President of both the Harvard Business School Club of New York and the Harvard Business School Club of Dallas.
Ron Gerber can be reached at firstname.lastname@example.org or 516-277-2057 . He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd. The Gerber’s reside in Long Island, New York.