Denver: Microsoft vs Google Cloud, Security, Infrastructure, Wireless

Event Information

Share this event

Date and Time



Hyatt Place Denver/Cherry Creek

4150 East Mississippi Avenue

Glendale, CO 80246

View Map

Friends Who Are Going
Event description


Angelbeat is hosting this technical seminar where you can learn about the latest developments in private/public/hybrid cloud and infrastructure/data center architecture, and when to expand internally and purchase more storage/network equipment, versus renting capabilities/services from third party/hosted providers. With keynotes by world renown technology evangelists from both Microsoft and Google, you definitely want to attend.

From a security/compliance viewpoint, FireEye will share incredibly valuable insights on how cybercriminals and hackers work, and what you should do to protect confidential data and applications from the latest ransomware, malware and DDoS attacks. Actiance will focus on risks tied to social media applications, including facebook, linkedin, twitter, instagram, etc., which are an increasingly important part of every organization's marketing/business practices - and a newly emerging and often unsecured threat vector. Mist and Glue deliver technical talks on wireless/mobility and network management.

Scroll down to see the full agenda and click on links to see company information and speakers' biographies. Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all participants, which makes the program so worthwhile for technology professionals, business executives, etc.

CEO Ron Gerber's 7 Reasons to attend Angelbeat
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."

Join your peers from the University of Colorado, Denver Water, Denver Airport, City of Littleton, Agilent, SCL Health, CH2M, MusclePharm and many more organizations who are confirmed attendees.

Every attendee receives meals, complimentary WiFi, plus 3 CPE credit hours towards your CISSP or other certification. There are drawings for $100 gift cards and other prizes, at both the start and end of the event (must be present to win).

7:30 - 8:40: Registration Begins, Breakfast and Coffee Served, Exhibit Area Open with Product Demonstrations, Time For Peer Networking/Interaction

8:40 - 9:00: The Latest Ransomware, Malware, DDoS Attacks - How To Protect Confidential Data and IT Infrastructure From Hackers and Cybercriminals with FireEye
The recent WannaCry Ransomware attack in mid-May clearly demonstrates the ever-increasing threat that Hackers and Cybercriminals pose to your organization.

During this technical and highly relevant presentation, you will learn how to protect confidential data, plus maintain the security and reliability of mission critical applications, from FireEye, the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.

9:00 - 9:20: Social Media Security/Compliance with Actiance
Your organization is likely using Facebook, LinkedIn, Twitter, Snap, Reddit, Skype for Business, Salesforce Chatter, Instagram and other social media applications to do business. In fact, these channels have already surpassed email as the primary communications tool for many organizations. So, what are the information security, compliance and data governance implications?

• If you are in a regulated industry, then you likely have an compliance obligation to capture and preserve these tools – just like email
• If you are faced with litigation, you will likely experience the need to discover and produce this information for court
• If you are publicly traded corporation, you need to think how these tools might impact your brand and lead to the misuse of intellectual property - or even worse significant and negative impact on stock price, sales and profit. Consider United Airlines after they dragged a passenger off the plane, which is the top trending topic on social media for days, for all the wrong reasons.
- How are you prepared to deal with encrypted and/or disappearing messaging platforms such as Snap or Signal?

In short, every organization should be thinking of how these new forms of communications can create new business, technology, security, legal, and compliance risks. Learn from Actiance how you can fully harness these rich social communications tools while staying ahead of the risks.

9:20 - 9:40: Multi-Vendor Network Infrastructure Complexity; How to Simplify with Glue Networks
Typical networks have become increasingly complex and require constant attention, especially when there is a multi-vendor architecture/configuration.

To greatly simplify network management, Glue Networks created Gluware, a software-based orchestration platform that reduces life cycle costs and boosts network agility. Bert Soto from Glue Networks will demonstrate how network operations teams can simplify tasks like switch management, ACL, QoS, firewall rules and many other time consuming functions. Gluware makes the network work for operations - not the other way around.

9:40 - 10:00: Smart Wireless for the Smart Device Era with Mist Systems
Wi-Fi isn’t new. But how we use wireless has evolved substantially in recent years thanks to new smart devices, new applications, new wireless technologies - and new user expectations. As Wi-Fi has become more prevalent, it has also become more business-critical.

This makes it essential to simplify Wi-Fi operations and ensure a consistent and reliable Wi-Fi experience across all users. At the same time, Bluetooth Low Energy (BLE) has emerged as a nice complement to Wi-Fi, delivering high value indoor location-based services. With BLE, there is an untapped opportunity to better engage with employees and customers. The key questions then is "How do you build a modern wireless network designed to address the above?"

In this interactive session, Dan Kennison of Mist will discuss this topic in more detail, covering how to:

- Design, implement, and operate a modern wireless network that takes advantage of both Wi-Fi and BLE
- Leverage machine learning and cloud technologies to minimize wireless OPEX through automation
- Use proactive insight and predictive recommendation to ensure a great experience for all Wi-Fi users
- Eliminate physical beacons and site surveys with enterprise-grade BLE
- Explore real use cases for indoor location services like wayfinding, proximity messaging, and asset tracking

Coffee Break, Product Demonstrations and Exhibit Area Open, Peer Interaction

10:30 - 11:10: Private/Public/Hybrid Cloud Strategies, Linux & Windows Containers, Integration with Microsoft Azure
In the opening part of this session Jessica Deen, world renown Technical Evangelist at Microsoft and a dynamic/engaging presenter, will discuss the strategic/financial tradeoff and decision-making process between expanding internal IT resources (capex, buying more network/storage hardware) versus using third party/public cloud/service providers (opex, renting these same capabilities).

Then more technical discussions, starting with the similarities and differences between a container and a virtual machine, followed by a walk through/demonstration of enabling, creating, deploying and managing Linux and/or Windows containers/resources. There will be an evaluation of when to use which containers, why and how. FYI, a container is an isolated and portable operating environment, often viewed as the next evolution of virtualization. It provides a mechanism for IT to deploy services in a portable, repeatable and predictable manner.

For those who are new to containers, this content serves as a jumpstart to accelerate your learning of containers. If you already have experience on Linux containers, the session familiarizes you with the specifics of Windows containers, plus helps bridge and extend your skills for bringing business value to both Linux and Windows communities.

The session ends with a detailed assessment of the top five new features in Microsoft's Azure cloud platform for 2017, and how to integrate your organization's public/private/hybrid cloud and container strategies.

11:10 - 11:50: Google Cloud Platform
The Google Cloud Platform enables organizations of all sizes to build, test and deploy applications on Google’s highly-scalable and reliable infrastructure, choosing from computing, storage and/or application services for your web, mobile and/or backend solutions. Brandon Jung, a top enterprise and technology strategist at Google, will discuss how and why to use this innovative platform, covering the following items:

Run on Google’s infrastructure: Build on the same infrastructure that allows Google to return billions of search results in milliseconds, serve 6 billion hours of YouTube video per month and provide storage for 425 million Gmail users.
Mix and match services: Virtual machines. Managed platform. Blob storage. Block storage. NoSQL datastore. MySQL database. Big Data analytics. Google Cloud Platform has all the services your application architecture needs.
Performance you can count on: Every millisecond of latency matters. Google’s compute infrastructure gives you consistent CPU, memory and disk performance; its network and edge cache serve responses rapidly to your users across the world.
Focus on your product: Rapidly develop, deploy and iterate your applications without worrying about system administration. Google manages your application, database and storage servers so you don’t have to.
Scale to millions of users: Applications hosted on Cloud Platform can automatically scale up to handle the most demanding Internet-scale workloads and scale down when traffic subsides. You pay only for what you use.
Get the support you need: With our worldwide community of users, partner ecosystem and premium support packages, Google provides a full range of resources to help you get started and grow.

End of Event, Raffle Prize Drawings for $100 gift card and other great items!


What are Angelbeat's privacy and optin/optout policies

Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database

However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.

If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.

Who might be available to receive the special Promotional Code and free pass
There is a special promotional code, that will allow you to attend for free, that is limited and only available for end user IT professionals who work in the telecom/network/storage/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals/healthcare providers, pharmaceuticals, insurers, manufacturers, retailers, financial services/banks, real estate, legal/accounting/services, transportation/logistic firms, etc. and use, support, approve and/or are involved in or influence the decision to buy the products and services offered by our sponsors.

Reporters from major newspapers, websites and other media outlets are eligible for a free pass and must submit in advance their media credentials to the event organizer for approval.

All other individuals who are not end user, IT professionals must pay the registration fee.

In all cases Angelbeat reserves the right to accept or reject a registration at its sole discretion.

What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self-parking at the hotel.

What is the dress code
Suggested dress is business casual.

What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

What if I am a government employee and cannot accept free meals and/or win raffle prizes
If you are a government employee and cannot accept free meals, then you can pay Angelbeat $35/person, to cover the cost of meals. Please contact the event organizer at registration@angelbeat.com to arrange payment.

Each sponsoring company/exhibitor handles its own raffle prize drawing; Angelbeat itself has nothing to do with these prizes and attendees are not automatically entered for any raffle prize drawing. Since each attendee must individually signup to win a raffle prize, then government employees (who are not eligible to win these prizes) can simply not signup for the drawing.

Share with friends

Date and Time


Hyatt Place Denver/Cherry Creek

4150 East Mississippi Avenue

Glendale, CO 80246

View Map

Save This Event

Event Saved