San Francisco, California
London, United Kingdom
This comprehensive seminar including a full hot lunch, drawings for an iPad, GoPro Video camera and gift cards, plus keynotes by VMware, Citrix, Intel, Microsoft and McAfee, covers the increasingly related topics of security/compliance, mobility/VDI/BYOD, storage/backup and SDN/cloud/virtualization. Angelbeat coordinates expert speakers from many more leading firms listed below - scroll down to see the agenda - who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 6 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”
Join your peers from Disney, CBS, Paramount Pictures, Warner Bros., the Emmy's, Amgen, Bank of America, Trust Company of the West, City National Bank, Northrop Grumman, Tribune, Ernst & Young, Foley & Lardner, Arent Fox, GPL, REM Optical, BCBG, Basic Media, Vubiquity, Brighton Handbag, Dailey Advertising, Lamps Plus, Zenith Insurance, Veterinary Pet Insurance, LA County Museum of Art, LA County, City of Pasadena, City of LA, Burbank Schools, USC, Master's College, Woodbury University, Cal State Long Beach, AltaMed Health, AIDS Healthcare Foundation, Torrance Medical Center and other leading organizations who are confirmed attendees.
Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Meals, self-parking and Wi-Fi are provided at no charge.
7:30 - 8:35: Breakfast, Registration, Exhibit Area Open, Peer Networking, Product Demonstrations
8:35 - 8:50: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.
Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.
8:50 - 9:05: High Performance Firewall, Next-Gen Firewall (NGFW) and Unified Threat Management (UTM) Fortigate Appliances from Fortinet plus Advanced Threat Protection (ATP)
Whether you need to deploy a High Performance Data Center Firewall, an Enterprise NGFW or a smaller UTM device for your remote/distributed enterprise site or small business, there is a FortiGate physical or virtual appliance from Fortinet to fit your unique Network Security requirements.
Each Fortigate unit is based on the FortiOS™ Operating System; when combined with custom FortiASIC™ processors and the latest-generation CPUs, it provides advanced protection from sophisticated, highly targeted attacks, without becoming a network bottleneck.
The Fortinet Sandbox is an ATP appliance designed to identify highly targeted and tailored attacks that increasingly bypass traditional defenses and lurk within networks. Offering integration with your existing FortiGate infrastructure, FortiSandbox delivers highly effective protection against this emerging class of threats. It offers cutting edge capability, such as analyzing files in a contained environment to securely identify previously unknown threats.
9:05 - 9:20 Next Generation Threats, Big Data Security, Security Information and Event Management (SIEM) Solutions that Identify and Help Stop Today's Hackers, with McAfee
Every year the threat landscape gets more sophisticated. In the early 2000s, when the world was getting online, attacks were much easier to spot. Executed mostly by Amateurs, the lack of security technology allowed them to be noisy. Unsophisticated detection techniques allowed common attacks to be run off of scripts that were shared within the hacker community. In addition, the business of black market data was in its infancy – leaving the majority of attacks to be untargeted and focused on curiosity and mischief. Over the past 10 years, security technology has become more sophisticated. Intrusion prevention systems now inspect packets and files, endpoint security has moved beyond simple Anti-virus to comprehensive security suites and organizations have learned that looking at security activity is important.
As security has grown more sophisticated, so has the business of cybercrime, the attackers and the techniques used to steal data, take down systems, and perform hacktivism. Attackers are now professionals – and the tools they use, such as Zeus, have followed suit. Attacks today are stealthy and targeted with a purpose. No longer can prevention techniques alone serve to protect enterprises. Finding this new “needle in a stack of needles” requires an intelligent use of security data.
McAfee will discuss its next generation threats and its latest event data collection program, which goes well beyond firewall and IDS events and adds data, application and system relevance, ensuring that organizations can truly gain actionable intelligence to stop attacks.
9:20 - 9:35: Protection against Phishing Attacks with Kaspersky
Kaspersky is the world’s largest privately held, and among the top four, security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Their talk will focus on protecting your IT infrastructure and confidential data against the latest and most sophisticated phishing attacks.
9:35 - 9:50 Backup/Disaster Recovery/Business Continuity for VMware and Microsoft Hyper-V with Veeam
Today's IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable backup, recovery and replication solutions that are Built for Virtualization™ and the Cloud, work on both VMware and Microsoft Hyper-V platforms, and are a perfect fit for the modern data center.
Their solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Built-in advanced monitoring and reporting capabilities help organizations of all sizes increase administrator productivity and mitigate daily management risks, plus its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft.
9:50 - 10:10: Storage End User Case Study featuring the CIO of SecureAuth and MR2 Solutions with Dell
MR2 Solutions is a leading Southern California integrator that is a strategic partner of Dell and other top IT vendors. Together with the CIO of SecureAuth, an MR2 Client, they will provide an in-depth, end user case study on data center/storage/backup strategies. SecureAuth is a rapidly growing enterprise by itself, and when combined with exponential increases in data management for most organizations, should make for a very educational and informative discussion.
Break, Product Demonstrations, Exhibit Area Open, Peer Networking
10:50 - 11:10: HP: Software Defined Networks (SDN)
HP Software-Defined Networking (SDN) provides an end-to-end solution to automate the network from data center to campus and branch.
The world is moving faster than ever. Transactions must be processed at lightning speed. Mountains of data must be transformed into insights. Customers want exceptional service. Employees want access to information and applications from any device. Delivering on those expectations requires data centers that are more powerful, agile, and automated than ever before, and a campus environment that responds to a dynamic and changing workforce.
Server and storage architectures have modernized to keep pace with the unyielding expectations of an always-on world, but the underlying network has not. The data center network itself, while certainly bigger and faster, has largely been built the same way for two decades. Evolution of campus networks has been slow, despite the mobility revolution. Whether in the data center or on the campus, when legacy networks are pushed to the limit, they become fragile, difficult to manage, vulnerable, and expensive to operate. Manual configuration and operation simply won’t scale to the demands of today’s applications, users, and business requirements. Businesses whose networks are at this breaking point risk missing the next wave of opportunity.
This session provides an overview of the HP Virtual Application Networks (VAN) SDN Controller and how HP is fostering the development of a vibrant SDN ecosystem to help enterprises, cloud providers, and developers unleash new levels of automation and efficiency in data center and campus networks.
11:10 - 11:30: Software Defined Cloud Networking from Arista
Arista has defined a number of guiding principles for integration with Software Defined Networking (SDN) technologies, including controllers, hypervisors, cloud orchestration middleware, and customized flow-based forwarding agents. These guiding principles leverage proven, scalable, and standards-based control and data plane switching technologies from Arista. Emerging SDN technologies complement data center switches by automating network policies and provisioning within a broader integrated cloud infrastructure ecosystem. Arista defines the combination of SDN technologies and the Arista Extensible Operating System (Arista EOS®) as Software Defined Cloud Networking (SDCN).
The resulting benefits of Arista’s SDCN approach include: network applications and open,
scalable standards integration with a wide variety of cloud provisioning and orchestration
tools; seamless mobility and visibility of multi-tenant virtual machines via Arista’s
OpenWorkload technologies; and real-time Network Telemetry data for best of breed
coupling with cloud operations management tools.
11:30 - 11:45: BYOD Bring Your Own Device, High-Speed Wireless, 802.11n/ac Migration with Adtran
During the last year, Apple sold 150 million iPhones and 70 million iPads, while Google and its partners sold over 200 million Android-powered smartphones. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Network and security personnel will learn how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/cellular wireless strategy that maximizes mobile worker productivity, in a secure and cost-effective manner.
11:45 - 12:05: User-Driven Virtualization Stratgies and Platforms with Appsense
From Bring Your Own Device, to Bring Your Own App, Bring Your Own Cloud, Bring Your Own Identity......through to Bring Your Own ‘You’, people are now using technology to create their own set of tools to do their job. This is the new IT world - focusing on the user and not the device/hardware - and if leveraged effectively, can have a fundamental and positive impact on business. And not just newbies coming into the workforce.
Appsense's approach to user virtualization is driven by this user-centric thinking. It unlocks the user from their devices, their operating systems and applications. For the first time, IT managers only need to manage a single layer of an individual’s digital existence, instead of an exploding number of devices and applications, with millions of potential user configurations. Its policy templates can manage thousands of users; automatically and intelligently re-configuring for each device, location and application, with massive improvements in security and reliability.
User virtualization means people can now choose the device that suits them, instead of the application choosing the device. That’s why thousands of people at leading, forward-thinking companies rely upon Appsense to free IT staff from the ever-growing burden of user complexity. They've liberated their workforce from device-based technology. Their workforce has become the technology.
12:05 - 12:25 Microsoft: Windows Azure Cloud and Infrastructure Services
Windows Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed by Microsoft during this informative session:
- Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure.
- Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license.
- Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world.
- Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.
- Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance.
Full Hot Lunch, Exhibit Area Open, Peer Networking, Product Demonstrations
VMware Lunchtime Keynote on Software Defined Data Center (SDDC); The Evolution of Virtualization to Support Mobile and Cloud Initiatives
Enterprises worldwide have used VMware vSphere to significantly improve IT efficiency and performance, yet the mobile and cloud era presents new challenges. To meet this challenge, IT organizations need to virtualize the rest of the data center so all infrastructure services become as inexpensive and easy to provision and manage as virtual machines.
The answer is the software-defined data center (SDDC): the ideal architecture for private, public, and hybrid clouds. Pioneered by VMware and recognized by the industry and analysts alike, SDDC extends the virtualization concepts you know— abstraction, pooling and automation — to all data center resources and services.
VMware will discuss options for organizations of all sizes to implement the software-defined data center in their private data center and beyond:
- As a Private Cloud through the VMware vCloud Suite, where you can build and run your vSphere-based private cloud
- As a Hybrid Cloud through either the VMware vCloud Hybrid Service (fastest route to a seamless hybrid cloud) or through public cloud services offered by the global ecosystem of certified VMware service providers.
By integrating a private cloud with a public cloud built on software-defined data center technology, the data center becomes a true hybrid cloud platform, seamlessly spanning on-premises and off-premises environments with a common management, orchestration, networking and security model.
2:00 - 3:00: Intel Corporate Strategy Keynote, The Changing IT Landscape Through 2020: Chipset Technology Innovations Across Smartphones, Tablets, Laptops, Desktops & Servers, Security & Security Emphasis Driven by McAfee Acquisition
Intel will share its vision of the rapidly changing world of IT, and how its corporate strategy and technology offerings are being enhanced to match these changes. Several of its top experts will discuss chipset innovations across smartphones, tablets, laptops, desktops and servers, plus how its McAfee acquisitions reflects the growing importance of security and software within Intel.
3:00 - 3:25: Delivering Service, Applications, and Data to Users on Any Device: Citrix Strategies and Best Practices for dealing with remote users, Virtual Desktops, Windows Upgrades, and mobility needs
Citrix will discuss how its FlexCast and XenMobile architecture can help facilitate the smooth migration from XP, while supporting BYOD, VDI and Mobility initiatives.
3:25- 3:45: Network Virtualization from Pluribus Networks
Pluribus Networks delivers an open architecture that fuses compute, network, storage and virtualization, enabling a new class of services and network-aware applications in the data center. Its Freedom architecture presents a combination of switch, compute, storage and bare-metal hypervisor OS technologies, and has been designed to accelerate the integration of services and applications into the network.
At the heart of Freedom is the Netvisor OS, the industry’s first and only distributed network operating systems with hypervisor bare-metal virtualization capabilities of computing resources - CPU, memory, and storage - and merchant silicon switch chips. Unleashing the full power of the Netvisor OS is the novel Freedom Server-Switch architecture, which includes a powerful server platform combined with a high-density 10/40 GbE merchant silicon switch and network processor.
In this architecture, the network switch becomes an extension of the server. Merchant silicon chips are fully integrated into the operating system, controlled and virtualized like a NIC, and used as an offload/hardware acceleration engine for application flows and network functions. The network switch is managed by a server-class control plane through multi 10Gbps high-speed connections, unleashing a new class of services and functions to run directly “inside” the network; examples include the ability to run scalable monitoring and analytics for “physical” and “virtual” (tunneled) flows, free of taps and external monitoring gear.
End of Event, Drawings for an iPad, GoPro Video Camera, Gift Cards and other great items!
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at firstname.lastname@example.org.
What are my transport/parking options getting to the event
Angelbeat has arranged for complimentary self-parking at the hotel, which is easily accessible and is right off the 101.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
Where can I contact the Angelbeat event team with any questions?
Please email email@example.com with any questions.
When & Where
Angelbeat CEO Ron Gerber
Ronald J. Gerber is the CEO of Angelbeat, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates via social media on Gerber and Angelbeat (common hashtag #angelbeat), click here for Twitter, Linkedin, Facebook, Youtube, and Instagram, plus read Gerber's widely-respected blog at www.angelbeat.com.
Angelbeat is the largest technology event company in North America, based on its 100+ city geographic coverage, and has held over 1,100 seminars since its founding in 1999. These forums bring together tens of thousands of IT professionals with global technology leaders from Microsoft, Google, VMware, Amazon, Google, HPE, Dell and many others. Through these activities Mr. Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on emerging technologies for the New York Times. Further details are available at www.angelbeat.com. He is also the founder of Gerberama consumer-related seminars on home automation, digital entertainment, smart appliances/lighting and electric/self-driving cars.
Before starting Angelbeat, Mr. Gerber held senior positions at Honeywell, Kyocera, Pepsico and Accenture. Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York. He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd.