
Long Island Mar 10
Date and time
Description
Program Description:
This comprehensive seminar at the beautiful and conveniently located Old Westbury Country Club (located right off the LIE) covers the increasingly related topics of security/compliance, network infrastructure, storage/backup, mobility/thin clients and private/public/hybrid cloud. There are expert speakers from VMware, Dell, Check Point and many more technology leaders - scroll down to see the fantastic agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.
Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."
Join your peers from PC Richard, Blumenfeld Development, Avis Budget, Dale Carnegie, Broadridge, Guardian Life, New York Life, Aspen Core, Bruno Gerbino Soriano, Cobham, Con Edison, EisnerAmper, Ridgewood Savings, Queens Community College, Bank Street College, St. George's University and many more organizations who are confirmed attendees.
Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary valet parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards, an Amazon Fire TV Stick and other prizes at the end.
7:30 - 8:40: Registration, Hot Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00: The Dissolving Perimeter: Securing Public, Private and Mobile Environments with Check Point
Check Point will provide valuable insights and practical recommendations on enhancing your defense-in-depth security infrastructure, to protect against new threat vectors tied to three major technology trends - Mobility, Software-As-A-Service SaaS (Office365, Salesforce) and Private/Public/Hybrid Clouds. Bob Broders will be the featured speaker.
9:00 - 9:20: Unified Identity Services across data center, cloud and mobile with Centrify
Centrify strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With its platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data center. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. Over 5000 customers, including half of the Fortune 50 and over 80 federal agencies, leverage Centrify to secure their identity management.
9:20 - 9:40: Growing Risk from Insider Threats/Breaches, from Imperva
Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk. In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies.
During this informative session featuring Tim Chang of Imperva, you will:
- Become more informed on the rise of the insider threat problem
- Learn why insider threats are tough to detect, even when monitoring technologies are in place
- Understand what to look for in a solution
9:40 - 10:00: Making IT Infrastructure Invisible with Nutanix
What could you accomplish if you no longer had to spend all your time managing your infrastructure? Nutanix makes datacenter infrastructure invisible, elevating IT to focus on applications and services that power their business.
During this educational session, you will learn about the Nutanix Xtreme Computing Platform, a 100% software-defined infrastructure solution that combines storage, compute and virtualization. Some of the topics covered include:
· A first look at Nutanix Acropolis, which integrates compute, storage and virtualization to run any application
· A preview of Nutanix Prism, which gives administrators a simple and elegant way to manage virtual environments
· A discussion of how web-scale engineering and consumer-grade design applied to the infrastructure stack makes infrastructure simple
10:00 - 10:20: Dell and Custom Computer Specialists: Backup/DR/Data Protection for Physical, Virtual, Cloud Platforms
Disaster Recovery/Business Continuity is vitally important in today's always-on world. But when data can be at rest, in use or in motion - and stored on physical, virtual and/or private/public/hybrid clouds - a cost-effective and manageable solution can be very challenging.
Dell and its partner Custom Computer Specialists will discuss how organizations of all sizes can meet this challenge, through its broad portfolio of scalable solutions that protect data and deliver rapid recoverability across physical, virtual and cloud environments. Its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. Some of the specific topics addressed include:
- Quantifying the cost of downtime and how much data can you afford to lose, to justify 2016 DR projects.
- Segmenting your data among static, business vital and mission critical applications, then creating a DR plan to match each segment, e.g. there are different data retention requirements.
- Building a defense-in-depth approach, leveraging snapshots, replication, local backups and offsite/cloud options.
- Conducting on-going tests to verify backup accuracy/integrity, and more importantly, complete data recoverability
10:20 - 10:40: How to Control and Manage Macs in Windows-Heavy Environments from Parallels
Today's IT teams need practical solutions for controlling and managing Macs in their networks. In this session Parallels, the experts in Mac for Business, presents real-world guidance for supporting Macs in cross-platform environments. Some of the topics covered include a practical comparison of alternative solutions, results from Parallels' recent & extensive market research/study on "Macs in IT", and demonstrations of Parallels' Mac Management platform, which offers outstanding performance and usability. There will be case study examples, so attendees can learn how other IT pros tackled the growing challenge of managing Macs in Windows-heavy environments. If you need answers to any of your Mac-related questions, then this is the perfect session.
Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:20 - 11:40: Desktop Virtualization and Cloud Client-Computing from Dell
As organizations of all sizes rapidly adopt cloud-based Software-As-A-Service (SaaS) applications such as Office365, and are increasingly concerned about security vulnerabilities and costs associated with traditional laptops/desktops, there is significant interest in cloud client computing and thin client architecture.
Learn from Dell how you can quickly and affordably evolve to this simpler state of end point IT management. No matter what stage of desktop virtualization you're in, or what platform you prefer, Dell's fully customizable, end-to-end cloud client-computing solutions can help you realize a heightened level of security, speed and management, across Citrix, Microsoft, VMware and/or Dell-based platforms. During this informative talk, you'll gain practical insights on many subjects, such as how to securely deliver any app, to any user, on any device.
11:40 - 12:00: Next Generation Network Monitoring for Virtual/Cloud Environments with Extrahop
The spread of virtualization, cloud computing, agile development practices, and service-oriented architectures has made traditional monitoring technologies obsolete. A new, simpler approach is needed, to provide visibility into these complex, hyperdynamic environments.
In this educational session, ExtraHop will demonstrate how its Operational Intelligence platform meets these requirements, with its "real-time wire data analytics" tracking all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility, which is essential for application performance, availability, and security in today's complex/dynamic IT environments.
12:00 - 12:40: VMware's Networking and Security Platform
VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.
Paul Coveney, one of VMware's top Cloud/Networking & Security experts, will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), plus discuss these main components/features/benefits of NSX:
Agility and Streamlined Operations:
How you can deploy NSX non-disruptively on top of your existing physical infrastructure. Just as with server virtualization, NSX network virtualization lets you treat your physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach.
- Reduce the time to provision multi-tier networking and security services from weeks to minutes by creating virtual networks. Each network is customizable for its supported workloads and isolated from all other virtual networks.
- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.
- Develop, test and deploy new applications faster by aligning network and security provisioning with compute and storage provisioning.
Security and Micro-segmentation:
NSX brings an SDDC approach to network security. Its network virtualization capabilities enable the three key functions of micro-segmentation: isolation (no communication across unrelated networks); segmentation (controlled communication within a network); and security with advanced services (tight integration with leading third-party security solutions). Key benefits with micro-segmentation:
- Network security inside the data center: Fine-grained policies enable firewall controls and advanced security down to the level of the virtual NIC.
- Automated security for speed and agility in the data center: Security policies are automatically applied when a virtual machine spins up, are moved when a virtual machine is migrated and are removed when a virtual machine is deprovisioned—eliminating the problem of stale firewall rules.
- Integration with the industry’s leading security products: NSX provides a platform for technology partners to bring their solutions to the SDDC. With NSX security tags, these solutions can adapt to constantly changing conditions in the data center for enhanced security.
Platform for Advanced Networking and Security Services:
Change in traditional networks can be slow and error-prone, making them poorly suited to the fluctuating demands of the data center. By contrast, you can configure virtual networks with NSX dynamically and automatically, adding new services—whether they are virtual or physical—as needed. NSX is the networking foundation for the SDDC, giving you the tools to:
- Integrate advanced functionality from leading vendors: The industry’s best providers of software and hardware for networking and security have integrated with NSX, making it possible to meet the demands of the most sophisticated data centers.
- Automate the delivery of network services: NSX allows cloud management platforms to automate the delivery of network services, eliminating the need to manually reconfigure physical network devices. You can then build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.
- Bridge the physical and virtual parts of the data center: NSX enables you to connect your virtual networks to physical workloads and legacy VLANs. Products from VMware’s technology partners extend this capability to physical switches as well.
Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
FAQs
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this $300 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.
If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary valet parking.
What is the dress code
Suggested dress is business casual.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.