Memphis Dec 10: Cloud/Storage/Big Data, Security/Wireless/BYOD
Tuesday, December 10, 2013 from 7:30 AM to 1:30 PM (CST)
This tightly-focused 1/2 day seminar, including VMware and Microsoft keynotes, covers the increasingly related topics of cloud/virtualization/storage and security/BYOD/unified communications. Angelbeat coordinates expert speakers from other leading firms shown below who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”
Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Click here to seebiographies of some of the outstanding speakers. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Meals, Wi-Fi and parking are provided at no charge.
Join your peers from Federal Express, International Paper, First Horizon, Dunavant, Belz, Helena Chemical, Hub Group, Buckman, CBIZ, Southwest TN Community College, Freed-Hardeman University, Memphis City Schools, Memphis Light, Gas & Water, Shelby County, Memphis Airport, St. Jude's Children Hospital, University of Tennessee Health Science Center and other leading employers who are confirmed attendees.
7:30 - 8:40: Breakfast, Registration, Peer Interaction, Product Demonstrations
8:40 - 8:55: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.
Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.
8:55 - 9:10: Next-Generation Firewall Architecture, Preventing Zero Day Attacks, with Dell SonicWALL and their partner Promas
Dell SonicWALL has pioneered the next generation of network security with an innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is its next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
The Dell platform offers IT professionals the ability to identify, control, and safely enable applications while inspecting content for all threats and malware, all the time, including zero-day attacks. These capabilities, combined with superior performance, surpass all traditional approaches including UTM and software blade. This approach allows you to simplify your network security infrastructure and eliminate a variety of stand-alone and bolt-on security devices. With an increasingly diverse workforce, this platform can address a broad range of your network security requirements - from your datacenter to your enterprise perimeter, to the far edges of your network and more - including branch offices and mobile devices.
9:10 - 9:25: Anti-Virus, Malware Detection, Virtual/Cloud Security with Kaspersky
Kaspersky is the world’s largest privately held, and among the top four, security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences.
Because malware is becoming increasingly sophisticated, traditional defenses are no longer sufficient to ensure adequate protection. In addition to award-winning anti-malware. Kaspersky will discuss vulnerability scanning and patch management technologies that eradicate vulnerabilities within both operating systems and application software. Flexible encryption functionality will be covered, that protects confidential data on a laptop and/or removable storage device that is lost or stolen.
Although shared storage offers many advantages, the presence of one infected file can spread malware across the corporate network. Kaspersky's anti-malware protection for file servers helps your business to benefit from shared storage, without compromising on security.
Many traditional, agent-based anti-malware products are not well suited to virtualized environments, e.g. they require antivirus and signature database installed on every virtual machine, which partly defeats the object of virtualization. Kaspersky Security for Virtualization delivers award-winning anti-malware protection for virtualized servers, desktops and data centers. An agentless anti-malware solution is a highly efficient way to protect your virtualized infrastructure, with greater performance and less impact on virtualization density. It is easy to deploy and includes advanced management features to simplify security management across both physical and virtual computing assets.
9:25 - 9:45: BYOD Bring Your Own Device, High-Speed Wireless, 802.11n/ac Migration with Xirrus
Gartner estimates that manufacturers will ship one billion smartphones and 184 million tablets this year. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. Learn from Xirrus how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/4G wireless strategy for your mobile workers.
9:45 - 10:05 Backup/Disaster Recovery/Business Continuity for VMware and Hyper-V with Veeam
Today’s IT requirements have changed and “3C” legacy backup problems—high costs, increased complexity and missing capabilities—are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization™ and the Cloud—a perfect fit for the modern data center.
Veeam Backup & Replication delivers backup, recovery and replication for VMware and Microsoft Hyper-V. This #1 VM Backup™ solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam's advanced monitoring and reporting capabilities help organizations of all sizes protect virtualization, increase administrator productivity and mitigate daily management risks. Its Management Pack™ (MP) extends enterprise monitoring to VMware through Microsoft
10:05 - 10:40 DR & Backup in the Cloud - How To Protect Your Business, with VMware & HP Cloud/Data Center Expert Veristor
Eliminating the cumbersome and burdening tasks of managing your own IT "insurance" plans can help any organization get back to focusing on what's really important: delivering mission-critical services to your customers or end-users. In this session, learn how Public Cloud services are quickly becoming the industry standard for data-protection and site recovery as more and more businesses look to get out of managing their own backups and DR. Key topics include:
• Understanding the real costs behind "traditional" backup & DR
• How "on-demand" usage is the key to controlling costs
• Eliminating the CAPEX of idle standby infrastructure dedicated for "hot" DR
• Obtaining lower RTO's and compliance without increased cost or complexity
10:40 Break, Product Demonstrations, Peer Networking
11:20 - 11:40: Big Data/Data Warehousing/Business Intelligence
Big Data is one of the most important issues in today's technology-centric world. Data is being created at an exponential rate, not just through website traffic but also Facebook likes, Twitter retweets, cellular location-based statistics, etc. Every day, 2.5 quintillion bytes of data are created, with 90% of the data in the world today created in the last two years. Big data is more than simply a matter of size; it is an opportunity to find insights in new and emerging types of data and content, to make your business more agile, and to answer questions that were previously considered beyond your reach.
Dell experts will help you integrate traditional primary storage platforms with data warehousing hardware and business intelligence/analytical software, helping you capture, analyze and understand Big Data, enabling you to make fact-based decisions that boost customer loyalty, enhance customer service, increase revenue, grow market share and raise profits. These insights will be especially valuable for 2014 planning as your CIO works more closely with line-of-business executives and CMOs (Chief Marketing Officers) on Big Data strategies.
11:40 - 12:30 Microsoft Windows Azure Cloud & Infrastructure Services, Windows 8.1
Cloud computing in its broadest sense is the usage of external IT resources. Microsoft will provide an overview of cloud computing options/strategies, plus discuss their Azure and Hyper-V cloud/virtualization platforms:
- Distinction between private cloud and virtualized/in-house data center
- Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite?
- Tradeoff between purchasing public cloud services (operating expenses) versus expanding internal IT infrastructure (capital spending)
- Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a public cloud provider to handle peak/high-volume customer web demand only?
- Recommendations for an integrated or hybrid public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications
- Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards
- Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be defined.
Windows Azure is a cloud solution platform with a set of capabilities enabling IT to define, deploy, and manage workloads. This presentation provides an opportunity to witness the capabilities in action by demoing the deployment of an application architecture in a self-service manner in minutes with Windows Azure.
Microsoft will also preview Windows 8.1, which now includes a start button and other widely-requested features that were not part of the initial product launch.
Full Hot Lunch, End of Event, Raffle Drawings for Great Prizes
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at firstname.lastname@example.org.
What are my transport/parking options getting to the event
Angelbeat has arranged for complimentary self-parking.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
Where can I contact the Angelbeat event team with any questions?
Please email email@example.com with any questions.
When & Where
Ronald J. Gerber is the CEO of Angelbeat, Founder of Gerber & Company, and serves on the Board of Directors and is a former President of the Harvard Business School Club of Greater New York. To get the latest updates on Gerber and Angelbeat, you can follow him on Twitter at @angelbeat, join Angelbeat social media groups on either Linkedin or Facebook, plus read Gerber's widely-respected blog at www.angelbeat.com.
Angelbeat has held over 800 technology symposiums on throughout North America since its founding in 1999. Angelbeat is the largest technology event company in North America based on its 74-city geographic coverage. These forums bring together IT professionals with global technology leaders from Microsoft, Cisco, Intel, VMware, Google, HP, Dell and many others. Through these activities Ron Gerber has an unmatched level of knowledge, contacts and credibility among both technology vendors and their CTO/CIO customer base. Based on his industry reputation, he was selected to write six supplements on the mobility and security topics for the New York Times. Further details are available at www.angelbeat.com.
Before starting Angelbeat, Ron Gerber founded and managed Gerber & Company (“GC”), a specialized event firm holding sponsor-funded training in non-IT fields. GC held seminars for government inspectors on new building codes that were supported by construction firms, for example.
Ron Gerber served as an M&A/restructuring consultant to $4 billion Harris Corporation (NYSE:HRS), leading to a spin-off of its Authentec biometric fingerprint unit (purchased by Apple in 2012), Terion wireless two-way dispatch system for fleet management, and Intersil semiconductor operations specializing in Wi-Fi 802.11 chipsets. For $2 billion Systemax (NYSE:SYX), Gerber negotiated and implemented their ISP partnership with MSN, auction alliance with Amazon and on-line financial services tie with USABancShares.com.
From 1992 to 1996, Mr. Gerber worked for Honeywell, holding senior management positions including Vice President of Marketing, Vendor Relationships and Purchasing for its $1.2 billion ADI distribution subsidiary and Vice President, Business Development for its Ademco security manufacturing subsidiary. He launched their website, coordinated biometric initiatives such as incorporating voice recognition technology in alarm equipment, expanded sales of wireless alarm systems using low-cost, high-reliability and low-data-content transceivers, created new marketing programs for its Alarmnet wireless/cellular alarm monitoring network, developed an OEM spread spectrum product for high-reliability, low cost and low data content applications, advised its Cylink affiliate on new markets for its encryption technology and divestiture of its high data content wireless transmission business unit and structured an innovative home networking joint venture with Microsoft, Comcast and PG&E.
From 1988 to 1992, Mr. Gerber worked for the AVX Kyocera Corporation (NYSE:AVX). Gerber was in charge of and led a successful turnaround of its $400M Surface Mount Manufacturing Division, reversing a (10%) loss to 9% profitability in just two years while growing sales by 30%. Key customers included the world’s leading telecommunication firms such as Lucent, Nortel, IBM, Motorola, etc. Many of its products were used for military and NASA/satellite applications. He has also worked for Accenture.
Mr. Gerber received a B.S. in Engineering from Princeton University, summa cum laude, and an M.B.A. from Harvard Business School. He currently serves as Director of the Harvard Business School Club of New York and previously served as President of both the Harvard Business School Club of New York and the Harvard Business School Club of Dallas.
Ron Gerber can be reached at firstname.lastname@example.org or 516-277-2057 . He is married to Andrea and they have four children, Lamarcus, Harry, Amanda and Sydney, plus their dog Scout, an Australian Shepherd. The Gerber’s reside in Long Island, New York.