
New Jersey March 7
Event Information
Description
Program Description:
This comprehensive 1/2 day seminar covers the increasingly related topics of security/compliance, network/data center infrastructure and private/public/hybrid cloud, There are expert speakers from Microsoft, VMware, Barracuda and many more technology leaders - scroll down to see the fantastic agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.
Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."
Join your peers from Benjamin Moore, Realogy, Prudential, Avis Budget, Odyssey House, Trammo, BARD, Bayer, Pfizer, UPS, UBS, 1-800 Flowers, Verizon Wireless, Booz Allen, Mendes & Mount, NECA, Rutgers and many more organizations who are confirmed attendees.
Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.
7:30 - 8:40: Registration, Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00: Insiders are the New Malware with Varonis
Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials. It’s estimated that the average organization suffered from 3.8 insider attacks last year. And even more troubling is that 45% of businesses can’t tell if they’ve suffered a breach.
To combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out.
During this informative session, you’ll learn about the 3-phase, Inside-Out Varonis approach for preventing insider threats.
9:00 - 9:20: Cloud-based Security-as-a-Service from Zscaler
The world of IT security has undergone tremendous transformation, sparked by the consumerization of the enterprise, the adoption of cloud computing, the ubiquity of mobile devices and the evolution of threats, which are more serious today than they have ever been before. While traditional security appliances were developed in a time when none of this existed, Zscaler’s modern cloud security platform enables businesses to embrace these innovations securely, while delivering a superior user experience. Just as cloud applications transformed the market for CRM, Zscaler is transforming the market for Internet security.
Zscaler’s Security Cloud is a comprehensive, carrier-grade Internet security and compliance platform running in more than 100 data centers distributed around the globe. Zscaler acts as a series of checkposts in between your organization and the public Internet, scanning all incoming and outgoing traffic between any device, anywhere in the world, and the Internet to identify and block potential threats and to protect your intellectual property.
Zscaler protects more than 12 million users at more than 5,000 of the world’s leading enterprises, military and government organizations against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Global 1000 brands such as GE, Nestlé, ExxonMobil, Schneider Electric, United Airlines, plus government and military organizations like United States Marines, NATO and the National Health Services of the UK rely on Zscaler to provide a safe and productive Internet experience for all of their users, from any device and from any location around the world. Thousands of mid-sized companies have deployed Zscaler to take advantage of the same carrier-grade security enjoyed by the Global 1000 for pennies per employee per day.
9:20 - 9:40: Agile Security for Agile Businesses with CloudPassage
Companies everywhere are focused on business agility, innovation and competitive advantage to drive growth and profit. Cloud computing is taking center stage as the disruptive force powering faster, more agile business innovation. At the same time, threats are growing, which means security organizations are being driven in two seemingly conflicting directions: protect the business or enable agility. Can you have both?
In this session you will learn about agile security, which can bring IT and security organizations in line with both of these objectives. Agile security is comprehensive, continuous visibility and enforcement delivered as a service, so it’s on-demand, fast to deploy, fully automated and works at any scale, which has the potential to enable core goals of business agility, speed and efficiency.
9:40 - 10:00: Hybrid IT Monitoring Imperatives with Viavi Solutions
To create a unified monitoring platform for a Hybrid IT environment, organizations need seamless visibility and monitoring of its infrastructure, from the traditional data center, then extending out to the private and public clouds. Holistic monitoring of IT and cloud resources, understanding resource relationships, and having analytical intelligence are critical to the availability and health of IT operations.
Viavi will address some of the specific questions below, enabling you to monitor and manage the performance of a complex and distributed infrastructure:
- How does your monitoring solution address your Cloud strategy, plus Legacy infrastructure monitoring?
- Are you paying for numerous modules that only add to the cost and complexity of your solution?
- Does your current monitoring solution deliver true Multi Tenancy views, for multiple teams and/or end users?
- How well does it integrate with 3rd party applications like ServiceNow or New Relic?
Viavi Solutions was created from the combination of JDSU’s network and service enablement (NSE) and Optical Security and Performance Products (OSP) units, plus the Network Instruments acquisition in 2014. Through an interoperable portfolio of cloud-enabled instruments and systems, software automation and services, Viavi delivers end-to-end visibility, intelligence and insight, for management of network, applications and services with greater precision.
10:00 - 10:20: Making IT Infrastructure Invisible with Nutanix
What could you accomplish if you no longer had to spend all your time managing your infrastructure? Nutanix makes datacenter infrastructure invisible, elevating IT to focus on applications and services that power their business.
During this educational session, you will learn about the Nutanix Xtreme Computing Platform, a 100% software-defined infrastructure solution that combines storage, compute and virtualization. Some of the topics covered include:
· A first look at Nutanix Acropolis, which integrates compute, storage and virtualization to run any application
· A preview of Nutanix Prism, which gives administrators a simple and elegant way to manage virtual environments
· A discussion of how web-scale engineering and consumer-grade design applied to the infrastructure stack makes infrastructure simple
Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:00 - 11:20: Data Center Architecture and Data Governance/Management, with Veritas and ConRes
Veritas software and hardware products enable 86 percent of the world’s Fortune 500 companies to protect, identify, and manage data within the world’s largest and most complex environments—from traditional data centers to private, public, and hybrid clouds. Veritas helps enterprises address information management challenges with a complete, organized product strategy and roadmap focused on their needs. Its backup and recovery, business continuity, software-defined storage, and information governance products help keep businesses up and running so they can focus on what they do best.
Unchecked data growth is an expensive burden—and a potential security risk. With a majority of the world’s enterprise data holding no legal, regulatory, or business value, the cost in time, money, and resources to store and manage it is staggering. But how do companies separate the valuable from the volume? Veritas solutions help them identify the needles of high-value information buried deep inside every corporate data haystack. Its approach to helping companies defy the data deluge is governed by three beliefs: Not all data is created equal. Infrastructure availability does not equal business uptime. Know what data you have, keep only the data you need. The majority of target-rich data, housed in general IT systems and metadata, is information that Veritas already touches with backup, archive, and storage management solutions. As such Veritas is uniquely positioned to bring these pieces together, to provide organizations with access to information that drives informed decision-making.
11:20 - 11:40 Barracuda: Making the Cloud Safe for Business, Strategies for Deploying Office365
Migrating your email to the cloud gives your organization the convenience of easy access to email and documents with reduced management overhead. However, trusting your most important data to the cloud raises new concerns about security, compliance and data protection. Some specific concerns include:
- Protection against all of the threats associated with web-based business email?
- Demonstration of compliance and retention if all emails are stored in the same production environment?
- Protection against human-caused data loss?
Barracuda Essentials provides critical multi-layer security, archiving, and backup, allowing organizations to prepare, migrate, and operate faster, safer, and more efficiently with Office 365. Barracuda Essentials gives customers peace of mind and complete protection of their email, data, and cloud infrastructures.
11:40 - 12:10: VMware's Networking and Security Platform
VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.
Prabhu Barathi, one of VMware's top Cloud/Networking & Security experts, will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), plus discuss these main components/features/benefits of NSX:
Agility and Streamlined Operations:
How you can deploy NSX non-disruptively on top of your existing physical infrastructure. Just as with server virtualization, NSX network virtualization lets you treat your physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach.
- Reduce the time to provision multi-tier networking and security services from weeks to minutes by creating virtual networks. Each network is customizable for its supported workloads and isolated from all other virtual networks.
- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.
- Develop, test and deploy new applications faster by aligning network and security provisioning with compute and storage provisioning.
Security and Micro-segmentation:
NSX brings an SDDC approach to network security. Its network virtualization capabilities enable the three key functions of micro-segmentation: isolation (no communication across unrelated networks); segmentation (controlled communication within a network); and security with advanced services (tight integration with leading third-party security solutions). Key benefits with micro-segmentation:
- Network security inside the data center: Fine-grained policies enable firewall controls and advanced security down to the level of the virtual NIC.
- Automated security for speed and agility in the data center: Security policies are automatically applied when a virtual machine spins up, are moved when a virtual machine is migrated and are removed when a virtual machine is deprovisioned—eliminating the problem of stale firewall rules.
- Integration with the industry’s leading security products: NSX provides a platform for technology partners to bring their solutions to the SDDC. With NSX security tags, these solutions can adapt to constantly changing conditions in the data center for enhanced security.
Platform for Advanced Networking and Security Services:
Change in traditional networks can be slow and error-prone, making them poorly suited to the fluctuating demands of the data center. By contrast, you can configure virtual networks with NSX dynamically and automatically, adding new services—whether they are virtual or physical—as needed. NSX is the networking foundation for the SDDC, giving you the tools to:
- Integrate advanced functionality from leading vendors: The industry’s best providers of software and hardware for networking and security have integrated with NSX, making it possible to meet the demands of the most sophisticated data centers.
- Automate the delivery of network services: NSX allows cloud management platforms to automate the delivery of network services, eliminating the need to manually reconfigure physical network devices. You can then build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.
- Bridge the physical and virtual parts of the data center: NSX enables you to connect your virtual networks to physical workloads and legacy VLANs. Products from VMware’s technology partners extend this capability to physical switches as well.
12:10 - 12:40: Microsoft: Windows 10 Built-in Cyber Threat Resistance/Protection, Plus Azure Cloud Platform
The number of new malware threats released every day is staggering. These threats are real, malicious and increasingly sophisticated. Traditional threat resistance based on detection has become a losing battle. IT needs a new approach to better protect corporate assets.
Shawn Cicoria, a top Microsoft desktop/cloud/security evangelist, will first discuss the new security features/capabilties that are designed into Windows 10, plus highlight its new approach to fundamentally secure computing resources. He will demonstrate the ability to authenticate a user with biometrics and hardware-based security, plus how to enroll a device to a domain via cloud, all through Windows 10.
Shawn will then discuss Azure, Microsoft's open and flexible cloud platform. Any developer or IT professional can be productive with Azure. Its integrated tools, pre-built templates and managed services make it easier to build and manage enterprise, mobile, Web and Internet of Things (IoT) applications faster, across a global network of Microsoft-managed datacenters, using skills you already have and technologies you already know. Here are its top features:
- Private/Public/Hybrid Cloud Architecture Support: Some cloud providers make you choose between your datacenter and the cloud. Not Azure, which easily integrates with your existing IT environment through the largest network of secure private connections, hybrid database and storage solutions, and data residency and encryption features - your assets can stay right where you need them. You can even run Azure in your own datacenter with Azure Stack. Azure hybrid cloud solutions give you the best of both worlds: more IT options, less complexity and cost.
- Open, Flexible, Reliable and Proven: Azure supports the broadest selection of operating systems, programming languages, frameworks, tools, databases and devices. Run Linux containers with Docker integration; build apps with JavaScript, Python, .NET, PHP, Java and Node.js; build back-ends for iOS, Android and Windows devices. Azure supports the same technologies millions of developers and IT professionals already rely on and trust, from small dev-test projects to global product launches. More than 57 percent of Fortune 500 companies use Azure, which offers enterprise grade SLAs on services, 24/7 tech support, and round-the-clock service health monitoring.
- Scalability/Pay-As-You-Go/Grow: Azure’s pay-as-you-go services can quickly scale up or down to match demand, so you only pay for what you use. Per-minute billing and a commitment to match competitor prices for popular infrastructure services like compute, storage and bandwidth mean you’re always getting unbeatable price for performance.
- Security/Compliance/Data Protection: Microsoft recognizes that some organizations are still wary of the cloud. That’s why Microsoft has made an industry-leading commitment to the protection and privacy of your data. Microsoft was the first cloud provider recognized by the European Union’s data protection authorities for its commitment to rigorous EU privacy laws, plus the first to adopt the new international cloud privacy standard, ISO 27018. There is Azure Government, a stand-alone version of Azure designed to meet the rigorous compliance requirements of U.S. government agencies.
- Run your apps anywhere: Azure runs on a worldwide network of Microsoft-managed datacenters across 22 regions—more countries and regions than Amazon Web Services and Google Cloud combined. This fast-growing global footprint gives you lots of options for running applications and ensuring great customer performance. Azure is also the first multinational cloud provider in mainland China.
- Big Data/Analytics Support: Azure’s predictive analytics services, including machine learning, cortana analytics and stream analytics, are redefining business intelligence. Make smarter decisions, improve customer service and uncover new business possibilities from your structured, unstructured and streaming Internet of Things data.
Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
FAQs
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this $300 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.
If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.
What is the dress code
Suggested dress is business casual.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.