
Stamford March 8
Event Information
Description
Program Description:
This comprehensive seminar covers the increasingly related topics of security/compliance, network infrastructure, storage/backup, mobility and private/public/hybrid cloud. There are expert speakers from VMware, Dell, Check Point and many more technology leaders - scroll down to see the fantastic agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.
Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."
Join your peers from Point72, Odyssey RE, PartnerRE, XL Catlin, Pepsico, New York Life, Daymon, Chemtura, Anthem, Atos, OEM Controls, Quorum Federal Credit Union and many more organizations who are confirmed attendees.
Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking (the Sheraton is conveniently right off 95) and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.
7:30 - 8:40: Registration, Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00: How to Secure Your Network Against Hackers and Security Breaches with Dell SonicWALL and Walker
This session begins with an assessment of today’s Cybersecurity threat landscape, illustrating breaches, phishing attacks, social engineering threats, spyware, cryptolocker, data leakage and malware. Basically the tools and tricks of the hacker community. Then there will be a demonstration of how the Dell Sonicwall Threat Protection platform blocks these attacks. It should be very informative.
9:00 - 9:20: Top Ten Checklist for Securing Your Network with Accelops:
Anthem, Sony, JP Morgan Chase, Target … Seemingly every day, another large and sophisticated company suffers a major security breach. In this era of DevOps, software-defined everything, and the Internet of Things, current security tools are increasingly vulnerable and (as these examples demonstrate) cannot prevent attacks by sophisticated hackers. There is hope however….. During this session featuring Accelops, organizations of all sizes will learn how to prevent data center attacks and improve overall network/infrastructure performance by:
- Cross-correlating security and performance events
- Using synthetic transactions to proactively monitor business services
- Creating baselines using machine learning to automate remediation
- Using auto-remediation to correct known errors
- Mapping hardware and software to your business services
9:20 - 9:40: The Dissolving Perimeter: Securing Public, Private and Mobile Environments with Check Point
Check Point will provide valuable insights and practical recommendations on enhancing your defense-in-depth security infrastructure, to protect against new threat vectors tied to three major technology trends - Mobility, Software-As-A-Service SaaS (Office365, Salesforce) and Private/Public/Hybrid Clouds. Bob Broders will be the featured speaker.
9:40 - 10:00: Unified Identity Services across data center, cloud and mobile with Centrify
Centrify strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With its platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data center. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. Over 5000 customers, including half of the Fortune 50 and over 80 federal agencies, leverage Centrify to secure their identity management.
10:00 - 10:20: Thin Client Architecture from Igel
As organizations of all sizes rapidly adopt cloud-based Software-As-A-Service (SaaS) applications such as Office365, and are increasingly concerned about security vulnerabilities and costs associated with traditional laptops/desktops, there is significant interest in thin client architecture. Learn about this important subject from Mike Conn from Igel.
Thin clients are a cost efficient and energy saving alternative to PCs. Today thin clients are used to access all kinds of office applications and CRM tools, as well as demanding videos and multimedia presentations or digital dictation solutions, and more. They increase data security and compliance with laws and regulations like HIPAA, as sensitive data is not stored locally, and the use of USB-ports can be managed remotely by the administrator. Thin clients come without fans or rotating hard drives, which means they are much more reliable than PCs and increase the overall availability of IT while reducing downtime and licence costs. The low energy consumption reduces costs and CO2 emissions compared to PCs. Together with an efficient remote management of all local thin client settings, they offer a fast return on investment. IGEL has a unique approach that delivers the traditional benefits but enables you to save, migrate and enable current PC’s and laptops with their Universal Desktop Converter (UDC2) software.
The introduction and roll out of cloud computing or virtual desktops or classic server-based computing becomes economically favorable when cost-efficient thin clients replace PCs. The total cost of ownership (TCO) of the IT infrastructure is decreased sustainably. Time to refresh your refresh strategy.
10:20 - 10:40: Making IT Infrastructure Invisible with Nutanix
What could you accomplish if you no longer had to spend all your time managing your infrastructure? Nutanix makes datacenter infrastructure invisible, elevating IT to focus on applications and services that power their business.
During this educational session, you will learn about the Nutanix Xtreme Computing Platform, a 100% software-defined infrastructure solution that combines storage, compute and virtualization. Some of the topics covered include:
· A first look at Nutanix Acropolis, which integrates compute, storage and virtualization to run any application
· A preview of Nutanix Prism, which gives administrators a simple and elegant way to manage virtual environments
· A discussion of how web-scale engineering and consumer-grade design applied to the infrastructure stack makes infrastructure simple
Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:10 - 11:30: Next Generation Network Monitoring for Virtual/Cloud Environments with Extrahop
The spread of virtualization, cloud computing, agile development practices, and service-oriented architectures has made traditional monitoring technologies obsolete. A new, simpler approach is needed, to provide visibility into these complex, hyperdynamic environments.
In this educational session, ExtraHop will demonstrate how its Operational Intelligence platform meets these requirements, with its "real-time wire data analytics" tracking all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility, which is essential for application performance, availability, and security in today's complex/dynamic IT environments.
11:30 - 11:50: Software Defined Networks and Data Center Architecture from Brocade
Everybody loves Lego building blocks. Many of us grew up playing with them. No matter how old you are, the colorful, approachable Lego pieces communicate - without a user manual - how they can be used to build things to your liking. Given a set of pieces based on an atomic, connectable unit, a young child can construct a simple tower, or a young person interested in engineering can build a detailed replica of Frank Lloyd Wright’s “Falling Water” house. The point is that starting with the right core design can take you a long way, and this simple yet powerful approach is equally applicable towards Network and Data Center Infrastructure Design.
During this informative session featuring Brocade and its partner TBNG Consulting, you will learn about its SDN Controller, which is built upon the OpenDaylight Project’s Software Defined Networking (SDN) architecture. The openness and excellence of the core design of the OpenDaylight controller makes it the most promising SDN controller framework on the market. Brocade brings to this framework the needed applications, support, services, and education ecosystem to help your organization build an agile and efficient network quickly and confidently.
11:50 - 12:20: VMware's Networking and Security Platform
VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.
Paul Coveney, one of VMware's top Cloud/Networking & Security experts, will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), plus discuss these main components/features/benefits of NSX:
Agility and Streamlined Operations:
How you can deploy NSX non-disruptively on top of your existing physical infrastructure. Just as with server virtualization, NSX network virtualization lets you treat your physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach.
- Reduce the time to provision multi-tier networking and security services from weeks to minutes by creating virtual networks. Each network is customizable for its supported workloads and isolated from all other virtual networks.
- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.
- Develop, test and deploy new applications faster by aligning network and security provisioning with compute and storage provisioning.
Security and Micro-segmentation:
NSX brings an SDDC approach to network security. Its network virtualization capabilities enable the three key functions of micro-segmentation: isolation (no communication across unrelated networks); segmentation (controlled communication within a network); and security with advanced services (tight integration with leading third-party security solutions). Key benefits with micro-segmentation:
- Network security inside the data center: Fine-grained policies enable firewall controls and advanced security down to the level of the virtual NIC.
- Automated security for speed and agility in the data center: Security policies are automatically applied when a virtual machine spins up, are moved when a virtual machine is migrated and are removed when a virtual machine is deprovisioned—eliminating the problem of stale firewall rules.
- Integration with the industry’s leading security products: NSX provides a platform for technology partners to bring their solutions to the SDDC. With NSX security tags, these solutions can adapt to constantly changing conditions in the data center for enhanced security.
Platform for Advanced Networking and Security Services:
Change in traditional networks can be slow and error-prone, making them poorly suited to the fluctuating demands of the data center. By contrast, you can configure virtual networks with NSX dynamically and automatically, adding new services—whether they are virtual or physical—as needed. NSX is the networking foundation for the SDDC, giving you the tools to:
- Integrate advanced functionality from leading vendors: The industry’s best providers of software and hardware for networking and security have integrated with NSX, making it possible to meet the demands of the most sophisticated data centers.
- Automate the delivery of network services: NSX allows cloud management platforms to automate the delivery of network services, eliminating the need to manually reconfigure physical network devices. You can then build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.
- Bridge the physical and virtual parts of the data center: NSX enables you to connect your virtual networks to physical workloads and legacy VLANs. Products from VMware’s technology partners extend this capability to physical switches as well.
Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
FAQs
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this $300 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.
If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.
What is the dress code
Suggested dress is business casual.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.