Memphis Dec 8

Memphis Dec 8
Event on 2015-12-07 07:30:00
Program Description: This comprehensive seminar covers the increasingly related topics of security/compliance, storage/backup, private/public/hybrid cloud, wireless/mobility and Windows 10. There are expert speakers from Google, Microsoft, VMware and many more technology leaders – scroll down to see the fantastic agenda and click on links to see speakers' biographies – who deliver concise, technical, educational and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc. As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace." Join your peers from Fedex, Memphis Airport, Crye-Leike Realtors, Lifeblood, Medtronic, Ring Containers, Covenant Dove, Cordova, Shelby County, City of Collierville, IRS, DCAA, Memphis Light, Gas & Water, Lawrence Schools, Hoxie Schools, Shelby Schools, Semmes-Murphey Clinic and many more organizations who are confirmed attendees. Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end. 7:30 – 8:40: Registration, Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations 8:40 – 9:00: Top Ten Checklist for Securing Your Network with Accelops: Anthem, Sony, JP Morgan Chase, Target … Seemingly every day, another large and sophisticated company suffers a major security breach. In this era of DevOps, software-defined everything, and the Internet of Things, current security tools are increasingly vulnerable and (as these examples demonstrate) cannot prevent attacks by sophisticated hackers. There is hope however….. During this session featuring Accelops, organizations of all sizes will learn how to prevent data center attacks and improve overall network/infrastructure performance by: – Cross-correlating security and performance events – Using synthetic transactions to proactively monitor business services – Creating baselines using machine learning to automate remediation – Using auto-remediation to correct known errors – Mapping hardware and software to your business services 9:00 – 9:20: Check Point Annual Security Report: Lessons Learned, Recommendations to Protect Your IT Infrastructure, Next Generation Firewall Architecture Check Point will summarize its annual Security Report that analyzes major security events and malware trends. The data included in this report is based on collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations across all industries. Basically, what has happened over the past 12 months, how can you learn from security breaches/attacks at Sony, Chase, Home Depot, etc., and what you can do to secure your IT infrastructure and confidential/sensitive data. One solution that organizations of all sizes should consider deploying, to protect against this rapidly evolving threat landscape while supporting high-demanding IT infrastructures, is a "Software Defined Protection Architecture", which provides greater operational resilience plus real-time, proactive protection. Check Point will conclude this session with a discussion on Next Generation Firewalls (NGFW), and why NGFW needs to be part of your defense-in-depth strategy. 9:20 – 9:40: Cloud-based Security-as-a-Service from Zscaler The world of IT security has undergone tremendous transformation, sparked by the consumerization of the enterprise, the adoption of cloud computing, the ubiquity of mobile devices and the evolution of threats, which are more serious today than they have ever been before. While traditional security appliances were developed in a time when none of this existed, Zscaler’s modern cloud security platform enables businesses to embrace these innovations securely, while delivering a superior user experience. Just as cloud applications transformed the market for CRM, Zscaler is transforming the market for Internet security. Zscaler’s Security Cloud is a comprehensive, carrier-grade Internet security and compliance platform running in more than 100 data centers distributed around the globe. Zscaler acts as a series of checkposts in between your organization and the public Internet, scanning all incoming and outgoing traffic between any device, anywhere in the world, and the Internet to identify and block potential threats and to protect your intellectual property. Zscaler protects more than 12 million users at more than 5,000 of the world’s leading enterprises, military and government organizations against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Global 1000 brands such as GE, Nestlé, ExxonMobil, Schneider Electric, United Airlines, plus government and military organizations like United States Marines, NATO and the National Health Services of the UK rely on Zscaler to provide a safe and productive Internet experience for all of their users, from any device and from any location around the world. Thousands of mid-sized companies have deployed Zscaler to take advantage of the same carrier-grade security enjoyed by the Global 1000 for pennies per employee per day. 9:40 – 9:55: Top Five Tips for Educating Employees about Cybersecurity with Kaspersky Corporate cybercrime is usually blamed on outsiders, but sometimes employees can represent the biggest threat to your organization’s IT security. In his presentation, Kaspersky’s Mark Villinski will provide practical advice for educating your employees about cybersecurity, covering topics including: – How to create efficient and effective security policies – Overview and statistics of the current threat landscape – The importance of keeping your employees updated about the latest threats and scams – Security solutions that can help keep your systems updated and protected Kaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users. 9:55 – 10:15: Best Practice Guide for Wi-Fi, Exploring the World of “Connected Intelligence” with Aerohive By the end of 2013 there were more mobile devices than people on earth, and by 2020 it is predicted that 24 Billion devices will be connected to the internet. This massive influx of devices has introduced a new era in the world of Wi-Fi and IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and new technology like MU-MIMO. Most tablets and smartphones share a common feature – they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive Wi-Fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things"), and more wireless-based mission-critical applications, it is essential that IT professionals are able to optimize the user mobile experience. Other subjects covered by Aerohive include distributed control architectures, role based access control, seamless wired/wireless network management, and why different vendor's access points, even if they all operate under the same 802.11 standard, nonetheless may have vastly different performance. This session concludes with a demonstration of a cloud-based network management system that let IT professionals remotely manage and configure Wi-Fi networks anywhere in the world, securely and cost effectively. 10:15 – 10:30: Flash Storage Technology with Tegile Tegile is pioneering a new generation of flash-driven enterprise storage arrays that balance performance, capacity, features and price for virtualization, file services and database applications. Its hybrid arrays are significantly faster than legacy arrays and significantly less expensive than all solid-state disk-based arrays. Featuring both NAS and SAN connectivity, these virtual data storage systems are easy-to-use, fully redundant, and highly scalable, plus come with built-in snapshot, replication, near-instant recovery, and virtualization management features. Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction 11:10 – 11:30: Avaya Content TBD 11:30 – 11:50: Network Analysis by Savvius Savvius will discuss how network and security professionals can use its deep-packet inpection technology to identify, understand, and respond to challenges in network performance and security. 11:50 – 12:10: How to Control and Manage Macs in Windows-Heavy Environments from Parallels Today's IT teams need practical solutions for controlling and managing Macs in their networks. In this session Parallels, the experts in Mac for Business, presents real-world guidance for supporting Macs in cross-platform environments. Some of the topics covered include a practical comparison of alternative solutions, results from Parallels' recent & extensive market research/study on "Macs in IT", and demonstrations of Parallels' Mac Management platform, which offers outstanding performance and usability. There will be case study examples, so attendees can learn how other IT pros tackled the growing challenge of managing Macs in Windows-heavy environments. If you need answers to any of your Mac-related questions, then this is the perfect session. 12:10 – 12:35 Microsoft: Windows 10 Preview/Demo Kevin Remde, a top Microsoft cloud/enterprise architect, will discuss Windows 10, the latest operating system from Microsoft. It provides a seamless and consistent user experience across desktop, laptop, tablet and smartphone devices. The start menu/button is back, with space to pin your favorite app. Updates are delivered automatically, so no more worries if your O/S has the latest security update. Cortana is integrated within Windows 10, offering seamless voice-to-text and voice command functionality. Microsoft Edge, the browser replacement/upgrade for Internet Explorer, is similarly built within Windows 10, offering greater security, flexibility and user satisfaction. Windows 10 is a free upgrade for Windows 7 or 8 users. From a mobility viewpoint, applications written for Apple iOS or Google Android can run on Windows 10-powered smartphones with virtually no modifications. Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations 1:15 – 1:40: VMware's One Cloud, Any Application, Any Device Architecture, built on Software Defined Data Center VMware’s One Cloud, Any Application, Any Device architecture enables customers to rapidly develop, automatically deliver, and safely consume all applicationsm, and was the highlight of last month's VMworld conference. Built on the foundation of the Software-Defined Data Center (SDDC) – which fully automates the virtualized infrastructure of compute, storage, networking and security – this software-defined approach enables customers to implement unified hybrid cloud and fully realized business mobility. VMware will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), plus discuss these main components/features/benefits of SDDC: Data center virtualization, standardization and consolidation: Dramatically reduce capital and operational expenditures while bringing hardware choice, flexibility and extensibility to the hybrid cloud. Support traditional and new application types such as big data and mobile. Extend to the hybrid cloud, with unit costs equal to or lower than public cloud, so capital expenses can be reduced up to 70 percent. Streamlined and automated data center operations: Increase operational control while optimizing and improving infrastructure performance, capacity, health and costs. Leverage third-party data integration, proactive analysis and smart alerts to monitor performance plus improve insight and response. Extend its intelligent operations management console across physical, virtual and cloud infrastructures, covering vSphere, Hyper-V, OpenStack, Amazon Web Services and physical hardware. Leverage predictive analytics to correlate data from applications to storage, leading to policy-based automation and improved data center performance, health and capacity management. Security controls native to infrastructure. Tie network and security services to specific workloads, since SDDC is based on virtualization of layers 2 to 7. Enable micro-segmentation and more granular control of security settings at the infrastructure level. Hardware and hypervisor agnostic network virtualization. Provide maximum flexibility to capitalize on existing network infrastructure investments and improve the ratio of security to level of effort. High availability and resilient infrastructure. Protect all data and apps, across the data center and any platform, to guarantee business continuity and ensure regulatory compliance, through a hardware-agnostic platform. Automate application recovery through flexible policy enforcement to achieve high availability locally and disaster recovery across sites or to the hybrid cloud. Extend protection to all virtualized apps in the data center. Application and infrastructure delivery automation Deliver infrastructure, plus traditional and new applications, in minutes across private and public infrastructures, while being hardware, hypervisor and cloud platform agnostic. Build a true self-service hybrid cloud that instantly scales up or down based on business needs. 1:40 – 2:10 Google Cloud Platform: The Google Cloud Platform enables organizations of all sizes to build, test and deploy applications on Google’s highly-scalable and reliable infrastructure, choosing from computing, storage and/or application services for your web, mobile and/or backend solutions. Nese Demirdag, one of Google's top enterprise strategist, will discuss how and why to use this innovative platform, covering the following items: Run on Google’s infrastructure: Build on the same infrastructure that allows Google to return billions of search results in milliseconds, serve 6 billion hours of YouTube video per month and provide storage for 425 million Gmail users. Mix and match services: Virtual machines. Managed platform. Blob storage. Block storage. NoSQL datastore. MySQL database. Big Data analytics. Google Cloud Platform has all the services your application architecture needs. Performance you can count on: Every millisecond of latency matters. Google’s compute infrastructure gives you consistent CPU, memory and disk performance; its network and edge cache serve responses rapidly to your users across the world. Focus on your product: Rapidly develop, deploy and iterate your applications without worrying about system administration. Google manages your application, database and storage servers so you don’t have to. Scale to millions of users: Applications hosted on Cloud Platform can automatically scale up to handle the most demanding Internet-scale workloads and scale down when traffic subsides. You pay only for what you use. Get the support you need: With our worldwide community of users, partner ecosystem and premium support packages, Google provides a full range of resources to help you get started and grow. End of Event, Raffle Prize Drawings for Gift Cards and other great items! FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration. What are my transport/parking options getting to the event Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking. What is the dress code Suggested dress is business casual. What if you have special dietary needs/restrictions If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

at Holiday Inn
3700 Central
Memphis, United States

Leave a comment

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>