CLICK HERE TO REGISTER or call our offices at 516-277-2057.
FREE to IT professionals in networking, security, storage, architecture, telecommunications, etc.
|Date:||09/11/2013 from 7:30 AM to 01:30 PM|
|Add this to my Outlook Calendar|
Sheraton, Free Parking & WiFi, 402.496.0850
This tightly-focused 1/2 day seminar ending with a full/hot lunch covers the increasingly related topics of cloud/virtualization/storage/infrastructure and security/network/BYOD/wireless. Angelbeat coordinates expert speakers (from organizations on the right) who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.” Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. Join your peers from Mutual of Omaha, HDR, ACI, Boys Town, Bank of the West, Bank of Nebraska, First National Bank ,Central States Indemnity, Lindsay, Woodmen, West Corporation, URS, Omaha Schools, State of Nebraska and many more leading employers who have already signed up.
7:30 - 8:30: Breakfast, Registration, Product Demonstrations
8:30 - 9:30: Security/Compliance: Solutions to the Ever-Growing Threat and Vulnerability Landscape
Security and compliance vulnerabilities will only grow in 2013, driven by these trends:
- Virtualization and cloud computing, with sensitive/confidential information and programs stored in multiple and possibly unsecured third-party locations
- Secure remote access requirements from an ever growing list of devices - laptop, netbook, home PC, MAC, smartphone and tablet - accessing behind-the-firewall data via multiple networks including corporate LAN, home wifi, public wifi and 3G/4G cellular.
- Hackers targeting facebook, linkedin, youtube and twitter, as social media can no longer be blocked at work, plus web-filtering cannot always block tinyurl's automatically truncated. There is also an alarmingly high percentage of downloadable apps containing malware, across all smartphone and desktop platforms.
- Web-based or SaaS enterprise applications, with browser vulnerabilities that are often the weakest link in a defense-in-depth strategy exposing organizations to substantial risk
- Foreign-based DDOS (distributed denial-of-service) attacks, from either rogue organizations or even pseudo-government agencies, seeking to crash American website operations.
- The growing need to protect unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data - stored in file servers, NAS devices, SharePoint, Exchange and cloud-based services such as Box, Google Drive, SkyDrive, etc. Who should and shouldn't have access, which data is highly sensitive and of greatest value/risk, etc.
Learn from experts at Palo Alto Networks, Kaspersky and Varonis how to enhance existing defense-in-depth security architecture - spam, anti-virus, web filtering, IDS/IPS, (next generation) firewall, ediscovery, patching - with the latest solutions, keeping you one step ahead of hackers and maintaining compliance with all applicable internal, regulatory and government guidelines.
9:30 - 10:30: Virtualization, Storage, Backup, Data Center Architecture, Software Defined Networks, Cloud Computing
Organizations must optimize their existing and internal storage/server/data center infrastructure for maximum efficiency - combining the best of virtual and private cloud functionality - before considering external/outsourced cloud services. Topics covered by experts from HP, Commvault and VMware/NetApp partner IP Pathways include:
- Virtualization recommendations for and across servers, storage and data centers to increase utilization, create R&D testing sites without impacting live production, support disaster recovery/business continuity requirements, etc.
- Feasibility of private cloud architecture, with on-demand services provided to business units.
- Integration of networking, server and storage protocols/equipment under a common virtualization platform and data center/network "fabric"
- Flash storage performance/cost benefits versus traditional hardware platforms
- The impact of software defined networking ("SDN"), which allows network administrators to have centralized control of network traffic/performance without requiring physical access to the network's hardware devices
- Server/Storage Reliability/Uptime, critically important with significantly fewer hardware platforms with virtualization, all running at much higher utilization levels
- Growth trends for iSCSI, Fibre Channel, NSA and SAN storage deployments, and how this affects your virtualization strategies
- Centrally-hosted application/file delivery/storage architecture to optimize performance of thin clients/virtual desktops
- Scale-up vs Scale-out storage strategies to optimize both data-at-rest and data-in-motion
- Tiered storage strategies to match data access requirements and update frequency with hardware costs
- Disaster Recovery and Business Continuity Best Practices; the importance of cost-effective and efficient recovery systems.
- Data Deduplication on primary and backup hardware, to eliminate unnecessary storage of redundant information.
- Backup/archiving best practices in virtualized/cloud architectures, where data is not locked to a specific location or hardware platform.
- Why organizations are still buying storage and expanding their internal data centers, despite cloud-based and co-location services from Amazon, Rackspace and others.
Cloud computing in its broadest sense is the usage of external IT resources. Experts will provide an overview of cloud computing options, to help you determine the best fit within your organization, plus share the latest developments for 2013 around cloud security for commercial/enterprise deployments:
- Distinction between private cloud and virtualized/in-house data center
- Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite?
- Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a cloud provider to handle peak/high-volume customer web demand only?
- Recommendations for an integrated or hybrid public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications
- Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards
- Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be defined
10:30: Break, Product Demonstrations, Peer Networking
11:15 - 11:55: BYOD Bring Your Own Device, Wireless, VoIP/Unified Communications, Video
During Q1 2013, Apple sold almost 40 million iPhones and 20 million iPads, while Google and its partners sold over 156 million Android-powered devices. These devices are often employee-owned and are rapidly making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality?
Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. You will also understand how to combine existing a/b/g access points with higher-speed solutions now available, plus create an integrated Wi-Fi/4G wireless strategy for your mobile workers.
The growing importance of unified communications in today's always-on, always-connected world, is widely accepted by all IT professionals. Learn how to combine Twitter, Facebook, YouTube and other social networking applications with email, instant messaging, voice mail and traditional telephone communications, thereby increasing the productivity of your workforce. Understand the evolution of telephone systems - from premise-based PBX or VoIP installations to hosted or cloud-based delivery platforms - and see what changes are recommended within your own organization, based on workforce demographics. See how you can provide your employees with a common unified communications platform supporting voice/data/video applications across desktop, smartphone, laptop and tablet devices.
11:55 - 12:30: Network/LAN/WAN: End User Performance/QoS, WAN Optimization, Network Analysis
This section focuses on the end user experience, covering Local and Wide Area Network versus Application issues.
- Understand the value of high-performance wide area networks (WAN), a critical issue with today's cloud-based architecture
- Improve and ensure performance/QoS of virtualized and/or cloud-based applications that can be delivered/hosted anywhere and accessed by any device over any network.
- Identify the root cause of performance issues (network vs application), then take corrective action through WAN optimization, load balancing, etc., without overspending on bandwidth.
- Recognize the value of data-center/infrastructure-based WAN optimization and the advantages of accelerating all applications (especially useful in today's rapidly changing "app-based" world.)
End of Event, Full Hot Lunch, Product Demonstrations, Raffle Drawings for Great PrizesCLICK HERE TO ATTEND THE EVENT