Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
provides hyper-converged secondary storage for backup with data deduplication with an integrated
landing zone and scale-out architecture that integrates with all leading backup applications. The landing zone with adaptive deduplication provides for the fastest backups, restores, and instant VM recoveries. ExaGrid's scale-out architecture includes full appliances in a scale-out system, ensuring a fixed-length backup window as data grows, eliminating expensive forklift upgrades and product obsolescence while reducing costs up front and over time. ExaGrid scales to petabytes of data while maintaining ingest performance of 3X, and restore and VM boot speeds of 20X that of other solutions.
, a Western Digital brand provides all-flash and hybrid storage arrays that help organizations eliminate...
gives the world's largest enterprises and government organizations the
unique power to secure, control, and manage millions of endpoints across the enterprise within seconds. With the unprecedented speed, scale, and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!