Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
"The Fortinet Security Fabric is the first architectural approach to security designed to dynamically adapt to the evolving IT Infrastructure. It intelligently and transparently segments the customer's network, from endpoint to the cloud, to provide advanced protection against sophisticated threats.
makes all-flash and hybrid storage arrays
Tegile makes all-flash and hybrid storage arrays that help organizations eliminate storage silos, simplify storage management, and reduce costs by consolidating all of their workloads onto a single flash platform
Cloud Data Management platform for data protection, search, analytics, archival and copy data management...
Rubrik has developed the world's first Cloud Data Management platform for data protection, search, analytics, archival and copy data management for hybrid cloud enterprises. Fortune 500 companies use Rubrik to manage data at scale while realizing data-driven services anytime, anywhere. Rubrik has been named to Gartner's Cool Vendors in Storage Technologies, 2016 and recognized by Forbes as a Next Billion Dollar Startup.Headquartered in Palo Alto, CA, Rubrik has raised over $112 million from Lightspeed Venture Partners, Greylock Partners, Khosla Ventures, and enterprise IT luminaries including John W. Thompson (Microsoft Chairman, Symantec Former CEO), Frank Slootman (ServiceNow CEO, Data Domain Former CEO) and Mark Leslie (Leslie Ventures, Veritas Founding CEO)
Your fate will be determined by your speed of detection & response. LogRhythm
"LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company's award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
IT asset, patch, and systems management to IT service delivery and security, Ivanti is here.
When LANDESK and HEAT Software combined in January of 2017, we knew we needed a new company name. For nearly 30 years, LANDESK and HEAT offered user-centered IT solutions designed to increase user productivity while reducing IT security risk. LANDESK was the only vendor recognized by Gartner in the four areas of client management, endpoint protection, IT service and support, and enterprise mobility management. Over the years both companies changed. LANDESK acquired companies like Wavelink, Shavlik, Xtraction Solutions, and, most recently, AppSense. HEAT was created by combining FrontRange and Lumension. That's a lot of brand names. And in order to gather all these brands under one roof, we needed a new identityâand Ivanti was born. So whether you're looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help.
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!