Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
Protect your network against the widest range of DNS-based malware and attacks
Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The companys flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centres, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor-based replication approach. www.zerto.com
Cloud Data Management platform for data protection, search, analytics, archival and copy data management...
Rubrik has developed the world's first Cloud Data Management platform for data protection, search, analytics, archival and copy data management for hybrid cloud enterprises. Fortune 500 companies use Rubrik to manage data at scale while realizing data-driven services anytime, anywhere. Rubrik has been named to Gartner's Cool Vendors in Storage Technologies, 2016 and recognized by Forbes as a Next Billion Dollar Startup.Headquartered in Palo Alto, CA, Rubrik has raised over $112 million from Lightspeed Venture Partners, Greylock Partners, Khosla Ventures, and enterprise IT luminaries including John W. Thompson (Microsoft Chairman, Symantec Former CEO), Frank Slootman (ServiceNow CEO, Data Domain Former CEO) and Mark Leslie (Leslie Ventures, Veritas Founding CEO)
IntelliFlash Storage Arrays
Flash storage has the power to fundamentally transform how you do business, but until now solutions have forced you to compromise on performance, price, or features.At Tegile, we don't believe in compromises. Our hybrid and all flash storage arrays are engineered to support multiple grades of storage media to deliver optimal performance with the best possible economics. They also include a full suite of advanced data services, multi-protocol support, and robust management capabilities.So why compromise? Get a flash storage that's fast, flexible and affordable.
From insiders to sophisticated external attackers, the reality of cyber security today is that...
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network. Based on unsupervised machine learning and probabilistic mathematics, new immune system technologies are capable of learning the self of an organization. By analyzing every network, device, and user, and modeling them as they go about their day to day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and take precise, measured actions to automatically curb the threat
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!