Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
helps defend organizations against breaches through its easy and effective cloud-based Trusted...
The company verifies the identity of users, and the health of their devices, before granting them access to applications. Duoâs balance of security and usability has led them to be an enduring and trusted partner to thousands of customers world-wide, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Etsy, Yelp, Zillow, Paramount Pictures, and more. The Ann Arbor, Michigan-based company maintains offices in Austin, Texas; San Mateo, California; and London, and is backed by Benchmark, Geodesic Capital, Google Ventures, Index Ventures, Lead Edge Capital, Meritech Capital Partners, Radar Partners, Redpoint Ventures, True Ventures, and Workday. Visit duo.com to find out more.
a Western Digital brand makes all-flash and hybrid storage arrays
that help organizations eliminate storage silos, simplify storage management, and reduce costs with one flash platform for all workloads.
"The Fortinet Security Fabric is the first architectural approach to security designed to dynamically adapt to the evolving IT Infrastructure. It intelligently and transparently segments the customer's network, from endpoint to the cloud, to provide advanced protection against sophisticated threats.
Happy hour with Open Bar and appetizers
Raffle and Optional Dinners
is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
Space is limited so reserve your seat today!
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach