Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
"The Fortinet Security Fabric is the first architectural approach to security designed to dynamically adapt to the evolving IT Infrastructure. It intelligently and transparently segments the customer's network, from endpoint to the cloud, to provide advanced protection against sophisticated threats.
Protect your network against the widest range of DNS-based malware and attacks
Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The companyÃ¢ÂÂs flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centres, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor-based replication approach. www.zerto.com
makes all-flash and hybrid storage arrays
Tegile makes all-flash and hybrid storage arrays that help organizations eliminate storage silos, simplify storage management, and reduce costs by consolidating all of their workloads onto a single flash platform
Making IT security simple with complete solutions that protect networks, servers and devices Sophos
Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of Sophos Labs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organizations to focus on performance and growth. Sophos â Security made Simple.
Your fate will be determined by your speed of detection & response. LogRhythm
"LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company's award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
IT asset, patch, and systems management to IT service delivery and security, Ivanti is here.
When LANDESK and HEAT Software combined in January of 2017, we knew we needed a new company name. For nearly 30 years, LANDESK and HEAT offered user-centered IT solutions designed to increase user productivity while reducing IT security risk. LANDESK was the only vendor recognized by Gartner in the four areas of client management, endpoint protection, IT service and support, and enterprise mobility management. Over the years both companies changed. LANDESK acquired companies like Wavelink, Shavlik, Xtraction Solutions, and, most recently, AppSense. HEAT was created by combining FrontRange and Lumension. That's a lot of brand names. And in order to gather all these brands under one roof, we needed a new identityâand Ivanti was born. So whether you're looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help.
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!