Networking, Product Demos and Happy Hour begins
Protect your network against the widest range of DNS-based malware and attacks
Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The companys flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centres, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor based replication approach. www.zerto.com
Your fate will be determined by your speed of detection & response. LogRhythm
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company's award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!