Networking, Product Demos with Coffee, Tea, Assorted Baked Items and Snacks Served
Protect your network against the widest range of DNS-based malware and attacks
Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The companys flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centres, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor-based replication approach. www.zerto.com
"The Fortinet Security Fabric is the first architectural approach to security designed to dynamically adapt to the evolving IT Infrastructure. It intelligently and transparently segments the customer's network, from endpoint to the cloud, to provide advanced protection against sophisticated threats.
Secure and Unify End User and Privileged User Identity Getting to the root of breaches while reducing...
The world of Identity Management is dangerously fragmented and needlessly complex. Do not settle for half a solution when you need full protection for both end users and privileged users. Centrify secures enterprise identities against cyber threats that target todayâs hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches , compromised credentials , by securing an enterprise's internal and external users as well as its privileged accounts. In this session, we will discuss Centrifys platform approach to securing enterprise identities and
End-to-end Service Management - Ivanti
The heart of IT is about empowering people and being able to serve and secure all types of users, on all the devices they use, wherever they are. With an end-to-end Service Management solution, only LANDESK unifies and automates the delivery of all the assets and services users need across mobile, cloud, and personal computing environments. By making users happy, we make IT more strategic and business more productive.The LANDESK end-to-end Service Management solution encompasses four essential areas:
- Unified Endpoint Management
- IT Service Management
- Endpoint Security
- IT Asset Management
In April 2016, LANDESK completed
the acquisition of AppSense
, the leading provider of secure user environment management solutions. This acquisition extends LANDESK's unified endpoint management capabilities to both physical and virtual devices, and advances our endpoint protection offerings with the addition of privilege management and application.
Cloud Data Management platform for data protection, search, analytics, archival and copy data management...
Rubrik has developed the world's first Cloud Data Management platform for data protection, search, analytics, archival and copy data management for hybrid cloud enterprises. Fortune 500 companies use Rubrik to manage data at scale while realizing data-driven services anytime, anywhere. Rubrik has been named to Gartner's Cool Vendors in Storage Technologies, 2016 and recognized by Forbes as a Next Billion Dollar Startup.Headquartered in Palo Alto, CA, Rubrik has raised over $112 million from Lightspeed Venture Partners, Greylock Partners, Khosla Ventures, and enterprise IT luminaries including John W. Thompson (Microsoft Chairman, Symantec Former CEO), Frank Slootman (ServiceNow CEO, Data Domain Former CEO) and Mark Leslie (Leslie Ventures, Veritas Founding CEO)
Happy hour with Open Bar and Hors' doeuvres
Raffle and Optional Dinners
TechTalks is the place for leaders in the technology community to relax, network and hear about the latest mission-critical technologies in a social setting. Enjoy your beverage of choice; munch on appetizers; connect with people you've friended, LinkedIn and tweeted; and discuss cutting-edge technology with innovative IT manufacturers and their partners.
Register now to join us after work. Network over Happy Hour. It's free to attend!
Most of all get the information you need to be indispensable in your job. You'll hear the most up-to-date information on topics like:
- The tools and techniques attackers are using and how to architect for prevention
- Virtualizing your infrastructure and applications without impacting performance
- Secure, reliable co-location services
- Changing the performance and economics of enterprise storage
- The future of authentication and security
- Secure and unify end user and privileged user identity
- Protecting your network against the widest range of DNS-based malware and attacks
- Big Data best-of-breed approach
Space is limited so reserve your seat today!