Still Using Legacy Infrastructure? It’s a Trap!

Scott D. Lowe

Discover your inner IT Jedi rebel as you seek to thwart the forces that bind you to legacy infrastructure and avoid the traps of the public cloud.  During this 90-minute journey, you’ll discover how Nutanix’s approach to infrastructure accelerates enterprise IT into hyperdrive. Through discussions around private cloud, end user computing, and mission critical database workloads, you’ll learn specific steps you can take...

Presented In Partnership With: Nutanix

Register Now

Upcoming Events

  1. Still Using Legacy Infrastructure? It’s a Trap!

    Scott D. Lowe

    Discover your inner IT Jedi rebel as you seek to thwart the forces that bind you to legacy infrastructure and avoid the traps of the public cloud.  During this 90-minute journey, you’ll discover how Nutanix’s approach to infrastructure accelerates enterprise IT into hyperdrive. Through discussions around private cloud, end user computing, and mission critical database workloads, you’ll... Learn More

    Presented In Partnership With: Nutanix

  2. ActualTech Media LIVE Megacast: AWS, Azure, and GCP Solutions

    Scott D. Lowe, David Davis

    Across the spectrum of IT environments, from the smallest of SMB shops to the largest multinational conglomerates, the rise of the public cloud has had a profound impact which has allowed businesses to radically shift how they think about IT.  From instant provisioning of new services to the wholesale migration... Learn More

    Presented In Partnership With: FireMon, Rubrik, SADA, SolarWinds, Nutanix

  3. Applying an ROI framework to your Vulnerability Management Program

    James Green

    Join this webcast to learn how to quantify the value of switching to InsightVM, and also how to quantify the value of a vulnerability management solution in general. Learn more about the benefits of InsightVM from a security, financial, and business perspective. We’ll deep dive into the cost, benefit, flexibility, and... Learn More

    Presented In Partnership With: RAPID7

  4. How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

    James Green

    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user. In this webinar, Roger Grimes, KnowBe4’s... Learn More

    Presented In Partnership With: KnowBe4

On Demand

  1. Supercharging Edge Computing Environments

    David Davis, ft. Open Systems, Nutanix

    The world of IT is being continually fractured into smaller pieces as workloads migrate to new and different locations, including the cloud and, more recently, edge environments.  Edge environments encompass... Watch Now!

  2. Storage, Flash, NVMe and Storage Optimization EcoCast

    ft. Cohesity, NetApp, Veeam, Pure Storage, DataCore Software

    More so than ever in history, it's storage that is the greatest challenge facing IT professionals. With massively growing data, distributed data, and constant threats of data breaches, providing storage... Watch Now!

  3. Top Five Criteria For Evaluating a Modern Data Warehouse

    David Davis, ft. DCAC, Cloudera + Intel

    Many organizations face a two-fold challenge with changing business requirements and massively growing datasets. Before selecting a modern data warehouse solution, organizations should first understand the use cases, potential pitfalls,... Watch Now!

  4. Modernizing Data Protection with Pure Storage

    David Davis, ft. Pure Storage

    Increasing Data Volumes? Aggressive recovery SLA’s? Running scared of Ransomware attacks?  Sitting around waiting for restores? Are you modernizing your data protection architecture to solve some of these technology issues? Confused... Watch Now!

  5. Security Segmentation for the Modern, Agile, Innovative Data Center

    David Davis, ft. Illumio

    The modern data center is agile, shouldn’t your segmentation be as well? Traditional segmentation solutions such as internal firewalls or SDN segmentation are cumbersome, costly, and complex. These legacy approaches... Watch Now!