dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Past Events>>

Smart vs. Dumb IT Systems Monitoring: Get Smart in 5 Easy Steps

June 25, 2012

In this 45-minute event, uptime software CEO, Phil Didaskalou and Solutions Architect, Joel Pereira, will explain how to get your IT systems monitoring smarter while avoiding the common 'dumb' IT monitoring pitfalls that drain resources, frustrate IT staff, kill IT budgets, and leave your IT environment dangerously exposed. Specifically, this event will cover:

  1. Smart vs. Dumb Monitoring? Learn the difference between Smart and Dumb IT systems monitoring.
  2. Move up the IT Maturity Curve: Learn the pillars of IT monitoring maturity.
  3. Don't Order the 'Tool Soup:' Why having multiple IT monitoring tools (network, server, application) can hurt your staff, kill your budget and make you less strategic.
  4. Focus on Time-to-Value: How fast and cost-effectively can tools provide an integrated solution to your monitoring process and pains?
  5. Takeaways You Can Use: Take home specific actions to make your IT systems monitoring smarter.

Data Management

Lower RTOs™ with Veeam Explorers for Microsoft SQL Server, Active Directory and Exchange

Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.

Sponsored by Veeam

Storage

SQL Server 2014 High Availability & Disaster Recovery with Pure Storage

Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.

Sponsored by Pure Storage

Security

CyberArk Introduces Privileged Account Security for SSH Keys

Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.

Sponsored by CyberArk