Technology has changed everything: one billion mobile workers, BYOD, cloud and virtualization, social business, 1 trillion connected objects. How do you manage security and stay competitive, effective and productive?
Threats range from national security to greed, to just plain meanness.
Tony will review the evolving threats facing today's organizations and how IBM Security Systems helps customers deal with them. Hear about the IBM Security Framework and the three pillars on which IBM Security Systems' strategy is built: Intelligence, Integration and Expertise.
Learn how others are solving the complex, four-dimensional puzzle of people, data, applications and infrastructure with a new approach to thinking differently about security. Download a PDF of Tony's PowerPoint presentation from the event.
Join InfoSystems for a day of technology conversations and demonstrations from some of the biggest names in business technology. Come at your convenience...visit the areas that interest you the most.
The Showcase will feature on-site interactive demos by experts from:
Learn about how to secure your organization's core information assets against new risks created by the changing landscape of social media, mobility and the evolving threat landscape.
Steve will discuss how Barracuda leverages virtualization, cloud and hosted technology to deliver world class solutions, as well as challenges and best practices with BYOD, Next Gen Firewalling and Application Delivery while transitioning your IT infrastructure to the cloud.
“Flash Arrays,” presented by Chris Gilbert, IBM Flash Expert
Flash technology is rapidly defining the new landscape of computing. IBM flash storage is extreme performance, microsecond latency storage that easily integrates to help businesses make decisions faster. IBM’s recent acquisition of Texas Memory Systems (TMS) extends IBM's leadership in flash optimized storage infrastructures. In this breakout session, you will learn about:
Every two days we create as much data as we did from the dawn of civilization up until 2003. Companies are turning to analytics to help them drive insights from the huge data growth to increase competitiveness. In fact, companies that used analytics were 2.2x more likely to outperform their industry peers. The world is changing and IT is playing an increasingly critical role in driving business growth and innovation. Are you ready for what's next? Find out how IBM Power Systems helps businesses reduce cost, improve IT efficiency, and enable new workloads like analytics.
“5 Most Common Ways Businesses Lose Data,” by Barton Fisk, IBM ProtecTIER Field Technical Sales Specialist
Learn how IBM ProtecTIER helps prevent data loss by addressing the five most common issues:
“Expert Integrated Systems,” presentedy by Raymond Johnson, IBM PureSystems Specialist
Discover IBM's game-changing "expert integrated" PureSystems technology. PureSystems combines the flexibility of a general purpose system, the elasticity of cloud and the simplicity of an appliance tuned to the workload – fundamentally changing the experience and economics of IT. PureSystems are defined by the following attributes, each helping clients to focus IT efforts on furthering competitive advantage:
Get an insider’s “behind the scenes” view of the IBM X Force Security Trends Report. The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
IBM System Storage V7000 & V3700
“Smarter Storage with IBM V7000 & V3700,” by Carter Pitman, Channel Technical Sales Specialist - Storage
Learn about the IBM Storwize V7000 all-in-one storage solution with Real-time Compression technology:
Learn about the IBM V3700 entry-level storage system designed to address growing data requirements and server consolidation needs:
Learn how IBM XIV Storage can:
InfoSystems Demo - IBM Flex System Manager and V3700
“Monitoring and Managing IBM PureSystems from your Mobile Device with Flex System Manager,” by Brett Kerns & Kevin McKenzie, InfoSystems Senior Network Engineer
Kevin will remotely log in to the IBM PureSystems install in the InfoSystems Business Partner Innovation Center (BPIC) to demonstrate the functionality of IBM Flex System Manager from an iPad. InfoSystems was the first to implement IBM PureSystems in Chattanooga, and has the only BPIC in Tennessee, Georgia or Alabama.
IBM Flex System Manager is a simple, free tool for mobile devices running on the Android, BlackBerry or iOS operating system, which enables you to monitor your IBM Flex System and PureFlex System hardware remotely. This application gives you access to the following types of system information:
InfoSystems iAssurance Breakout Session
"How iAssurance Helped a Local Customer," presented by Nate Hood, InfoSystems Solutions Specialist
Big data represents a new era in data exploration and utilization. IBM is uniquely positioned to help clients design, develop and execute a big data strategy that will enhance and complement existing systems and processes. Learn how big data platforms enable businesses to collect, integrate and transform large volumes of data. We will discuss integration and governance, structured, unstructured & streaming data as well as structured data warehouses.
At a time when applying analytics to big data has become an imperative, IBM business analytics software uniquely enables your organization to apply analytics to decision-making, anytime, anywhere. Learn how to make better and smarter business decisions faster with solutions that take business intelligence (BI) to a whole new level. Innovations in BI from IBM provide broader analytic capabilities so that everyone has the relevant information they need to drive business forward. IBM business intelligence products are designed to integrate with one another and with many third-party solutions, including leading big data platforms. So, you can start addressing your most pressing BI needs almost immediately with the confidence that you can seamlessly grow your solution over time to meet future requirements.
With the February 2013 release of the HIPAA Final Omnibus Rule, it is clear that HIPAA and HITECH, with their associated management pains, are here to stay. The Office of Civil Rights is unwavering in their dedication to forcing HIPAA/HITECH compliance, showing no mercy to even the smallest of medical entities that operate with Willful Neglect. Hospitals, doctors' offices and even state governments are feeling the wrath of OCR and their outrageous penalties. With covered entities and now all business associates facing five to seven-figure fines (and even potential jail time for some bad actors) there's no room for messing around with medical privacy.
Kevin will begin this talk with some stark truth about the covered entity and business associate privacy and security obligations and accompanying liability. From there, Kevin will cover anecdotal reality including examples of breaches, social engineering, resolution agreements and penalties suffered, etc., and provide suggestions on beginning the process of working toward compliance.
When it comes to BYOD, few companies want to implement every bell and whistle because (a) they don't have time, (b) they don't have skilled staff, (c) they don't have the budget, (d) they don't see the need, or, more likely, (e) all of the above. Since Wi-Fi takes center stage in any BYOD initiative, the good news is most organizations already have the right network components to address their BYOD basics without having to purchase more network equipment. This session will focus on how to simply address BYOD issues without a lot of pain and anguish. Topics will include identifying and managing devices, providing simple device security and access, role-based access, and visibility.
There are always a few “secrets” in any industry – and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it – for the obvious reason that none of these secrets helps the majority of the vendors in this space.
These secrets we discuss in this session are:
The scope of end-user computing is expanding, as the workforce adopts more and more devices and platforms that provide mobility and productivity anywhere. For IT, the upshot is an increasingly complex and dynamic environment that's hard to administer with rigid PC-centric tools and processes. VMware Horizon Suite moves IT beyond these limitations - with the technology and capabilities to securely deliver and manage robust end-user computing across all devices.