6/16 Virtual Interop



If you are not automatically redirected, please click here.

Events
Innovation in the Cloud

A Video Highlight from Interop Live!

From security to performance, from management to deployment, in this keynote from Interop live HP CTO Russ Daniels will discuss the big issues facing companies that want to adopt cloud computing, arming you with the facts you need to leverage this huge shift in IT.


Mobile Platforms and Application Delivery

A Video Highlight from Interop Live!

Thick client? Thin client? Custom or off-the-shelf applications? Backup? Managing integrity, connectivity and security? These are only a few of the key questions we'll explore in this session. Given the variable connectivity inherent in wireless is an ever-present challenge, the debate over how best to provision application services to a broad variety of mobile platforms is certain to be intense—and informative.


Motorola Platinum Sponsor Presentation: Wireless Security – What Hackers Know that You Don’t
The benefits of wireless LANs are undeniable; however, the security issues introduced by them are rapidly increasing. Several recent high-profile data breaches have occurred as a direct result of insecure wireless networks. Tens of millions of new Wi-Fi capable devices are being shipped each year, and they are proliferating within the enterprise. These self-deploying, transient wireless networks are dangerous to all organizations, regardless of their WLAN deployment status.
Reinventing the Data Center
New requirements, new architectures and new constraints are creating a new order inside the data center. Our panel of experts will debate the effects of virtualization and high-speed networking as they describe the shape of things to come and what users need to do to prepare for the next generation of data center solutions.
The Five Most Important Things You Need to Know Now About IT Security
Information security continues to evolve beyond traditional technologically-focused controls into meaningful risk-oriented and business-aligned capabilities. Our panel of security experts will discuss the important technologies and emerging concepts that are being designed to protect data and company reputations and try to hone in on the five most important issues you need to know now.
Virtualization: Life in the Trenches
Virtualization is altering the design, operation and management of the data center and is driving a fundamental shift in how we think about our data center environments. Cut through the marketing hype and hear about real world experiences with current virtualization solutions.
On Demand
Presentations
A. Sinha & B. Gillooly

Dr. Amit Sinha
Fellow & Chief Technologist
Motorola

Brian Gillooly
Editor in Chief of Events
InformationWeek Business Technology Network


A. Skamarock, C.Steffen, R. Makamsom

Anne Skamarock
Research Director
FOCUS Systems

Christopher Steffen
Principal Technical Architect

Kroll Factual Data

Ryan Makamson
Systems Engineer
Washington State University

School of Electrical Engineering and Computer Science


A. Wittmann, M. Day, D. Yen, D. Stevens, P. McNab

Art Wittmann
Managing Director
InformationWeek Analytics

Mark Day
Chief Scientist
Riverbed

David Yen
EVP & GM
Data Center Business Group

Juniper Networks

Dave Stevens
CTO
Brocade


E. Chan, A. Chopra, B. Wesson, M. Clewley, S. Haney

Eric Chan
Mobile Evangelist
Mobileslate

Ajay Chopra
General Partner
Trinity Ventures

Benjamin Wesson
VP Products
Dexterra

Michael Clewley
Technical Product Manager
RIM

Stephen Haney
VP Americas
Mobile Distillery


J. Pironti, J. Corman, J. Routh, T. Murphy

John Pironti
Chief Information Risk Strategist
Getronics

Joshua Corman
Principal Security Strategist

IBM/ISS

Jim Routh
CISO
KPMG USA

Tom Murphy
Chief Strategist
Bit9 Inc.


R. Daniels

Russ Daniels
VP & CTO of Cloud Services
HP


$100 American Express Gift Card
Who doesn’t need a little extra money in these economic times? Your American Express gift check can be used anywhere that American Express is accepted, in over a million places worldwide.
MS Wind Netbook
Get communication anytime, anywhere. This Netbook features a 10" wide LCD display, LED power-saving backlight technology, ultra lightweight design, an ergonomic big-size keyboard and touch pad and a hard drive with massive capacity.
PURE Digital Flip Mino F360 Camcorder - Flash card
Flip Mino is the smallest, sleekest camcorder. Mino combines remarkable video quality and pocket-sized design so you can tell your stories wherever you go. You've never had this much fun with video.
MOTONAV™ TN30 GPS navigation system
Featuring a 4.3” anti-glare touch screen, this Motorola unit provides freedom with Bluetooth hands-free calling, Caller-ID and more: • Lane guidance • Turn-by-turn directions • Preloaded maps of the 50 US States, Puerto Rico and Canada • More than one million searchable points of interest • Automatic day and night mode adjustment
Virtual Classroom e-Learning course valued at up to $3,995!
Just like our facility-based classrooms, featuring live, instructor-led training delivered via the Internet. Choose from more than 160 Virtual Classroom e-Learning courses featuring the same content and labs as the classroom.
APC
Arcsight
ASG
Data Domain
Eaton
Elastra
Global Knowledge
Help Booth
InformationWeek
Motorola
Prize Center
TechWeb Lounge
Thawte
ArcSight
Welcome to the ArcSight Booth. ArcSight (NASDAQ: ARST) is a leading global provider of compliance and security management solutions that protects businesses and government agencies. ArcSight helps customers comply with corporate and regulatory policy, safeguard their assets and processes, and control risk. The ArcSight platform collects and correlates user activity and event data across the enterprise so that businesses can rapidly identify, prioritize, and respond to compliance violations, policy breaches, cybersecurity attacks and insider threats.
ArcSight, security, compliance, log management, SIEM, Security Information and Event Management, logger, NERC, HIPAA, PCI, PCI DSS, IT, Information Technology, Express, Mid-market, SMB, budget, secure, healthcare, financial, finance, government, utilities, protect your business, MSSPs, university, education, legal, compliant, ARST, perimeter, computer crime, cybercrime, data breach report, data breaches, data compromise, forensics, information security, insider threat, identity, cyber-security, cyber security, InterOp
Eaton
You may have heard Eaton’s name in the electrical industry. But you may not know that we’re a leader in the UPS market. In fact, the majority of Fortune 500 companies rely on Eaton for their power protection, conditioning, distribution and management solutions. With nearly a century of insight, innovation and commitment to superior engineering, we’ve demonstrated to both UPS users and experts that Eaton delivers what customers need and want: the highest quality products and the most reliable service.
Eaton, Powerware, MGE Office Protection Systems, Green, IT, UPS, Uninterruptible Power Systems, cooling, efficiency, sustainability, energy, management, power quality, reduce costs, comprehensive, mission critical, solutions, software, connectivity, services,
Elastra
Automate Deployment of your Application Infrastructure
Elastra, cloud computing, cloud, automation, orchestration, application architecture, modeling, IT management, management, provisioning
Global Knowledge
Worldwide IT and Business Training and Cisco's Global Learning Partner of the Year 2008
Global Knowledge, IT training, IT skills, virtualization, data center, mobility and wireless, IT security, certification, training solutions
Interop Lounge
TechWeb Lounge
TechWeb Lounge, networking, chat, communication, discussion, forum, experts, discussions, lounge
Motorola
Welcome to Motorola AirDefense: Enterprise Wireless LAN Security, Compliance and Troubleshooting
Motorola, security, WIPS, intrusion prevention, wireless, forensics, vulnerability, compliance, troubleshooting, rogue, gap-free security, enterprise, AirDefense, mobile, mobility, hacker
Prize Center
Visit the Prize Center to learn how you can win awesome prizes on June 16, 2009!
Prize Center, giveaways
Support Center
Help Booth
Visit the Support Center to get real-time assistance and technical help on June 16, 2009
hehlp, support, chat, assistance, troubleshooting, guide
Thawte
Thawte - it's a Trust thing
Thawte, data, data deduplication, de-duplication
Virtual Interop
The Leading Business Technology Event
Visit Interop's virtual booth to watch videos and presentations, learn about upcoming Interop live events, complete feedback surveys, and chat with Interop representatives.
interop, conference, expo, IT, informationweek, videos, feedback, survey, resources, editors, experts, cloud computing, press
2009 Cloud Computing Benchmark Report Results of Elastra's 2009 Cloud Computing Benchmark Survey
ElastraBenchMarkReport.pdf
7
2009 IT Skills and Salary Report (US) With over 14,150 responses, the 2009 report has turned out to be one of this year's most relevant and revealing salary surveys in the industry.
2009_SalaryReport.pdf
0
About Us We are the worldwide leader in IT and business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services.
http://www.globalknowledge.com/training/generic.asp?pageid=2&country=United+States
0
Application Development and Testing in the Cloud Soluton brief on how application developers can use Elastra to test and deploy applications faster.
solutionbrief_devqa(2).pdf
7
ArcSight Products
http://www.arcsight.com/products/
5
ArcSight Webinar Portfolio
http://www.arcsight.com/webinars/
0
Building a Successful Security Operations Center (SOC)
http://www.arcsight.com/collateral/whitepapers/ArcSight_Whitepaper_SuccessfulSOC.pdf
7
Centralized WLAN Troubleshooting - Maximizing Wireless Network Availability
Centralized_WLAN_Troubleshooting-White_Paper.pdf
7
Certify your Software Integrity with thawte Code Signing Certificates This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
codesigning_eng.pdf
7
Contact Us For more information about our training solutions or to register for a course, call us at 1-800-COURSES or email am_info@globalknowledge.com
http://www.globalknowledge.com/training/generic.asp?pageid=8&country=United+States
0
Data Center and Facility Solutions Eaton Three-Phase Solutions
http://powerquality.eaton.com/Products-services/Backup-Power-UPS/Data-Center-Facility/default.aspx
0
Data Center Training To get the maximum benefits from data center solutions, organizations need the savviest IT professionals, with new ways of thinking about their data center architecture, implementing and managing their solutions. We help meet the challenges of data center optimization.
DCT-001.pdf
3
Data Center Training Courses Our broad-based data center curriculum includes Cisco, VMware, Sun, IBM, Red Hat, and Microsoft courses. Global Knowledge and Firefly have partnered to bring advanced integrated virtualization solutions to a worldwide market.
http://www.globalknowledge.com/training/category.asp?pageid=9&catid=495&country=United+States
5
Dedicated Distributed Sensing - The Right Approach to Wireless Intrusion Prevention
Dedicated_Distributed_Sensing-White_Paper.pdf
7
Eaton 5130 UPS brochure
Eaton5130_brochure.pdf
0
Eaton 9130 Rackmount UPS brochure
Eaton9130RM_brochure.pdf
0
Eaton 9135 UPS brochure
Eaton9135_brochure.pdf
0
Eaton 9390IT UPS Brochure Overview of Eaton's new 9390IT UPS
Eaton_9390IT_brochure.pdf
0
Eaton BladeUPS BladeUPS product brochure
EatonBLADEUPS_brochure.pdf
0
Eaton ePDU Rackmount power distribution
http://powerquality.eaton.com/Products-services/Power-Distribution/Rack-Mounted-Power-Distribution.asp
0
Eaton Overview Brochure Brief overview of Eaton's power quality solutions
EatonBLADEUPS_brochure.pdf
1
Eaton Product Catalog Comprehensive overview of Eaton's power quality solutions
EatonProductCatalog.pdf
1
Eaton website Home page for Eaton's Power Quality Solutions
http://powerquality.eaton.com/Videos/default.asp
0
Elastra Product Overview Elastra Product Overview
productoverview.pdf
2
Elastra Screenshot 1 Defining Resources within Elastra
DefiningResources.jpg
5
Elastra Screenshot 2 Managing Resources within Elastra
ManagingResources.jpg
5
Enterprise Wireless LAN Security
Enterprise_WLAN_Security-White_Paper.pdf
7
Extended Validation SSL Certificates Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
ev_eng.pdf
7
Find a Reseller Search tool to find an Eaton reseller in your area
http://powerquality.eaton.com/Where-To-Buy/Reseller.asp
0
Gartner MQ for SIEM and Log Management - 2009 - Security Information and Event Management (SIEM)
http://www.arcsight.com/library/download/GartnerMQ/
7
Identity Monitoring - Insider Threat
http://www.arcsight.com/products/products-identity/
5
Introduction to Elastic Computing An introduction to elastic computing concepts
elastra_ec_white-paper_web.pdf
7
IT Security Training Courses Leverage our broad-based security curriculum that includes the latest in skills-building and vendor-specific training from Cisco, Microsoft, Red Hat® Linux, Foundstone, EC-Council, F5, Bluecoat, and Check Point.
http://www.globalknowledge.com/training/category.asp?pageid=9&catid=191&country=United+States
5
Licensing in the Cloud Whitepaper describing the challenges of managing software licenses in the cloud
elastra_licensing_in_the_cloud_web.pdf
0
Log Management and Event Log Compliance Solutions
http://www.arcsight.com/solutions/solutions-logmanagement/
5
Monitoring Enterprise-wide Business Risk
http://www.arcsight.com/library/download/WPArcSightEnterpriseView/
7
Motorola AirDefense Advanced Forensics Data Sheet The Advanced Forensics module provides administrators with the ability to rewind and review detailed records of wireless activity that can assist in forensic investigations or wireless network troubleshooting
Advanced_Forensics.pdf
1
Motorola AirDefense Advanced Troubleshooting Data Sheet With Advanced Troubleshooting, administrators can perform expert analysis of wireless connectivity issues & end-to-end network testing from the wireless perspective
Advanced_Troubleshooting.pdf
1
Motorola AirDefense Centralized Management Console Data Sheet The Centralized Management Console manages settings of multiple appliances from one console
Centralized_Managment_Console.pdf
1
Motorola AirDefense Enterprise Brochure Motorola AirDefense Enterprise is the leading Wireless Intrusion Prevention System, providing complete protection against wireless threats, policy compliance monitoring, robust performance monitoring and troubleshooting, and location tracking
AirDefense_Enterprise_Brochure.pdf
1
Motorola AirDefense Mobile Data Sheet Motorola AirDefense Mobile is a complementary solution to the Motorola AirDefense Enterprise monitoring platform for the mobile workforce
AirDefense_Mobile.pdf
1
Motorola AirDefense Personal Data Sheet Motorola AirDefense Personal protects the mobile workforce by monitoring for malicious or accidental wireless activity, as well as wireless device misconfigurations that may cause security esposures or policy violations
AirDefense_Personal.pdf
1
Motorola AirDefense Security & Troubleshooting Webcasts
http://www.airdefense.net/webcasts/index.php
4
Motorola AirDefense Specturm Analysis Data Sheet With Spectrum Analysis, administrators can identify and classify possible sources of non-802.11 interference
Spectrum_Analysis.pdf
1
Motorola AirDefense WEP Cloaking Data Sheet WEP Cloaking provides protection for wireless infrastructure secured by legacy encription protocols. It helps meet PCI requirements by supplementing WEP encryption.
WEP_Cloaking.pdf
1
NERC CyberSecurity Solutions for CIP–002 through CIP–009 - Compliance Monitoring Automation with SIEM and Log Management NERC whitepaper
http://www.arcsight.com/collateral/whitepapers/ArcSight_Whitepaper_NERC.pdf
7
Network and Server Solutions Eaton Single-Phase UPS products
http://powerquality.eaton.com/Products-services/Backup-Power-UPS/Network-Server/default.aspx
0
Order a catalog Order a hardcopy catalog to be mailed to you
http://powerquality.eaton.com/info/request_information_pp.asp?id=186&key=code1&leadg_Q_QRequired=True&site=&menu=
0
SANS Annual 2009 Log Management Survey
http://www.arcsight.com/library/download/SANSLogManagementSurvey/
7
Scalability in Log Management
http://www.arcsight.com/collateral/whitepapers/ArcSight_Whitepaper_LogScalability.pdf
7
Securing your Apache Web Server with a thawte Digital Certificate Securing your Apache Web Server with a thawte Digital Certificate (155 KB)
apache_eng.pdf
7
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
iis_eng.pdf
7
Securing your Online Data Transfer with SSL A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
ssl_eng.pdf
7
Security Expert In a Box - ArcSight Express Product Brief
ArcSight_ProductBrief_Express.pdf
5
Security Expert In a Box - ArcSight Express
http://www.arcsight.com/products/products-esm/arcsight-express/
5
Server-Gated Cryptography Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
sgc_eng.pdf
7
The Shortcut Guide to Managing Certificate LifeCycles If you have ever shopped for a certificate, you know that there is a wide selection of products and vendors from which to choose. Knowing what you need and, more importantly, why you need it, can be pretty confusing-even for a seasoned professional. This guide to managing the certificate lifecycle will cover a range of topics surrounding digital certificates, with an eye towards giving you the inside track when it comes to making decisions about PKI. This guide is for both those new to digital certificates and for technologists with extensive experience.
cert_lifecycle.pdf
7
The Starter PKI Program This guide will introduce you to our Starter PKI Program, explaining how it works as well as the benefits it offers. We'll also point you to a dummy company on our Web site where you can test drive the Program.
spki_eng.pdf
7
Tired of Rogues? Solutions for Detecting and Eliminating Rogue Wireless Networks
Tired_Of_Rogues-White_Paper.pdf
7
UPS Selector Configure the right UPS solution for your application
http://powerquality.eaton.com/UPS/selector/SolutionOverview.asp
0
UPSgrade program brochure Review of Eaton's new UPSgrade (trade-in) program
Eaton_UPSgrade_Program.pdf
1
Virtualization Training Courses We have the hands-on training you need to plan, deploy, and manage your company's virtualization strategy. Our broad-based virtualization curriculum includes Authorized VMware® (including new vSphere courses), Cisco, Citrix, IBM, Red Hat, and Microsoft courses to give you the skills you'll need in a virtualized environment.
http://www.globalknowledge.com/training/category.asp?pageid=9&catid=488&country=United+States
5
Webinar: Application Infrastructure Automation - Beyond Virtualization A webinar discussing how a company can start leveraging their virtualization investment to automate the creation and management of application infrastructure.
http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.4.2.16.1001&permalinkId=v18596766reWwJccs&player=videodetailsembedded&videoAutoPlay=0&id=21219675
6
Webinar: Current Trends in Security and Compliance Monitoring Every Thursday - 10 am pacific
http://w.on24.com/r.htm?e=126989&s=1&k=2FB9B0BF1AC5984AD53CE9D6998EA7A9
0
Webinar: Getting Started With Internal Cloud Computing A webinar discussing how to start capturing the benefits of creating an internal corporate IT cloud.
http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.4.2.14.1006&permalinkId=v18558034bbdxp2RJ&player=videodetailsembedded&videoAutoPlay=0&id=21219675
6
Webinar: Is Internal Cloud Computing Right For You? A webinar discussing the types of companies that could get the great benefit from internal cloud computing.
http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.4.2.14.1006&permalinkId=v185580454gc5wYtd&player=videodetailsembedded&videoAutoPlay=0&id=21219675
6
Webinar: Log Management Tech Talk Every Wednesday at 10 am pacific
http://w.on24.com/r.htm?e=123049&s=1&k=713E93B0078195EF890C1BF900ED1E15
0
Webinar: Using SIEM/Log Management to Achieve Significant ROI June 23rd - 9 am pacific
http://mediazone.brighttalk.com/event/ISC2/f804d21145-2763-intro
0
Webinar: Cisco Nexus Family Overview Global Knowledge instructor Joe Onisick presents an overview of the Nexus Switching family components and how each component ties together to provide robust, flexible high performance data center architectures.
https://globalknowledge5.ilinc.com/join/ybyrbhr
6
White paper: 10 Hot Skills for 2009 Whether we are in a down economy, seeing jobs go offshore, or witnessing jobs being cut altogether, there are certain IT skills that will never go out of style. Here's our list of top 10 hot skills that will take us through a down economy and beyond.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Leung_10HotSkills.pdf
7
White paper: Preparing for Tomorrow's Threat Today: What We Can Learn from the History of Malware and Defenses This white paper provides a history of attacks and defenses and points out the directions in which security professionals need to look.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Gregg_TomorrowsThreat.pdf
7
White paper: Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts This white paper covers the basics of risk management in security, including the security triangle, calculating ROI, and policies and procedures.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Dixon_RiskMgt_P3.pdf
7
White paper: Security on a Budget This white paper discusses several techniques, methods, and tools that can save your and your company valuable security dollars.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Stewart_SecurityBudget1.pdf
7
White paper: The Value of Virtualization Virtualization offers multiple ways to save money, including hardware purchase, power and cooling costs over time, and staff time needed when providing a test and analysis environment to name a few. This white paper will explain some of the ways you can save time and money by using virtual soft- and hardware.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Egan_Virtualization_P.pdf
7
White paper: Understanding the Basic Configuration of the Adaptive Security Appliance (ASA) The number of tools at the disposal of the security administrator has increased so dramatically, it is very difficult to be an "expert" in all aspects of network security. This paper will help you understand the basic configuration of the Cisco Adaptive Security Appliance (ASA).
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Fox_ConfiguringASA_P.pdf
7
White paper: vSphere: New Features and Benefits VMware has made major improvements to the VI3 suite of products and released a new and exciting offering called vSphere. This white paper highlights the most notable new features and discusses the benefits they offer your organization's IT infrastructure.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Ferguson_vSphere.pdf
7
White paper: WPA2 SECURITY: Choosing the Right WLAN Authentication Method for Homes and Enterprises This paper explores the authentication methods available with WPA2 and identifies several important best practices to consider when deploying a wireless network at home or in the enterprise.
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Miller_WPA2Security_P.pdf
7
Wireless LAN Security: What Hackers Know That You Don't
What_Hackers_Know_That_You_Don't-White_Paper.pdf
7
Wireless LANs: Is My Enterprise At Risk?
Is_My_Enterprise_At-Risk-White_Paper.pdf
7
Wireless Protection for the Mobile Enterprise
Wireless-Protection_For_The_Mobile_Workforce-White_Paper.pdf
7
Wireless Security: Ensuring Compliance with HIPAA, PCI, GLBA, SOX, DoD 8100.2 & Enterprise Policy
Ensuring-Compliance-White_Paper.pdf
7
Wireless Training Courses We have the hands-on training you need to master the skills required to understand, build, and maintain voice and data networks. Get the basics down, then focus in on specialized disciplines with Wireless training, IPv6 training, TCP/IP training, VoIP training, and CompTIA's A+ training, Server+ training, and Network+ training. Gain the skills to implement, support, optimize, and defend wireless networks, while preparing for CWNP certifications, CWNA, CWNE, CWSP, and Wireless#, and Cisco Wireless LAN certification.
http://www.globalknowledge.com/training/category.asp?pageid=9&catid=187&country=United+States
5
World-Class Protection for the Mid-Size Organization
ArcSight_Whitepaper_Express.pdf
7
Attendee Show Package
This Show Package provides access to the entire show contents