Data Storage Day: Storage & Processing Systems, Technologies, Infrastructure, Management

Data Storage Day: Storage & Processing Systems, Technologies, Infrastructure, Management
11.03.2012

Data Storage Day Storage & Processing Systems, Technologies, Infrastructure, Management

Data Storage Day - a one-day event focused on the current trends in the storage industry – will be held at 27-th September within Infosecurity Russia show 2012. The goal of Data Storage Day is to explain the trends and developments in the storage industry in the language spoken by hands-on IT professionals.        

 

According to the statistics, corporate data archives are beind redoubled every 2 years. The different types of data, collected by companies during their business activity require efficient approaches to their management, storage, and fast access. In many companies this situation is being complicated with usage of different products from different suppliers. At the same time, companies are interested in business processes speed increasing, protection level increasing and easy access to the corporate information.

 

Data Storage Day, organized within Infosecurity Russia 2012 show, will focus on the current trends in the storage industry and difficulties of practical creation and usage of data storage systems, corresponding to the business goals of End-Users.

 

The event is orientated to TOP management of the companies, CIOs, CTOs, IT Managers, specialists responsible for data storage and processing management in different types of organizations.

 

KEY SUBJECTS TO DISCUSS:

 

Business Continuity and Data Recovery:

- Easy Access and Data Recovery

- Business Continuity Management

 

Consolidation and Data Management:

- Storage System Correspondence to Data Structure and Business Size

- Storage System Infrastructure Consolidation for Fastest ROI

- Storage System Virtualization and Infrastructure Optimization

 

Information Life Cycle Management:

- Data Prioritization According To Its Value For Business

- Key Factors of Success in Realization Of ILM Strategies

- Secured Data Erasure

 
We proudly invite International and Domestic professionals of Storage Technologies to join profile Round-Table discussions and present their cutting-age vision.
 
 
We will be glad to see youamong our speakers.
 
 
Secure your participation in the Infosecurity Russia 2012 by the booth and/or seminar time-slot reservation at int@groteck.ru
 
 
GROTECK Business Media
International Team
Infosecurity Russia 2012
26-28-th September, Moscow, Crocus Expo
 

 

| Share

Karl Soderlund joins imperva as vice president, Worldwide Channels and Alliances Imperva, Inc, committed to protecting business-critical data and applications in the cloud and on-premises, announced today that Karl Soderlund has been appointed as the company’s Vice President of Worldwide Channels and Alliances. In his role at Imperva, Soderlund will be responsible for transforming the channel and alliance program by both expanding relationships with existing managed service providers and value-added resellers and distributors, as well as by adding new classes of partners to support the company’s growth. He will report directly to Chief Revenue Officer, Michael D. Mooney.

More

SecureTower 5.7: ergonomic interface, new tools for data transmission control and unique reportsFalcongaze announces a new version of the SecureTower software, designed for confidential data leakage prevention, monitoring of staff activity, as well as comprehensive protection of business against internal threats. The tools allowing to ensure reliable preservation of information assets, get even more detailed information about the workflows and protect the business from the effects of the crisis have been added to SecureTower 5.7.

More

Synopsys Completes Acquisition of Software Security Company CodenomiconSynopsys, Inc. has completed its acquisition of Codenomicon, a global software security company based in Finland with a focus on software embedded in chips and devices. Codenomicon is known for independently discovering and reporting the Heartbleed bug. The additional talent, technology and products will expand Synopsys- presence in the software security market segment and extend the Coverity platform to give organizations the visibility and real-time intelligence necessary to effectively protect their software assets against security vulnerabilities.

More

CyberArk Announces Strong Second Quarter 2015 ResultsCyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced financial results for the second quarter ended June 30, 2015.

More

HOB Honored as a Winner in the 10th Annual 2015 IT World AwardsHOB, a market leader in secure remote access solutions, has been honored with three awards for its Remote Desktop Virtual Private Network (HOB RD VPN ) in the 10th Annual 2015 IT World Awards, hosted by Network Products Guide, the IT industry-s leading technology research and advisory publication. The 10thh Annual 2015 IT World Awards honor excellence in every facet of the industry, including the products and people behind the successes.

More

BalaBit announces general availability of Blindspotter; advanced monitoring to identify suspicious user activityBalaBit, an IT security innovator specialising in advanced user monitoring technologies, today announced that its next-generation IT security tool, Blindspotter, is now generally available. Blindspotter is a real-time, user behaviour analytics (UBA) tool that analyses user activities and identifies suspicious events occurring throughout IT systems. It is designed to help organisations mitigate the impact of advanced persistent threats (APTs) or identify malicious internal activity and to speed up the investigation process of any suspicious activity.

More

The twins: two brothers on probation were arrested for online-banking theft in RussiaInformation Security Center of the Russian FSB, DESAC (Department of Economic Security and Anti-Corruption), Investigative Department of the Russian Ministry of Internal Affairs, with the assistance of expert organization Group-IB and security department of Sberbank carried out an operation to arrest members of an organized group of cyber criminals.

More

Qrator Labs and Circuit Exchange announce the start of technological partnershipQrator Labs and Circuit Exchange announce the start of technological partnership | comnews Today one of the most reliable DDoS mitigation schemes is the algorithm directing all traffic to pass through a specialized network where it undergoes analysis and filtering, sending it over VPN directly to customer-s network afterwards. Under the terms of cooperation Qrator Labs and Circuit Exchange have already implemented several unique joint projects: so as to prevent hacker attacks, the traffic of the protected websites goes into the Qrator cloud and uses secure channels to reach customer-s web infrastructure.

More

Fluke Networks LinkSprinter Continues to Impress Industry Experts, Garner More HonorsThe LinkSprinter network tester from Fluke Networks has recently been named a finalist for two industry awards. In addition to being named Best in Show runner-up in the Testing category at Interop Tokyo, LinkSprinter has won the Voice, Data, and Video (V/D/V) Test and Measurement Equipment category for Electrical Construction and Maintenance (EC&M) Magazine’s 2015 Product of the Year Awards. As a category winner, the LinkSprinter is now eligible for the overall Product of the Year award, which EC&M will announce in August.

More

The LEC-7230M: A Robust, Nimble and All-purpose Embedded Hardware SolutionLanner today announced the release of the LEC-7230M, an aluminum and SGCC variant of the recently released LEC-7230L.

More