The IT Summit was selected as one of the top ten "must-attend" events for CIOs and IT Marketers
– April 2013 CTOsOnTheMove.com
Overview
The IT Summit is the executive technology conference series returning to Seattle for our second annual event on April 24, 2013. The purpose of the summit is to provide educational and networking resources for the IT leaders in the Puget Sound area. The conference is driven by an Executive Board of regional IT professionals that directs the content of the educational sessions and sponsor participation. The IT Summit is designed to address the real-world opportunities and challenges faced by today’s executives, by facilitating face-to-face interaction and networking among information technology peers.
Event Updates and Information
Get into the ballpark spirit as you join your IT peers at the KRP Communications exhibit at booth 139 for complimentary peanuts and popcorn.
Agenda
8:00 AM – 3:00 PM
Registration Open – Third Base Entry / Diamond Club Lobby
8:00 AM – 8:40 AM
Sponsored by Equinix – Booth 129 – Visit our solution providers and learn about the latest technologies.
Join us for morning coffee.
Complimentary for all guests.
Enjoy a delicious cup of coffee while catching up with your IT-professional peers and visiting with our vendors, before beginning your day of education and networking.
Allan brings over 15 years of experience across a wide range of domains including IT management, product management and strategy, technical marketing and sales. As the DCIM Consultant, Allan is responsible for providing technical expertise in the field of Data Center management across all markets through various sales relations, public speaking, publishing and blogging. He also spends time working with clients to map out the value that a DCIM Software solution will provide in their environment. He holds a bachelor’s degree in Computer Engineering from the University of Kabul.
Quantum is a proven global expert in data protection and big data management. They will be discussing considerations and strategies for (1) protecting virtual environments, (2) leveraging the cloud as part of your data protection infrastructure, and (3) ways to manage Petabytes of unstructured data in a cost effective way that maximizes the value of that data over its entire lifecycle.
Steve Kawasaki has worked in the professional audio-visual and broadcast equipment industries for over 20 years. He has extensive experience working with systems designers, integrators, and facilities operations teams in corporate campuses, universities and schools, entertainment and sports complexes, performing arts venues, transportation facilities, hospitals, legislative chambers, courthouses, radio and television stations and more. His wide-ranging experience in sales management, marketing, and product development gives him a unique perspective on the benefits and challenges of networked audio systems. Based in Seattle, Steve is the Northwest Regional Manager for Biamp systems. He oversees sales operations for Biamp Systems in the northwest US, and Western Canada.
Now you can future-proof your projects and your business. Audio Video Bridging (AVB) is the first open standard for transporting audio and video via Ethernet. AVB bridges the gap between AV and IT technologies.
The new IEEE AVB standard synchronizes multiple streams of audio and video, eliminates buffering delays and creates resource reservation. And because AVB leverages existing Ethernet technology, they will benefit from ever increasing speeds and enhancements backed by major consumer electronics companies, allowing the AV industry to benefit from solutions aimed at the mass market.
For IT Managers, AVB means end-to-end digital networks that are simple to design and easy to manage.
AVB advantages include:
IEEE standards
Significantly lower latencies
Larger channel capacity
Intelligent switches
Ethernet-based
Single network for all media, including non-AVB traffic
Join your IT peers for a complimentary luncheon including assorted sndwiches, salads, and dessert. This is a perfect opportunity to interact with other technology professionals in a relaxed environment.
One analyst ominously described…“SharePoint is like a virus growing inside the organization.” SharePoint’s rapid adoption is undeniable but it raises one important question: What security capabilities did Microsoft implement to ensure that SharePoint–and the data it houses–remains secure? SharePoint’s functionality was built for business users to share information. However, business users don’t typically recognize critical security considerations. This leaves security teams with the task of layering security onto SharePoint well after deployments, or worse, after a data breach. This session will:
·Highlight SharePoint use cases and potential security issues
·Offer best practices for SharePoint security planning and management
·Provide key mitigation steps that enterprises implement to minimize the odds of a data breach
As an Account Executive at FileWave, Stephen Mirante has been able to effectively articulate complex ideas in a simplified way for all to understand. Stephen has had success working with businesses where technology is really making an impact. “Most IT departments are reducing staff, while increasing their technology demands. That’s where FileWave shines. We help IT departments manage all their technology and the learning curve is very short.”
Unlike traditional methods, FileWave manages deployments without any end-user interruptions (causing downtime). Our software has been developed as a platform agnostic (Windows, Mac OS X, Linux) management tool, to fully support your existing infrastructure. FileWave manages deployments at the file-level and features true Self-Healing, Rollback, End-User Kiosk, and a fully featured Hardware & Software Inventory with Device Discovery.
FileWave’s Mobile Device Management (MDM) integration allows you to enroll and manage your iOS devices within the same interface you use to manage your Windows and Mac Clients. FileWave fully supports Apple’s Institutional, Layered, or Self Managed deployment model.
For lightning-fast imaging using Thunderbolt™ technology, download FileWave’s Lightning – FREE from www.filewave.com. Lightning allows you to create clean, never-booted images based on 10.7 and 10.8 installer media.
Unlike traditional methods, FileWave manages deployments without any end-user interruptions (causing downtime). Our software has been developed as a platform agnostic (Windows, Mac OS X, Linux) management tool, to fully support your existing infrastructure. FileWave manages deployments at the file-level and features true Self-Healing, Rollback, End-User Kiosk, and a fully featured Hardware & Software Inventory with Device Discovery.
FileWave’s Mobile Device Management (MDM) integration allows you to enroll and manage your iOS devices within the same interface you use to manage your Windows and Mac Clients. FileWave fully supports Apple’s Institutional, Layered, or Self Managed deployment model.
For lightning-fast imaging using Thunderbolt™ technology, download FileWave’s Lightning – FREE from www.filewave.com. Lightning allows you to create clean, never-booted images based on 10.7 and 10.8 installer media.
Matt Hur is Senior Director of Product Management for Centrify Corporation. He has held senior product management and technical positions at Cisco, Microsoft, and other public and private companies where he was responsible for growth and innovation in network, software, and online services products and technologies. He holds multiple patents in the area of distributed security, and he has co-authored multiple security standards that have been widely adopted and deployed. He has been an invited speaker, panelist, and program committee member at multiple industry and professional conferences and events.
Major technology and business trends are driving increased heterogeneous and hybrid environments that span mobile endpoints, corporate datacenters, and infrastructure and services delivered through the cloud. With respect to security, how does an IT decision maker balance the needs to grow strategic initiatives and drive efficiencies while leveraging current investments? Securing systems and applications with a simple and cost effective approach for automating and enforcing security controls, establishing trust and secure communication between systems, and ensuring audit compliance is a major challenge. This session will discuss the advantages of controlling, securing and auditing systems while leveraging existing infrastructure.
Key areas addressed:
• The imperative for unified access management across heterogeneous on-premise and cloud computing environments
• Centralization of identities and controlling privileged access as critical to a successful security strategy
• The case for leveraging existing infrastructure investment and having an "leverage and expand" vs. "rip and replace or siloed" approach to addressing trends like mobility, BYOD, and cloud
Learn how to create a high performance/high availability SQL Server Database with Fusion-io and SIOS. This powerful combination delivers an automated high speed solution with transparent failover and zero data loss. Make the switch and enjoy
– Cost savings
– Higher database performance
– Smaller floor space requirements
– Lower cooling and power demands
– All without sacrificing availability.
The end result: faster performance at a fraction of the cost of a typical SAN with 100% data availability.
Troy is a Senior Sales Director at Aerohive Networks focused on Wireless LAN. In his position he works with End Users and Channel Partners to develop Wireless LAN Strategies and Solutions incorporating policy and security practices to support BYOD, Mobile Device Management and designs for High Density Networks.
Before Aerohive Networks, Troy managed Mobility Sales for North and South America for Hewlett Packard and Colubris Networks. Troy has spent several years living and working in South America, speaks fluent Spanish, and speaks Internationally on Wireless LAN and security. Troy has specialized in Wireless LAN since 1999 as a primary career focus and has authored several white papers on deployment strategies, maximizing the User Experience, and How to Deploy High Density Wireless Networks. He has a clear passion for wireless networking.
Enterprises are expanding their wireless network capabilities to improve productivity, bring branch offices online inexpensively and, most important, address the diversity and explosion of smart mobile devices. Whether these mobile devices are corporate issued or personally owned, almost every IT department is experiencing unprecedented effects of the mobile device adoption in the enterprise. In this session, you’ll learn about this explosion of smart mobile devices, the problems it poses for IT, and how you can prepare your network’s architecture for BYOD in terms of scalability, service survivability, integration, application security and control, and Simpli-Fi-cation; how to do more with less.
As a special thank you to all of our guests at The IT Summit, our sponsors have arranged for a prize drawing for you, our valued supporters. The prizes are different at every conference, but in the past have included items such as iPods, golf clubs, sporting event tickets, and eReaders.
Aerohive Networks simplifies enterprise networking by reducing the cost and complexity of distributed enterprise deployments with cloud-enabled Wi-Fi and routing solutions for medium and large headquarters, campuses, branch offices and teleworkers. Aerohive’s award-winning cooperative control architecture, public or private cloud platform, and easy-to-deploy routing and VPN solutions eliminate costly hardware appliances and single points of failure, drastically simplify network operations, and provide mission-critical reliability and the flexibility to start small and expand your deployment without limitations.
Schneider Electric is the global specialist in energy management. I work for the IT Business, which is responsible for critical power and cooling products, services and solutions for data centers, business networks and homes as well as secured power for industrial applications. The DCIM Software Consultant specializing in mission critical Monitoring and Management Software solutions for data centers. Some of our product brands that you may know of include APC, MGE, Gutor and Uniflair. Additionally, to provide integrated solutions for data centers, we deliver products and services from our other businesses; include Square D, TAC Continuum, Vista, PowerLogic and more
The love of sound is Biamp‘s reason for being, and has been since our founding 35 years ago. We’ve grown to be an acknowledged international leader in professional installed audio electronics. Our staff still shares a passion for sound that resonates through every product and every decision the company makes.
You can sense our dedication to sound when you call for support and Biamp’s own technicians answer — in-house. You touch it when you use our intuitive software to configure new systems. You can hear our passion for great sound grow louder with every breakthrough design Biamp launches.
Most people have never seen Biamp products, but they’ve probably heard them work wonders — in airports, arenas, courtrooms, Houses of Worship, theaters, universities, corporations, and conference centers. Around the world, around the clock, Biamp equipment is delivering, managing and enhancing the sound.
For the love of sound, we never stop experimenting, tinkering and making the impossible actually practical. Because ultimately, when the lights dim and the speakers come on, it’s not about the system. It’s all about the sound..
Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own — Microsoft Active Directory. From the data center and into the cloud, more than 4000 organizations, including over 40% of the Fortune 50, rely on Centrify’s identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements.
Since 1982, Dasher Technologies has helped public, private, and nonprofit organizations implement technology solutions that speed and simplify their operations. As one of the fastest growing system integrators in the country, Dasher has gained a reputation for effortless implementations with relentless follow-through and enduring support. The company’s strong technical expertise and vendor independence allow us to integrate best-of-breed software, hardware, and services into a custom solution that directly impacts the business. The Dasher team is committed to learning about each customer’s business and the unique challenges they face. Their dedication combined with the company’s long-term customers and partner relationships ensure a performance profile that greatly exceeds industry standards. Dasher was recently named the HP 2011 ESSN Portfolio Partner of the Year and is the #1 provider of HP High Performance Computing solutions and HP Open Source/ Linux solutions in the U.S.
OUR MISSION
e-Cycle is dedicated to empowering businesses and organizations to take a more responsible, secure and cost-effective approach to wireless recycling. Our clients take this responsibility very seriously and so do we.
OUR VALUE PROPOSITION
Being a leader goes beyond offering innovative green business solutions. The e-Cycle team is devoted to exceptional customer service, client protection, education, environmental responsibility, and community support through charitable contributions and philanthropy.
e-Cycle is the partner you need to help achieve your sustainability initiatives by turning old wireless technologies into new revenue, protecting your corporate reputation and expanding your role in safeguarding the environment.
EMC is a global leader in enabling businesses and service providers to transform their operations and deliver information technology as a service (ITaaS).
Extensis® is a leading developer of software and services for creative professionals and workgroups. Their solutions streamline workflows, securely manage digital assets and fonts, and control corporate typographic branding. Used by hundreds of Fortune 5000 companies, Extensis’ award-winning server, desktop, and web service products include: Portfolio Server® for digital asset management, Universal Type Server® for server-based font management, Suitcase Fusion™ for single-user font management, and the WebINK® web font rental service. Founded in 1993, Extensis is based in Portland, Oregon, and the United Kingdom. For additional information, visit www.extensis.com
Unlike traditional methods, FileWave manages deployments without any end-user interruptions (causing downtime). Our software has been developed as a platform agnostic (Windows, Mac OS X, Linux) management tool, to fully support your existing infrastructure. FileWave manages deployments at the file-level and features true Self-Healing, Rollback, End-User Kiosk, and a fully featured Hardware & Software Inventory with Device Discovery.
FileWave’s Mobile Device Management (MDM) integration allows you to enroll and manage your iOS devices within the same interface you use to manage your Windows and Mac Clients. FileWave fully supports Apple’s Institutional, Layered, or Self Managed deployment model.
For lightning-fast imaging using Thunderbolt™ technology, download FileWave’s Lightning – FREE from www.filewave.com. Lightning allows you to create clean, never-booted images based on 10.7 and 10.8 installer media.
Fusion-io delivers the world’s data faster. Our Fusion ioMemory platform accelerates databases, virtualization, cloud computing, big data, and the applications that drive our economy and our daily lives.
Integrating hardware and software to overcome the limitations of legacy architectures and specialized hardware, Fusion ioMemory accelerates businesses from the smallest e-tailers to the world’s largest data centers, social media leaders, and Fortune Global 500 businesses. Our persistent, high capacity ioMemory platform leverages flash memory to significantly increase datacenter efficiency, with enterprise grade performance, reliability, availability, and manageability.
Gigamon® provides intelligent Traffic Visibility solutions for enterprises, data centers and service providers around the globe. Our technology empowers infrastructure architects, managers and operators with unmatched visibility into the traffic traversing both physical and virtual networks without affecting the performance or stability of the production environment. Through patented technologies, the Gigamon GigaVUE® portfolio of high availability and high density products intelligently delivers the appropriate network traffic to security, monitoring or management systems.
More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.
We believe that everyone should be free to get the most from technology – without intrusion or other security worries. Our crack team of specialists gives you the freedom to live your digital life without worrying about your personal information and assets. For 15 years, our team of experts has worked on exposing, analyzing and neutralizing IT threats. Along the way, we have amassed a tremendous amount of experience and knowledge about malware and how to deal with it.
Kaspersky Lab is one of the fastest growing IT security companies worldwide. Today, it is firmly positioned as one of the world’s top four leading vendors of endpoint security software. Kaspersky Lab continues to further improve its market position, demonstrating significant growth in all regions. According to the company’s 2010 financial results, Kaspersky Lab’s global revenue grew by 38% compared to the previous year and exceeded US $500 million.
From its beginning, Level 3 Communications was founded on the principles of the Silicon Economicssm cycle: create a global telecommunications network with the scale to reduce unit costs, stimulate demand with these lower costs, support that demand by scaling even more. Level 3 created a network that serves as a foundation for the communications services of the 21st century by providing, among other things, information transmission over a fiber optic network and media delivery over a content delivery network. And we’ve grown to support the end-to-end communications services that businesses and carriers rely on.
Leviton is the smart choice, providing the most comprehensive range of solutions to meet the needs of today’s residential, commercial and industrial buildings. Leveraging more than a century of experience, Leviton helps customers create sustainable, intelligent environments through its electrical wiring devices, network and data center connectivity solutions, and lighting energy management systems. From switches and receptacles, to daylight harvesting controls, networking systems, and equipment for charging electric vehicles, Leviton solutions help customers achieve savings in energy, time and cost, all while enhancing safety.
Today’s IT networks are a complex mix of interdependent devices co-mingled with application databases, business applications and various sources of identity information. The ever-increasing volume of information generated by these data sources combined with increases in service level agreements and reductions in operational staff has resulted in one of the biggest challenges in information technology today — effective and proactive network management. Without network availability and performance, business will suffer. Automated tools are required to manage the volume of network issues and critical events that occur each day, ensuring maximum network and application availability for mission critical functions.
That’s where LogMatrix comes in. Our network management software solution is an extensible monitoring and event correlation framework that enables users to implement their IT operational practices and policies. The core component, NerveCenter, helps deliver end-to-end network management by providing visibility across networks, systems and applications, collecting and correlating data, identifying issues and determining root cause.
Have you ever wanted to talk to someone behind the technology you use? Now’s your chance. Microsoft User Research conducts end-user research on all Microsoft products. Complete a signup form to be contacted for user research studies that match your experience and interests. You’ll impact tomorrow’s technology, plus get your choice of a Microsoft gratuity item as a thank you for your time. Help Microsoft understand your needs, and help shape the future of technology.
Planview delivers tailor-made solutions for the technology industry to improve visibility, control spending, manage performance, drive innovation, and effectively react to change in the marketplace.
Logitech
Wind
Nintendo USA
Xyratex
T-Mobile
Whatever your strategic goals, innovation is required to get you there. We enable innovation.
Presidio architects purpose-built IT solutions and services that enable you to solve your most challenging problems and achieve extraordinary success. Working as an extension to your team with our unique client engagement framework minimizes risks associated with technology adoption and ensures the highest quality of service. Experience the Presidio difference.
We create value for customers through delivery of strategic technology staffing and consulting services. We help build and supplement organizations by providing introductions to candidates for key positions. We develop partnerships with customers, performing detailed analysis, to gain an in-depth understanding of their business and their hiring needs. These partnerships, combined with our technology, sourcing, and delivery capabilities enable us to exceed our customers’ expectations.
Prime Team Partners provides access to an established network of highly talented technology professionals. We facilitate introductions to relevant candidates, coordinate interviews and prepare successful applicants for the specific needs of each customer. We screen, qualify, and check references on applicants and will perform technical testing and criminal background checks, if necessary.
A company’s data is the lifeblood of their business. Customer data, financial and legal records and just day-to-day correspondence are examples of what make up all the vital information required to run a company successfully. That’s why data protection is so critical for anyone that is responsible for keeping it safe.
Riverbed delivers performance for the globally connected enterprise.
With Riverbed®, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery, without fear of compromising performance.
When organizations consolidate IT and move to cloud environments, the distance created between users and their data often results in high-latency and reduced bandwidth. Riverbed WAN optimization, network performance management, and cloud storage solutions enable enterprises to overcome these drawbacks. At Riverbed we make it easy to understand, optimize, and accelerate IT, so that organizations can build a fast, fluid, and dynamic IT architecture.
For more than a decade, SIOS solutions have been protecting thousands of mission-critical applications and countless volumes of data for customers of all sizes, across every industry, in all parts of the world.
Our innovative high availability and data protection software solutions for Linux and Windows deliver superior RTO and RPO at a lower cost of ownership, whether they are deployed on physical machines or in virtualized or cloud environments.
SIOS products (SteelEye Protection Suites and SteelEye DataKeeper) are easy to implement, easy to use, and easy to manage – eliminating the complexity and capital expenditures associated with traditional high availability and disaster recovery approaches. This makes them ideal for quickly extending protection to new and existing enterprise applications, systems and databases migrating from UNIX to Linux, managed SaaS applications, and projects that must satisfy stringent SLAs and regulatory requirements.
Every organization, from SME/SMB through to schools, government and enterprise, takes a different approach to securing their networks and empowering their people. Our technologies enable our customers to run their operations in their own way.
Over 90 years of manufacturing excellence
Tripp Lite is a leading manufacturer of products that power, connect and protect computers and other electronics. Founded in 1922, it is best known for its Uninterruptible Power Supply (UPS) Systems and Isobar® Surge Suppressors (with over 18 million sold).
TSS Redmond is more than a computer training company located close to Microsoft’s headquarters in Redmond, WA. TSS delivers worldwide, live, instructor-led classes in Microsoft technologies and in Microsoft Office; TSS is a licensed Vocational School that offers courses in business skills and project management. With its commitment to its vision and mission and belief in its core values, TSS remains dedicated to providing learning that is relevant and practical, that improves on-the-job performance as well as prepares for meaningful credentialing exams. That personalized dedication to the professional growth of its clients provides the impetus for becoming a globally respected training company.
WatchGuard builds affordable, all-in-one network and content security solutions to provide defense in depth for corporate content, networks and the businesses they power. WatchGuard’s award-winning Extensible Threat Management (XTM and XTMv) network security solutions combine firewall, VPN, and security services to protect networks from spam, viruses, malware, and intrusions. The new Extensible Content Security (XCS and XCSv) appliances offer content security across email and web combined with data loss prevention for complete content protection. Available as physical appliances and as virtual editions, WatchGuard extensible solutions scale to offer right-sized security for small businesses up to enterprises with 10,000+ employees. Since our founding in 1996, more than 600,000 WatchGuard signature red security appliances have been deployed worldwide. Today more than 15,000 dedicated partners back our products in 120 countries. WatchGuard is headquartered in Seattle, Washington, with offices in North America, Latin America, Europe, and Asia Pacific.