Check out the complete list of sessions in the session catalog.

Below is a sneak peek of what you will find at BrainShare 2014.

Novell Sessions

From GroupWise and Exchange Coexistence to Complete Migration-A How-to Session Mergers and acquisitions often require you to integrate GroupWise® deployments and Exchange systems. Migrating from Exchange to GroupWise can present savings opportunities and increase end-user value. However, it isn't always possible. This session will demonstrate various ways to allow GroupWise and Exchange to coexist and some best practices for migration. Included will be some important considerations, including the amount of data, the number of mailboxes and the version of Exchange in your environment-these will dictate which method is best for you.

Windows XP to 7 or 8 Migration Although extended support for Windows XP ended months ago, thousands of people still use it because they're comfortable with it. Are you or your users some of those people that still need to migrate away from Windows XP? This session walks you through how you can use the ZENworks® Suite to solve the various challenges that can come up when you're migrating from Windows XP to Windows 7 or Windows 8.

Using Vibe to Easily Solve Collaboration Challenges Collaboration challenges commonly make IT want to revamp an aging company Intranet or other portal. Many consider SharePoint, but fear the complexity and staffing requirements. If you face similar challenges and fears, come to this session and learn first-hand how a credit union's two-person IT department used Vibe to do this without the complexities of other solutions. With no previous knowledge, training, or outside help, the IT team completely revamped the credit union's Intranet portal by moving it to Vibe.

Novell ZENworks Application Virtualization Design, Deployment and Best Practices Virtualizing applications can simplify many aspects of the IT department's life, from deployment to management. Plus, it's great for users because they can have the applications they need quickly, without a significant amount of setup time. This session will show you the finer details of Novell ZENworks Application Virtualization in terms of its design, deployment and best practices so you can not only get your virtualized environment up and running, but you can maintain it in the best way possible.

Making Novell Filr Work for You and Your Users Before Filr, many users tried finding their own ways to access enterprise data wherever they were. The results bordered on disastrous. Users unwittingly compromised security, but still needed to access their data wherever and whenever. Novell Filr is a feature-rich product that makes users more productive without compromising security. This session demonstrates features of Filr, how users can make the most of the application's capabilities and the various options administrators have to control users' access within Filr.

GroupWise Mobility Service: Troubleshooting and Best Practices Extending email to mobile devices is crucial for the modern organization. This session lets you dive into the details of the GroupWise Mobility Service (previously Data Synchronizer Mobility Pack) and gain the practical knowledge you need to keep mobile users happy and connected. Join us to learn about architecture, troubleshooting, monitoring, log files and how to tune your system for optimal performance. Included will be how to use the dsapp mobility administration tool for troubleshooting.

Self-Encrypting Drives: Perks and Pitfalls Hard drive manufacturers have rallied around a common standard for self-encrypting drives known as OPAL. There are many new drives supporting this standard appearing on the market, but what benefits do they offer for protecting your data and are there any pitfalls to avoid? This session will focus on giving you the facts of what you can expect from self-encrypting drives, and discuss whether they're right for your environment.

Novell Storage Manager 4.0: Tips from the Field Novell Storage Manager automates the deployment and day-to-day management of file system storage across your entire network, whether you're using Windows, Novell Open Enterprise Server or a combination of both. As a standalone solution or an add-on for any identity management solution, Novell Storage Manager is a must-have utility for any medium or large enterprise or educational institution. This session will demonstrate what's new and how to install, configure and optimize Novell Storage Manager using real-life scenarios from field consultants.

Connecting Your Mac, iOS and Android Devices to GroupWise Ghost Pattern Software develops the best iOS and Android GroupWise apps, and will show you how to best connect mobile and OSX devices to GroupWise. Come learn about the company's latest solution: a native GroupWise Mac client, and how to support OSX users connecting to your GroupWise server. The apps Ghost Pattern Software develops are easy to use, provide specific GroupWise features you use, and require no IT setup. Come hear about the new features available in the latest releases of the apps.

Novell ZENworks Mobile Management Design, Deployment and Best Practices Many customers have loved both the user freedom and the IT security and productivity that all go along with using ZENworks Mobile Management to manage Android and iOS devices. However, there are always questions as to exactly how something works, so in this session, we'll focus on the minutiae of how to best deploy and administer ZENworks Mobile Management. Whether you want to improve your administration or easily deploy the application, you're sure to learn much in this session.

Novell iPrint Architecture The roots of Novell iPrint go back 25 years to some of the first network printing software available to customers. Since then, the architecture has grown and changed much, and now includes mobile printing capabilities in addition to the desktop printing that everyone is accustomed to. This session looks at the architecture underlying Novell iPrint and also talks about where the architecture is heading in the future with some discussions on identity, cloud, multi-tenancy, scalability and serverless solutions like iPrint Direct.

Extending Vibe to the Max - The Mechanisms and Some Tools That Use Them Gain insights on how to extend Novell Vibe through extensions such as remoteApps, jsps, and CWA's while maintaining a secure environment. The Novell Partner, Code and Concept will share how you can do utilize these extensions with Novell GroupWise, Messenger, and other applications such as Data Synchroniser, ShareOnVibe, and SMSforVibe. Attendees should have a basic understanding of Vibe's potential for extensions and be technical enough to understand the concepts discussed in this session.

Mobile Management BYOD: What You Need to Know Letting users take advantage of the recent huge advances in mobility can be terrifying for IT professionals. But ZENworks Mobile Management in conjunction with BYOD policies can let you give users the mobility they need to do their jobs while maintaining the security and efficiency IT needs. Come to this session and learn to use built-in features to manage BYOD devices without taking complete control of the device. Also, learn to identify and manage non-compliant devices.

Novell File Reporter 2.5: Who Has What? Novell File Reporter provides an in-depth view of your file system, allowing you to quickly and easily determine who has access to what. Whether running Novell Open Enterprise Server or Windows, you can see where you're at risk and manage storage growth with a two-click approach to viewing data usage trends. In this session, you will learn what's new and how to install, configure and optimize Novell File Reporter using real-life scenarios, as well as troubleshooting and report generation tips.

NetIQ Sessions

AppManager 101A look at the AppManager® portfolio, including the operating systems and applications monitored, as well as the other offerings such as Advanced Analytics, agentless vs. agent-based monitoring Analysis Center, and more.

When Tinfoil Hats Aren't Enough: Disrupting Cyber ThreatsEvery enterprise owns a grab-bag of security products these days, each of which promises to make you totally secure. But this collection of products quickly becomes a problem in and of itself: recent attacks against the likes of Target and Nieman-Marcus set off plenty of alarms, but they were lost in the noise and the victims failed to take appropriate action. How can you properly extract the signal from the noise and make sure you're responding to the right threats, the ones that might actually cause you damage?

This session will discuss leveraging various kinds of context to help you better detect, prioritize and disrupt the threats you see in your enterprise environment.

Customer Experience: PlateSpin Forge Disaster RecoveryTom Lockhart from Hastings & Prince Edward Counties Health Unit will talk about the disaster recovery-related challenges his organization faced, why his old solution was ineffective, and why he chose PlateSpin Forge®. He will go on to discuss the PlateSpin Forge customer experience: setting up the appliance, configuring it for replications, the ongoing management, and the all-important testing. And of course Tom will cover the most important part of disaster recovery: experiencing an unplanned outage and actually having to fail-over and fail-back.

Playing Well with Others: Monitoring GroupWise, SLES®, Sentinel®, and IDM with AppManagerThis session will explore how NetIQ AppManager can be used to monitor other NetIQ, SUSE and Novell products to improve performance and availability.

Managing Entropy, the Primary Cause of Operational and Security Risk: File Integrity & Change MonitoringChange, whether well intentioned or malicious, is at the root of many operational and security incidents. Proactive monitoring of change activity enables the security or operations analyst to recognize leading indicators of an issue or breach, detect a breach in progress, and speed root cause analysis to address defense against future incidents.

This session will review how the policy based monitoring of NetIQ Change Guardian can give Security and Operational analysts the focused insights you need.

Mass Migration and Datacenter Transformation SolutionsThis session starts by explaining what typical data center transformation projects look like, and discusses the common challenges of migrating large numbers of server workloads. We will then dig deep into the specific project planning required for such large-scale transformations, and show how NetIQ's PlateSpin® product portfolio helps both Service Provide and Enterprise customers more efficiently plan and execute large data center transformation.

Best Practices for Security Monitoring in Highly Distributed EnvironmentsCurrent enterprise environments are often large and highly distributed. In many cases, enterprise environments are global with stakeholders and data centers across multiple continents and jurisdictions. Planning your security monitoring deployment to deal with political, organizational, and network connectivity concerns can be more of a challenge than simply the size of the enterprise.

This session will review how NetIQ Sentinel can be deployed to address these challenges with highlights from existing deployments. One is a manufacturing organization with global operations. The other is a retail organization with over 8,000 remote sites and growing.

Intro to Workload Migration and Server ConsolidationIn this session we start by briefly touching on the basic server consolidation, data center migration, and transformation needs, to set the stage. We then dive into the specific solutions that NetIQ has to offer, followed by a "What's new in 2014" for PlateSpin Migrate 11.1 and PlateSpin Recon 4.1. We then focus on the most interesting new features in PlateSpin Migrate 11.1, which are the Microsoft Hyper-V 2012 integration, and the latest enhancements for mass migrations. We finish the session with a high-level road map overview of PlateSpin Recon and PlateSpin Migrate, including the planned "to the cloud" migrations.

Integration / Visualization of the Information in your IT EnvironmentWe will look at how NetIQ Operation Center can take a variety of data sources and bring the data together. You can then display the information on a web-based dashboard that is unique to your environment, and share with multiple users, including your partners and customers.

All the Things You Wanted to Know How to Do With NetIQ Sentinel but Were Afraid to AskLearn from NetIQ Sentinel product experts how to customize reports, add customer collectors, write the perfect correlation rule and much more. This session will walk through how to get the most out of your Sentinel investment.

Introducing the new PlateSpin Forge 700 Disaster Recovery ApplianceWhether you're a small-to-mid-sized organization or a large enterprise, tolerance for downtime is at an all-time low. That's why NetIQ introduced the new PlateSpin Forge 700 Series appliances. Launched in 2008, PlateSpin Forge is the world's first disaster recovery appliance, capable of protecting both physical and virtual server workloads using embedded virtualization technology.

Building on years of innovation and experience, the newest appliances add powerful new specifications and support for server workloads on the latest operating systems, physical servers, virtualization platforms.

Learn how PlateSPin Forge all-in-one disaster recovery appliances can help you lower recovery point objectives and accelerate recovery times, with mirroring-like performance at a tape-backup price point.

What's New with NetIQ AppManager (and What's Coming Next)?In this session we will show AppManager customers some of the latest features that have been released, as well as a peak at the roadmap to see what's coming up on the horizon.

AppManager in the Real World: A Real-Life Customer ImplementationThis session will walk through examples of how several real customers use NetIQ AppManager to monitor their entire enterprises, including systems, applications, and even devices that don't have out-of-the-box modules built for them.

Enterprise Security When Lives as Well as Wallets are at Stake: Beyond Compliance in an IoT WorldCloud, BYOD, Social and IoT are rapidly changing IT delivery models, the threat environment, and the way we interact with information and systems. Two areas where these changes are intensely felt is in healthcare and critical infrastructure. In both areas, poor security can not only have a financial impact on organizations and individuals, but can also lead to severe injury or loss of life. In this session we will explore the impacts of these larger trends, what government agencies are doing to address the risks, and what you can and should do to better safeguard your environment.

We Just Can't Be Sure Who to Trust Anymore: A CERT Lifecycle Approach to Addressing Insider Threat RiskAlmost daily there are new examples of highly public data breaches. While this includes attacks from both insider and external attackers, an insider is always active in the attack or inadvertently the cause of the foundational vulnerabilities. With the definition of an insider growing to include contractors, partners, customers and even competitors, how do you define a program to address the insider threat risk?

Gaining Security Insight in a Big Data WorldDelivering next generation security monitoring by combining the strengths of SIEM today with the promise of Big Data analytics.

NetIQ Security Monitoring Vision and DirectionReducing the cost and complexity of insider and external attack detection though insight.

Addressing Risk in an IoT world with NetIQ and Cisco Identity Powered Security The complexity of network environments has driven the need for increased granularity in security visibility, network analysis, and compliance assessment. With the advent of IoT, BYOD policies, and SaaS, it is no longer sufficient to analyze network activity solely with a broad identifier like an IP address. Today's diverse networks require effective security event visibility and integration with accurate contextual data such as user identity, user privilege levels, endpoint device type, and endpoint security posture to provide a meaningful picture of network events and their significance.

The Cisco® Identity Services Engine (ISE) integrates with the NetIQ Sentinel security event management platform to deliver in-depth security event analysis supplemented with relevant identity and device context. This integration provides network and security analysts the context they need to quickly assess the significance of security events by being able to answer questions like "who is this event associated with and what level of access do they have on the network" and "what type of device is it coming from."

Providing ISE user and device context to the NetIQ Sentinel platform enables a new range of security monitoring capabilities enabling IT organizations to increase the speed of security threat detection and simplifies threat response.

Disaster Recovery and Workload Migration for Novell OESThis session explores how you can protect, migrate, and manage your Novell Open Enterprise Server workloads with NetIQ solutions. You'll learn how you can virtualize OES workloads, and move or copy them between physical servers and virtual hosts with PlateSpin Migrate. We'll show you how to to improve your disaster recovery capabilities, with lower RTO, RPO, and costs, using PlateSpin Protect and PlateSpin Forge. And you'll see how to use PlateSpin Recon to collect and analyze the data you need to plan the most efficient use of your data center resources.

Attachmate Sessions

Using a Modern Directory to Manage and Secure Legacy Host Access Most modern networks use LDAP groups to control access to enterprise applications, but legacy host “green screen” applications aren’t usually part of that network. This session shows you how to put a layer in front of the host so only authorized people can access the data in your legacy systems. Best of all, you don’t have to make changes to the host itself—rather, you use the existing enterprise directory to do what it’s already doing in the rest of your network.

Optimizing the User Experience when Accessing Legacy Host Applications from Any Mobile Device A number of technologies enable users to access legacy host applications from mobile devices, but the user experience is far from optimal. Entering data into host application fields is cumbersome, leading to input errors and frustrated users. This session will show you how to use Reflection 2014 TouchUx, which gives users a look and feel they’re comfortable with while they use legacy host applications. In addition, administrators can leverage Microsoft and Citrix central management features to manage Reflection from a single location.

Enabling Your Host Applications to Live in the Modern World of Security and Regulation Today’s computing environment is an alphabet soup of regulatory mandates, mostly related to security. Whether you’re talking about data at a lower layer in the stack or on a display in a host application, protecting that sensitive information from prying eyes has become a high priority. This session will cover the basics of leveraging the data protection capabilities in Reflection 2014 so you can ensure your enterprise’s mission-critical host data is not compromised.

Everything Old is New Again: X Windows and Modern Network Architectures The X Windows system may predate Free BSD and Microsoft Windows 1.0, but X Windows continues to thrive. The core X11 protocol is mature, but the methods for delivering, managing and securing X sessions have changed radically. This session explores the advantages of three-tier X Windows architectures, including collaboration and sharing of X sessions; persistence of X sessions so users can leave a running session and rejoin it from a different device; fault tolerance; high performance over high-latency networks; and centralized management and security.

Configuring and Using a Three-Tier X Windows Deployment Modern X Windows products enable administrators and users to enjoy the benefits of advanced three-tier architectures, including session persistence for disconnected users, collaboration and sharing, fault tolerance, high performance for remote users, and centralized management and security. This session will cover the basics of deploying, configuring and using a three-tier X Windows architecture. The session builds on the concepts introduced in the 100-level session, Everything Old is New Again: X Windows and Modern Network Architectures.

Pre-BrainShare Advanced Technical Training Sessions

Introduction to ZENworks Configuration Management 11 SP3 ZENUsbcreator Utility ZENworks® Configuration Management 11 SP3 makes it easy to add imaging to a thumb drive with its new utility, ZENUsbcreator. This utility offers a supported method for booting the ZENworks Configuration Management imaging distro from a USB thumb drive. In this session, you will learn more about ZENUsbcreator and how to build your own bootable thumb drive for imaging operations. We will also discuss what Novell® Training Services classes you can take to learn more about the ZENworks Configuration Management imaging distro.

Creating Targeted Hardware Rules for ZENworks Configuration Management PXE-Based Imaging Are you reluctant to use PXE-based ZENworks Configuration Management imaging for fear of making a mistake? If so, then this course is for you. In this session, you will learn about the purpose of Hardware Rules, how you can use them to trigger imaging operations, and what types of PXE-enabled devices you can image. You will gain hands-on experience configuring filters, building complex Hardware Rules, and triggering image operations on PXE-enabled devices.

Deploy the ZENworks Adaptive Agent using Network Discovery This session will introduce you to a deploying the ZENworks Adaptive agent using a network discover task. Using an IP discovery configuration is the best way to discover devices that are not part of an Active Directory domain and are not imported into an eDirectory tree.

Streaming Virtualized Applications using ZENworks Application Virtualization This session will introduce you to streaming virtualized applications using ZENworks Application Virtualization. You will create a custom streaming application, optimize the application and manage container permissions.

Introduction to PlateSpin Recon: Gathering Workload Inventory Information Keeping track of your data center environment is no simple task. This session will introduce you to PlateSpin® Recon, a virtualization planning tool that can gather workload inventory information, such as allocated resources and installed software. During this session you will learn how PlateSpin Recon gathers workload information without an agent as well as what types of information it can collect and how you can view gathered data.

Introduction to PlateSpin Recon: Gathering Workload Resource Utilization Information This is the second session in the Introduction to PlateSpin Recon series. In this session you will continue to familiarize yourself with PlateSpin Recon, learning how it can gather workload resource utilization information, such as CPU, memory, disk and network utilization. This session will also continue to discuss how PlateSpin Recon gathers information without an agent, what information it collects and how you can view the gathered data.

PlateSpin Migrate: Migrating Workloads while They Run in Production This session will introduce you to PlateSpin Migrate and how it can migrate Windows or Linux workloads to new virtual or physical targets while they are running in production. This is one of the most useful tools you can find for everyday use in your data center and provides you with the flexibility to reallocate hardware and virtual resources during the day.

Introduction to PlateSpin Protect: How to Protect Workloads in a New and Better Way This session will introduce you to PlateSpin Protect and how it can protect workloads incrementally while they are running in production eliminating those troublesome tapes and limited backup windows. They can be protected locally for quick recovery in case of failures or off-site for disaster recovery.

Novell iPrint Mobile Appliance 1.1 - Remote Rendering Explained Some of the biggest changes introduced in the latest version of the iPrint appliance deal with the remote rendering feature. Not only has the configuration changed, but now each render can use more than one driver. In this session we will discuss how to configure the remote loader as well as the use of multiple drivers. You will also gain hands-on experience configuring the remote loader for the iPrint mobile appliance.

Novell Filr 1.1 - Do I Really Need to Import All or Any of My Groups? The Filr documentation talks of importing groups from one or more LDAP directories. However, in many directories, there can be hundreds of groups and it may seem impossible to know how many or which ones to import. Luckily, this course has the answers. In this session we will discuss Filr groups in depth, focusing on what to import and why. You will also gain hands-on experience creating dynamic groups within the Filr administration interface.

Open Enterprise Server 11.2 DSfW Top Troubleshooting Tools and Tips DSfW is an important and useful services within OES 11. Just like any service however, it may need some troubleshooting now and then. In this 2-hour session, we will explore some of the tools for troubleshooting DSfW, along with tips. You will also receive hands-on instruction to become familiar with the tools on your own.

Upgrade to Novell GroupWise 2014 This session will cover the steps needed to upgrade an existing GroupWise® 8 or GroupWise 2012 system to GroupWise 2014. During this session, students will learn about the purpose and function of the GroupWise 2014 admin service and install console-including console security, the upgrade process, the new administration utility and the admin console.

Novell GroupWise 2014 and the Directory This session covers the new approach in GroupWise 2014 to directory integration. During this session, you will learn about a variety of GroupWise directory features and configurations from directory independence, to directory links (eDirectory, Active Directory or both), and about managing synchronization between GroupWise and the directory. This session also teaches you how to install and use GroupWise 2014 management console plug-ins.

Introduction to ZENworks Reporting 5 Administration ZENworks Reporting 5 is the new add-on reporting tool for the ZENworks product line, supporting reports for all ZENworks features. It replaces the ZENworks Reporting Server utility. This session will introduce you to the installation and administration of ZENworks Reporting 5. We will discuss reasons for adding ZENworks Reporting 5 to your environment; planning, installation and patching considerations; and managing users, roles and permissions. We will also discuss moving from ZENworks Reporting Server to ZENworks Reporting 5.

Introduction to Building Reports with ZENworks Reporting 5 ZENworks Reporting 5 is the new add-on reporting tool for the ZENworks product line, supporting reports for all ZENworks features. It replaces the ZENworks Reporting Server utility. This session will introduce you to building and managing reports in ZENworks Reporting 5. You will learn to navigate ZENworks Reporting 5 and how to manage reports. You will also learn to create Ad Hoc Views and Topics, design reports and dashboards, and convert reports from ZENworks Reporting Server.

Discovery Methods in ZENworks Asset Management and ZENworks Configuration Management ZENworks features several powerful discovery technologies to assist with the management of your device configurations and hardware / software assets. Utilizing the tools efficiently can not only help you manage your assets more effectively, but also save money.

Basics of Software Reconciliation in ZENworks Asset Management From audit prevention to improving software purchasing processes to maximize cost efficiency, reconciling software purchasing data to software inventory is an important tool in ZENworks Asset Management and the ZENworks Suite.

Using NetIQ's Implementation of NetFlow to Solve Customer's Problems NetFlow and other protocols like IPFIX, JFlow and sFlow are low-level network traffic auditing protocols that record information about individual network conversations. This session will demonstrate installation, configuration and use of NetIQ® Netflow to find events, how to present data in easily understandable "before-and-after" terms and how it summarizes and publishes information to NetIQ Sentinel™. The session targets admins who want to successfully install and deploy Netflow or are new to Sentinel 7.2 and want to understand features included in the new release.

The Granular Delegation of NetIQ Directory and Resource Administrator This session will show how you can gain granular security controls by restricting users' visibility of specific controls, information and directory objects, thus increasing security. Admins wanting to learn single-tool Active Directory management or how to use native tools to simplify complex processes are welcome to attend. Attendees will learn to processes such as finding objects, creating groups, managing accounts, working with account templates and managing mailboxes and contacts. All these capabilities make NetIQ Directory and Resource AdministratorT vital to any AD shop.

NetIQ Identity Manager: Entitlements Creation, Implementation and Onboarding Entitlements provide greater visibility into authorizations NetIQ Identity Manager grants users. This session includes a lecture and a hands-on portion to clarify using entitlements in your Identity Manager infrastructure. You will create an entitlement, including defining policies to carry out the requisite processes, then use it with: Entitlements Service Driver, User Application Provisioning Workflow, and RBPM Resource Model. Identity Manager admins are our focus, particularly those wanting to learn to implement an entitlement framework in their environment or understand their current entitlement implementation.

NetIQ Identity Manager: Introduction to Access Review This session introduces the new NetIQ Identity Manager Access Review Application. Permissions and authorizations are being granted daily in your Identity Manager environment without any accountability, approval process or review, but Access Review gives you more visibility on current permissions and authorizations. Managers, administrators, and auditors can verify each authorization and permission. This session will show you how to install and implement Access Review, how to collect accounts and entitlements and how to perform an Access Review. If you're an Identity Manager admin wanting to learn more about Access Review and to get hands-on experience with it, this session is perfect for you.

Spots are filling up quick. Get Scheduled!

Schedule Now

 

© 2014 Attachmate Group Inc.

Share: 

Scroll to Top