Check out the complete list of sessions in the session catalog.
Below is a sneak peek of what you will find at BrainShare 2014.
From GroupWise and Exchange Coexistence to Complete Migration-A How-to Session Mergers and acquisitions often require you to integrate GroupWise® deployments and Exchange systems. Migrating from Exchange to GroupWise can present savings opportunities and increase end-user value. However, it isn't always possible. This session will demonstrate various ways to allow GroupWise and Exchange to coexist and some best practices for migration. Included will be some important considerations, including the amount of data, the number of mailboxes and the version of Exchange in your environment-these will dictate which method is best for you.
Windows XP to 7 or 8 Migration Although extended support for Windows XP ended months ago, thousands of people still use it because they're comfortable with it. Are you or your users some of those people that still need to migrate away from Windows XP? This session walks you through how you can use the ZENworks® Suite to solve the various challenges that can come up when you're migrating from Windows XP to Windows 7 or Windows 8.
Using Vibe to Easily Solve Collaboration Challenges Collaboration challenges commonly make IT want to revamp an aging company Intranet or other portal. Many consider SharePoint, but fear the complexity and staffing requirements. If you face similar challenges and fears, come to this session and learn first-hand how a credit union's two-person IT department used Vibe to do this without the complexities of other solutions. With no previous knowledge, training, or outside help, the IT team completely revamped the credit union's Intranet portal by moving it to Vibe.
Novell ZENworks Application Virtualization Design, Deployment and Best Practices Virtualizing applications can simplify many aspects of the IT department's life, from deployment to management. Plus, it's great for users because they can have the applications they need quickly, without a significant amount of setup time. This session will show you the finer details of Novell ZENworks Application Virtualization in terms of its design, deployment and best practices so you can not only get your virtualized environment up and running, but you can maintain it in the best way possible.
Making Novell Filr Work for You and Your Users Before Filr, many users tried finding their own ways to access enterprise data wherever they were. The results bordered on disastrous. Users unwittingly compromised security, but still needed to access their data wherever and whenever. Novell Filr is a feature-rich product that makes users more productive without compromising security. This session demonstrates features of Filr, how users can make the most of the application's capabilities and the various options administrators have to control users' access within Filr.
GroupWise Mobility Service: Troubleshooting and Best Practices Extending email to mobile devices is crucial for the modern organization. This session lets you dive into the details of the GroupWise Mobility Service (previously Data Synchronizer Mobility Pack) and gain the practical knowledge you need to keep mobile users happy and connected. Join us to learn about architecture, troubleshooting, monitoring, log files and how to tune your system for optimal performance. Included will be how to use the dsapp mobility administration tool for troubleshooting.
Self-Encrypting Drives: Perks and Pitfalls Hard drive manufacturers have rallied around a common standard for self-encrypting drives known as OPAL. There are many new drives supporting this standard appearing on the market, but what benefits do they offer for protecting your data and are there any pitfalls to avoid? This session will focus on giving you the facts of what you can expect from self-encrypting drives, and discuss whether they're right for your environment.
Novell Storage Manager 4.0: Tips from the Field Novell Storage Manager automates the deployment and day-to-day management of file system storage across your entire network, whether you're using Windows, Novell Open Enterprise Server or a combination of both. As a standalone solution or an add-on for any identity management solution, Novell Storage Manager is a must-have utility for any medium or large enterprise or educational institution. This session will demonstrate what's new and how to install, configure and optimize Novell Storage Manager using real-life scenarios from field consultants.
Connecting Your Mac, iOS and Android Devices to GroupWise Ghost Pattern Software develops the best iOS and Android GroupWise apps, and will show you how to best connect mobile and OSX devices to GroupWise. Come learn about the company's latest solution: a native GroupWise Mac client, and how to support OSX users connecting to your GroupWise server. The apps Ghost Pattern Software develops are easy to use, provide specific GroupWise features you use, and require no IT setup. Come hear about the new features available in the latest releases of the apps.
Novell ZENworks Mobile Management Design, Deployment and Best Practices Many customers have loved both the user freedom and the IT security and productivity that all go along with using ZENworks Mobile Management to manage Android and iOS devices. However, there are always questions as to exactly how something works, so in this session, we'll focus on the minutiae of how to best deploy and administer ZENworks Mobile Management. Whether you want to improve your administration or easily deploy the application, you're sure to learn much in this session.
Novell iPrint Architecture The roots of Novell iPrint go back 25 years to some of the first network printing software available to customers. Since then, the architecture has grown and changed much, and now includes mobile printing capabilities in addition to the desktop printing that everyone is accustomed to. This session looks at the architecture underlying Novell iPrint and also talks about where the architecture is heading in the future with some discussions on identity, cloud, multi-tenancy, scalability and serverless solutions like iPrint Direct.
Extending Vibe to the Max - The Mechanisms and Some Tools That Use Them Gain insights on how to extend Novell Vibe through extensions such as remoteApps, jsps, and CWA's while maintaining a secure environment. The Novell Partner, Code and Concept will share how you can do utilize these extensions with Novell GroupWise, Messenger, and other applications such as Data Synchroniser, ShareOnVibe, and SMSforVibe. Attendees should have a basic understanding of Vibe's potential for extensions and be technical enough to understand the concepts discussed in this session.
Mobile Management BYOD: What You Need to Know Letting users take advantage of the recent huge advances in mobility can be terrifying for IT professionals. But ZENworks Mobile Management in conjunction with BYOD policies can let you give users the mobility they need to do their jobs while maintaining the security and efficiency IT needs. Come to this session and learn to use built-in features to manage BYOD devices without taking complete control of the device. Also, learn to identify and manage non-compliant devices.
Novell File Reporter 2.5: Who Has What? Novell File Reporter provides an in-depth view of your file system, allowing you to quickly and easily determine who has access to what. Whether running Novell Open Enterprise Server or Windows, you can see where you're at risk and manage storage growth with a two-click approach to viewing data usage trends. In this session, you will learn what's new and how to install, configure and optimize Novell File Reporter using real-life scenarios, as well as troubleshooting and report generation tips.
Vodacom: An Identity-Powered BusinessVodacom is Africa's leading mobile and communications company providing a wide range of services, including mobile voice, messaging, data and converged services to over 57.5 Million customers, and is part of the Vodafone Group, with revenues in excess of $65 Billion.
Vodacom is investing to be the Best, with strategies to develop new services, make the business more efficient, and deliver the best possible customer experience. Understanding the customer, being responsive and easy to do business with, whilst securing their identity information and putting in place the necessary access controls and governance, is fundamental to Vodacom's business success. Learn how Vodacom is leveraging NetIQ technology to secure 57.5 million client SIM card data, improve efficiencies with the automation of provisioning and de-provisioning system access and regulatory compliance.
Data Governance and the Requirement for Access Review
Open any newspaper or news website, and the chances are that you will find a report on someone’s right to personal privacy being infringed, or yet another intrusion through an organization’s security systems with credit card or other financial information being stolen. The requirement for a Data Protection law to safeguard the rights of Individuals and juristic personas is undeniable. Clearly understanding access is the key to Governance. You must implement controls ensuring that the access is correctly assigned and monitored. Access and Identity Governance can help you determine the level of access your employees, partners, and suppliers should have to data resources; the access those users currently do have; and how to logically and efficiently align those two states.
The New Problem organizations face are:
Privileged Identity Management - Who's Watching the Experts?Who are your privileged users - admin, root, AD admins, application owners, etc. What tools are available to help you monitor privileged users and comply with risk and audit standards? - added from another session: Do you want to control who gets administrative access to your critical systems, but don't know where to start ? Are you worried that you would fail your audit as you can't prove who did what and when in your database servers ? This session would help you in defining your privileged account management strategy. The session introduce various approaches you should consider while rolling out a privileged account management project and defines the bare minimum things you should do for a successful rollout.
The Future of Provisioning Google Apps with IDMNetIQ is pleased to release a new version of the Google Apps Driver for Identity Manager. This is a complete rebuild of the driver, with a design focus on supporting the next generation of Google APIs in the Admin SDK and Directory API set. As part of this re-architecture, the driver will authenticate using OAuth2, the authorization standard being consumed by all Google’s APIs. This will enable the driver to have broader access to Google Admin and Directory services, including the Groups Settings API.
This session will provide an overview of the kinds of data it can synchronize with IDM as well as providing an example of the user experience in terms of synchronizing and managing identities in Google domains using IDM. The session will then provide a deeper technical exploration of the driver and policies and how they interact with Google services.
An Identity and Access Management Journey with EskomThe journey of an enterprise Identity and Access Management (IAM) implementation starts with the business requirements and ends with the value experienced by the business. Technology should not play central stage because IT alone will not bring about the necessary change that will realize the value to business.
Eskom chose NetIQ as its technology partner to implement IAM. What did we have to do in order to make the project a success? What was our approach to address the People and Process aspects of IAM? This presentation will leave attendees more informed about the challenges to address when implementing enterprise IAM.
Delivering Identity-as-a-Service offeringsNetIQ provides an Identity Access Management as a Service (IDaaS) platform that allows service providers to deliver multi-tenant identity-driven service offerings that leverage NetIQ’s market leading identity and security products. NetIQ’s IDaaS platform provides multi-tenant management, per-tenant usage-based licensing, and audit reporting. NetIQ provides multiple identity-driven service offerings on top of the IDaaS platform including Identity Access Management and Identity Account Management. This session details how service providers will deliver identity-driven service offerings using the NetIQ IDaaS platform and will describe in detail the capabilities of the Identity Access Management and Identity Account Management offerings.
Extending Access Management to BYOD UsersMobileAccess isn't just for cloud applications. If you currently have web based applications managed by Access Manager you can extend the ones you want to your mobile devices with minimal effort. Bob Bentley and Matthew Ehle show how Attachmate Group leveraged their existing infrastructure to deliver secured applications to their mobile users. They will discuss the advantages of their approach as well as how they see their mobile solutions expanding in the future.
Few organizations run their business completely on cloud-based applications because frequently there are set of core business that aren't going anywhere. Come see how to deliver seamless application access to your mobile users.
Risk-based or Adaptive Authentication - What is it and how can I get it?The most recent regulatory mandates are leading many organizations to strengthen their authentication capabilities which typically results the use of multi-factor techniques. In this session, learn how NetIQ's Access Manager can be used to strengthen access to private information through strong authentication methods while maintaining the right level of convenience to the users.
Think you can't get rid of passwords; think againAlthough passwords are designed to protect against unauthorized access, the reality is that they have been behind every major breach this year. Why not eliminate them? This session demonstrates that passwords are not as difficult to eliminate as you think.
When Tinfoil Hats Aren't Enough: Disrupting Cyber ThreatsEvery enterprise owns a grab-bag of security products these days, each of which promises to make you totally secure. But this collection of products quickly becomes a problem in and of itself: recent attacks against the likes of Target and Nieman-Marcus set off plenty of alarms, but they were lost in the noise and the victims failed to take appropriate action. How can you properly extract the signal from the noise and make sure you're responding to the right threats, the ones that might actually cause you damage?
This session will discuss leveraging various kinds of context to help you better detect, prioritize and disrupt the threats you see in your enterprise environment. As part of NetIQ's Identity-powered Security approach, we'll show you how identity and other kinds of context can make your threat response more accurate, efficient, and faster.
Managing Entropy, the Primary Cause of Operational and Security Risk: File Integrity & Change MonitoringChange, whether well intentioned or malicious, is at the root of many operational and security incidents. Proactive monitoring of change activity enables the security or operations analyst to recognize leading indicators of an issue or breach, detect a breach in progress, and speed root cause analysis to address defense against future incidents.
This session will review how the policy based monitoring of NetIQ Change Guardian can give Security and Operational analysts the focused insights you need.
Addressing Risk in an IoT World with NetIQ and Cisco Identity Powered SecurityThe complexity of network environments has driven the need for increased granularity in security visibility, network analysis, and compliance assessment. With the advent of IoT, BYOD policies, and SaaS, it is no longer sufficient to analyze network activity solely with a broad identifier like an IP address. Today’s diverse networks require effective security event visibility and integration with accurate contextual data such as user identity, user privilege levels, endpoint device type, and endpoint security posture to provide a meaningful picture of network events and their significance.
The Cisco® Identity Services Engine (ISE) integrates with the NetIQ Sentinel security event management platform to deliver in-depth security event analysis supplemented with relevant identity and device context. This integration provides network and security analysts the context they need to quickly assess the significance of security events by being able to answer questions like “who is this event associated with and what level of access do they have on the network” and “what type of device is it coming from.”
Providing ISE user and device context to the NetIQ Sentinel platform enables a new range of security monitoring capabilities enabling IT organizations to increase the speed of security threat detection and simplifies threat response.
Customer Experience: PlateSpin Forge Disaster RecoveryTom Lockhart from Hastings & Prince Edward Counties Health Unit will talk about the disaster recovery-related challenges his organization faced, why his old solution was ineffective, and why he chose PlateSpin Forge. He will go on to discuss the PlateSpin Forge customer experience: setting up the appliance, configuring it for replications, the ongoing management, and the all-important testing. And of course Tom will cover the most important part of disaster recovery: experiencing an unplanned outage and actually having to fail-over and fail-back.
AppManager in the Real World: A Real-Life Customer ImplementationThis session will walk through examples of how several real customers use NetIQ AppManager to monitor their entire enterprises, including systems, applications, and even devices that don't have out-of-the-box modules built for them.
Introducing the new PlateSpin Forge 700 Disaster Recovery ApplianceWhether you're a small-to-mid-sized organization or a large enterprise, tolerance for downtime is at an all-time low. That's why NetIQ introduced the new PlateSpin Forge 700 Series appliances. Launched in 2008, PlateSpin Forge is the world's first disaster recovery appliance, capable of protecting both physical and virtual server workloads using embedded virtualization technology.
Building on years of innovation and experience, the newest appliances add powerful new specifications and support for server workloads on the latest operating systems, physical servers, virtualization platforms. Learn how PlateSpin Forge all-in-one disaster recovery appliances can help you lower recovery point objectives and accelerate recovery times, with mirroring-like performance at a tape-backup price point.
Using a Modern Directory to Manage and Secure Legacy Host Access Most modern networks use LDAP groups to control access to enterprise applications, but legacy host “green screen” applications aren’t usually part of that network. This session shows you how to put a layer in front of the host so only authorized people can access the data in your legacy systems. Best of all, you don’t have to make changes to the host itself—rather, you use the existing enterprise directory to do what it’s already doing in the rest of your network.
Optimizing the User Experience when Accessing Legacy Host Applications from Any Mobile Device A number of technologies enable users to access legacy host applications from mobile devices, but the user experience is far from optimal. Entering data into host application fields is cumbersome, leading to input errors and frustrated users. This session will show you how to use Reflection 2014 TouchUx, which gives users a look and feel they’re comfortable with while they use legacy host applications. In addition, administrators can leverage Microsoft and Citrix central management features to manage Reflection from a single location.
Enabling Your Host Applications to Live in the Modern World of Security and Regulation Today’s computing environment is an alphabet soup of regulatory mandates, mostly related to security. Whether you’re talking about data at a lower layer in the stack or on a display in a host application, protecting that sensitive information from prying eyes has become a high priority. This session will cover the basics of leveraging the data protection capabilities in Reflection 2014 so you can ensure your enterprise’s mission-critical host data is not compromised.
Everything Old is New Again: X Windows and Modern Network Architectures The X Windows system may predate Free BSD and Microsoft Windows 1.0, but X Windows continues to thrive. The core X11 protocol is mature, but the methods for delivering, managing and securing X sessions have changed radically. This session explores the advantages of three-tier X Windows architectures, including collaboration and sharing of X sessions; persistence of X sessions so users can leave a running session and rejoin it from a different device; fault tolerance; high performance over high-latency networks; and centralized management and security.
Configuring and Using a Three-Tier X Windows Deployment Modern X Windows products enable administrators and users to enjoy the benefits of advanced three-tier architectures, including session persistence for disconnected users, collaboration and sharing, fault tolerance, high performance for remote users, and centralized management and security. This session will cover the basics of deploying, configuring and using a three-tier X Windows architecture. The session builds on the concepts introduced in the 100-level session, Everything Old is New Again: X Windows and Modern Network Architectures.
Pre-BrainShare Advanced Technical Training Sessions
Introduction to ZENworks Configuration Management 11 SP3 ZENUsbcreator Utility ZENworks® Configuration Management 11 SP3 makes it easy to add imaging to a thumb drive with its new utility, ZENUsbcreator. This utility offers a supported method for booting the ZENworks Configuration Management imaging distro from a USB thumb drive. In this session, you will learn more about ZENUsbcreator and how to build your own bootable thumb drive for imaging operations. We will also discuss what Novell® Training Services classes you can take to learn more about the ZENworks Configuration Management imaging distro.
Creating Targeted Hardware Rules for ZENworks Configuration Management PXE-Based Imaging Are you reluctant to use PXE-based ZENworks Configuration Management imaging for fear of making a mistake? If so, then this course is for you. In this session, you will learn about the purpose of Hardware Rules, how you can use them to trigger imaging operations, and what types of PXE-enabled devices you can image. You will gain hands-on experience configuring filters, building complex Hardware Rules, and triggering image operations on PXE-enabled devices.
Deploy the ZENworks Adaptive Agent using Network Discovery This session will introduce you to a deploying the ZENworks Adaptive agent using a network discover task. Using an IP discovery configuration is the best way to discover devices that are not part of an Active Directory domain and are not imported into an eDirectory tree.
Streaming Virtualized Applications using ZENworks Application Virtualization This session will introduce you to streaming virtualized applications using ZENworks Application Virtualization. You will create a custom streaming application, optimize the application and manage container permissions.
Introduction to PlateSpin Recon: Gathering Workload Inventory Information Keeping track of your data center environment is no simple task. This session will introduce you to PlateSpin® Recon, a virtualization planning tool that can gather workload inventory information, such as allocated resources and installed software. During this session you will learn how PlateSpin Recon gathers workload information without an agent as well as what types of information it can collect and how you can view gathered data.
Introduction to PlateSpin Recon: Gathering Workload Resource Utilization Information This is the second session in the Introduction to PlateSpin Recon series. In this session you will continue to familiarize yourself with PlateSpin Recon, learning how it can gather workload resource utilization information, such as CPU, memory, disk and network utilization. This session will also continue to discuss how PlateSpin Recon gathers information without an agent, what information it collects and how you can view the gathered data.
PlateSpin Migrate: Migrating Workloads while They Run in Production This session will introduce you to PlateSpin Migrate and how it can migrate Windows or Linux workloads to new virtual or physical targets while they are running in production. This is one of the most useful tools you can find for everyday use in your data center and provides you with the flexibility to reallocate hardware and virtual resources during the day.
Introduction to PlateSpin Protect: How to Protect Workloads in a New and Better Way This session will introduce you to PlateSpin Protect and how it can protect workloads incrementally while they are running in production eliminating those troublesome tapes and limited backup windows. They can be protected locally for quick recovery in case of failures or off-site for disaster recovery.
Novell iPrint Mobile Appliance 1.1 - Remote Rendering Explained Some of the biggest changes introduced in the latest version of the iPrint appliance deal with the remote rendering feature. Not only has the configuration changed, but now each render can use more than one driver. In this session we will discuss how to configure the remote loader as well as the use of multiple drivers. You will also gain hands-on experience configuring the remote loader for the iPrint mobile appliance.
Novell Filr 1.1 - Do I Really Need to Import All or Any of My Groups? The Filr documentation talks of importing groups from one or more LDAP directories. However, in many directories, there can be hundreds of groups and it may seem impossible to know how many or which ones to import. Luckily, this course has the answers. In this session we will discuss Filr groups in depth, focusing on what to import and why. You will also gain hands-on experience creating dynamic groups within the Filr administration interface.
Open Enterprise Server 11.2 DSfW Top Troubleshooting Tools and Tips DSfW is an important and useful services within OES 11. Just like any service however, it may need some troubleshooting now and then. In this 2-hour session, we will explore some of the tools for troubleshooting DSfW, along with tips. You will also receive hands-on instruction to become familiar with the tools on your own.
Upgrade to Novell GroupWise 2014 This session will cover the steps needed to upgrade an existing GroupWise® 8 or GroupWise 2012 system to GroupWise 2014. During this session, students will learn about the purpose and function of the GroupWise 2014 admin service and install console-including console security, the upgrade process, the new administration utility and the admin console.
Novell GroupWise 2014 and the Directory This session covers the new approach in GroupWise 2014 to directory integration. During this session, you will learn about a variety of GroupWise directory features and configurations from directory independence, to directory links (eDirectory, Active Directory or both), and about managing synchronization between GroupWise and the directory. This session also teaches you how to install and use GroupWise 2014 management console plug-ins.
Introduction to ZENworks Reporting 5 Administration ZENworks Reporting 5 is the new add-on reporting tool for the ZENworks product line, supporting reports for all ZENworks features. It replaces the ZENworks Reporting Server utility. This session will introduce you to the installation and administration of ZENworks Reporting 5. We will discuss reasons for adding ZENworks Reporting 5 to your environment; planning, installation and patching considerations; and managing users, roles and permissions. We will also discuss moving from ZENworks Reporting Server to ZENworks Reporting 5.
Introduction to Building Reports with ZENworks Reporting 5 ZENworks Reporting 5 is the new add-on reporting tool for the ZENworks product line, supporting reports for all ZENworks features. It replaces the ZENworks Reporting Server utility. This session will introduce you to building and managing reports in ZENworks Reporting 5. You will learn to navigate ZENworks Reporting 5 and how to manage reports. You will also learn to create Ad Hoc Views and Topics, design reports and dashboards, and convert reports from ZENworks Reporting Server.
Discovery Methods in ZENworks Asset Management and ZENworks Configuration Management ZENworks features several powerful discovery technologies to assist with the management of your device configurations and hardware / software assets. Utilizing the tools efficiently can not only help you manage your assets more effectively, but also save money.
Basics of Software Reconciliation in ZENworks Asset Management From audit prevention to improving software purchasing processes to maximize cost efficiency, reconciling software purchasing data to software inventory is an important tool in ZENworks Asset Management and the ZENworks Suite.
Using NetIQ's Implementation of NetFlow to Solve Customer's Problems NetFlow and other protocols like IPFIX, JFlow and sFlow are low-level network traffic auditing protocols that record information about individual network conversations. This session will demonstrate installation, configuration and use of NetIQ® Netflow to find events, how to present data in easily understandable "before-and-after" terms and how it summarizes and publishes information to NetIQ Sentinel™. The session targets admins who want to successfully install and deploy Netflow or are new to Sentinel 7.2 and want to understand features included in the new release.
The Granular Delegation of NetIQ Directory and Resource Administrator This session will show how you can gain granular security controls by restricting users' visibility of specific controls, information and directory objects, thus increasing security. Admins wanting to learn single-tool Active Directory management or how to use native tools to simplify complex processes are welcome to attend. Attendees will learn to processes such as finding objects, creating groups, managing accounts, working with account templates and managing mailboxes and contacts. All these capabilities make NetIQ Directory and Resource AdministratorT vital to any AD shop.
NetIQ Identity Manager: Entitlements Creation, Implementation and Onboarding Entitlements provide greater visibility into authorizations NetIQ Identity Manager grants users. This session includes a lecture and a hands-on portion to clarify using entitlements in your Identity Manager infrastructure. You will create an entitlement, including defining policies to carry out the requisite processes, then use it with: Entitlements Service Driver, User Application Provisioning Workflow, and RBPM Resource Model. Identity Manager admins are our focus, particularly those wanting to learn to implement an entitlement framework in their environment or understand their current entitlement implementation.
NetIQ Identity Manager: Introduction to Access Review This session introduces the new NetIQ Identity Manager Access Review Application. Permissions and authorizations are being granted daily in your Identity Manager environment without any accountability, approval process or review, but Access Review gives you more visibility on current permissions and authorizations. Managers, administrators, and auditors can verify each authorization and permission. This session will show you how to install and implement Access Review, how to collect accounts and entitlements and how to perform an Access Review. If you're an Identity Manager admin wanting to learn more about Access Review and to get hands-on experience with it, this session is perfect for you.
Spots are filling up quick. Get Scheduled!