Pulse 2014

The Premier Cloud Conference
February 23 - 26
MGM Grand - Las Vegas, Nevada.



At Pulse 2014 we'll bring you four days of top-notch education with hundreds of sessions that demonstrate how to apply the right tools, technologies, and best practices to help your organization achieve limitless possibilities on the cloud. These sessions will focus on applying the transformative power of cloud computing and securely evolving beyond the data center into the world of smarter assets and optimized IT. When coupled with an analytical approach to improving Visibility, Control, and Automation, the result is an increasingly smarter physical infrastructure supporting today's highly dynamic technology-oriented business models.

The Pulse curriculum is aligned to 6 streams that encompass 20+ tracks which help frame sessions and content throughout the event.

Security Analytics & Fraud Protection
Explore how organizations can leverage security intelligence to protect their clients against cybercrime by stopping advanced malware and phishing attacks from triggering data breaches and fraud losses.

Identity & Access Management: Enterprise, Mobile and Cloud
Learn how Identity and Access Management strategies and best practices can effectively manage user roles, accounts and rights throughout the lifecycle, guard against insider threats and security breaches and simplify compliance whether accessing within the datacenter, from a mobile device or in the cloud.

Application & Data Security Strategies and Best Practices
Data is at the heart of the organization and the center of the hacker’s target. This track will feature sessions on safeguarding data throughout its lifecycle and covering application security strategies for traditional and mobile applications.

Infrastructure Protection for the Threats of Today and Tomorrow
Learn best practices to manage security across your network, servers, virtual servers and endpoints. Get an update on the latest security trends and how to identify and block emerging threats while keeping endpoints in compliance.