Search
Close this search box.

Cristie as Gold Sponsor at the 15th GSE ISP Symposium 2021

Share This Post

When: From September 28 to October 01, 2021
What: 15th GSE ISP Symposium 2021
Where: Online
What is the ISP Symposium?
It all started when some ADSM agnostics at the University of Karlsruhe organized and hosted the first three ADSM/TSM workshops.
Oxford University has organized and hosted five events called TSM Symposium, all held at St Catherine’s College, followed by the well-received TSM Symposium 2009 at Grandhotel Petersberg near Bonn, TSM Symposium 2011 Dresden, 2013 Berlin, 2015 Dresden, the ISP Symposium 2017 in Cologne, 2019 in Dresden and the latest ISP Symposium Online.
The symposium will cover a variety of Spectrum Protect-related topics, with a particular focus on leveraging innovation for new and changing features expected in ISPs over the next few years.

Don’t miss the previous day from our colleagues Petra Kuhnert, Gerd Becker and Marco Vögele

Topic: I want to break free – transform inactive backup data into secure long-term archive data. / Fight the ransomware battle
When? Thursday, September 30th from 4:50 p.m. to 5:20 p.m
Part 1: How IBM Spectrum Protect servers take up less space to store more important data. Free up old, inactive and expensive data from your backup environment by moving it to a cheaper, more efficient archiving solution.
Part 2: Blocky for TSM on a Windows system running Spectrum Protect. It is necessary to protect the vulnerable objects from unwanted manipulation. These objects are the databases, the logs, the disk storage pools (disk, file, container). The instance directory with its files such as dsmserv.opt dsmkeydb, volhist, devconfig, recovery plan files and DB backups is also important. Blocky is a filter driver that prevents unauthorized access to these objects.
Petra Kuhnert joined Cristie Data GmbH in 2004. Starting out mainly in the technical department, she is currently a Senior Consultant specializing in Storage and Data Management & Protection – in addition to Cristie Backup solutions such as TBMR and CBMR.
Marco Vögele has been active in the global data management & protection software business for more than 2 decades. He joined Cristie Data GmbH in 2018 with a focus on the partner business in Europe and as an expert for the metadata-driven data management solution StrongLink.
Gerd Becker is Head of Solution Competence Center at Cristie Data GmbH, an IBM Business Partner in Germany. He has over 25 years of experience with storage management products such as Tivoli Storage Manager. His areas of expertise include IBM Spectrum Protect implementation projects and customer site training. He has chaired the Guide Share Europe (GSE) storage user group for more than 17 years and is a member of the panel that organizes the well-known TSM or ISP Symposium. He is the author of several IBM Redbooks and IBM Champion 2021.
More about the speakers:
Petra Kuhnert
senior consultant
E-Mail: marco.voegele@cristie.partners
Marco Vogele
Partner Sales
E-Mail: marco.voegele@cristie.partners
Gerd Becker
Head of Solution Competence Center
E-Mail: gerd.becker@cristie.de
More information about Blocky for Veeam or Stronglink Download PDF
Don’t miss anything!
For more information and to register klicken Sie hier

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search

Cohesity Gaia: Revolutionizing Data Management with AI-Powered Conversational Search In today’s fast-paced digital world, organizations face the challenge of managing massive volumes of data while ensuring quick, accurate access to information. Cohesity Gaia, an AI-powered conversational search tool, is designed to address this challenge, transforming the way businesses interact with

How Cohesity’s Integrated Approach to Data Security and Management Works

How Cohesity’s Integrated Approach to Data Security and Management Works As organizations manage increasing volumes of data across distributed environments, the need for a unified approach to data security and management becomes essential. Cohesity’s leading data management platform, addresses these challenges with an integrated approach that combines data protection, security,

NIS 2 vs. ISO 27001: A Comparison of Requirements

NIS 2 vs. ISO 27001: A Comparison of Requirements As organizations face an increasing number of cybersecurity threats, compliance with security standards and regulations becomes essential. Two prominent frameworks are the NIS 2 Directive (Network and Information Security Directive 2) and ISO 27001. While both aim to enhance cybersecurity resilience,

Protect Your Organization with Arctic Wolf

Protect Your Organization with Arctic Wolf’s IR JumpStart Retainer Program: A Proactive Approach to Cybersecurity In today’s evolving threat landscape, organizations are more vulnerable than ever to cyberattacks. The need for a swift, expert-led response to cyber incidents is crucial to limiting damage and ensuring recovery. Arctic Wolf’s Incident Response

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat

Recent Cyber Attacks on Healthcare Organizations in Germany: A Growing Threat In our recent article we highlighted the top 5 industries targeted by cybercrime with the healthcare sector being number one. Germany’s healthcare sector has become a prime target for cybercriminals, with several significant cyberattacks in recent years causing widespread

The 5 Industries Most Targeted by Cybercrime

The 5 Industries Most Targeted by Cybercrime Cybercrime has become one of the most significant threats to global businesses, with hackers and cybercriminals increasingly targeting industries where sensitive data, critical infrastructure, and valuable financial information are stored. As the world becomes more digitally interconnected, cybercriminals are becoming more sophisticated, exploiting

it-sa 2024
Request your FREE admission voucher code.

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

CMT24 - Registrierung
Cristie Mopped Tour 2024

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Schauen Sie sich das DORA Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Watch the Spectra Tape Video

Thank you for submiting your email address. Press the button below to download the pdf.

Schauen Sie sich das NIS2 Directive Video an

Thank you for submiting your email address. Press the button below to download the pdf.

Save the Data - Event Registrierung

Thank you for your registration!






Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast

Thank you for your registration!





Teilnahme nach Verfügbarkeit.

Arctic Wolf - Security Breakfast Event

Thank you for your registration!





Participation subject to availability.

eBook: Transform Your Business with Mature Data Management

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Understanding LTO-9 Tape Technology – Whitepaper

Thank you for submiting your email address. Press the button below to download the pdf.

Contact Info

Nordring 53-55, 63843 Niedernberg,
An der Burg 6, 33154 Salzkotten,
Germany

Monatliches Angebot für Cloud-Schutz anfordern

Thank you for your registration!

Wählen Sie mehrere aus, indem Sie beim Auswählen die Taste strg oder cmd drücken.

*Sie können die Anzahl der zugewiesenen Lizenzen in Microsoft 365 ermitteln, indem Sie zur Seite Microsoft 365 Admin center > Billing > Licenses navigieren.

** Die folgenden Abonnements werden von Cristie Cloud Backup für Google Workspace nicht berechnet:
Google Voice Starter (SKU ID: 1010330003)
Google Voice Standard (SKU ID: 1010330004)
Google Voice Premier (SKU ID: 1010330002)

Auf dem Weg zur intelligenten Welt – Whitepaper

Da neue Technologien wie 5G, IoT, Cloud Computing und Big Data in der digitalen Transformation eingesetzt werden, bewegt sich die IT-Architektur von Unternehmen in Richtung eines hybriden Frameworks aus „traditioneller IT + privater Cloud + öffentlicher Cloud + Edge“.

Thank you for submiting your email address. Press the button below to download the pdf.

Striding Towards the Intelligent World – White Paper

As new technologies, such as 5G, IoT, cloud computing, and big data, are being applied in digital transformation, enterprise IT architecture is moving towards a hybrid framework of “traditional IT + private cloud + public cloud + edge”. This report provides an in-depth outlook on the development of the data storage industry.

Thank you for submiting your email address. Press the button below to download the pdf.

Zero Trust Data Security for Dummies

Thank you for submiting your email address. Press the button below to download the pdf.