Previous Events
|
Information Systems Security Association (ISSA)
|
International Legal Technology Association
|
Arizona Chapter of the Healthcare Information and Management Systems Society
|
Sonoran Desert Security Users Group
|
Arizona Technology Council
|
The International Consortium for Organizational Resilience (ICOR)
|
Central Arizona Chapter of the Association of Contingency Planners (ACP)
|
Society for Information Management Arizona Chapter (SIM)
|
American Society for Industrial Security Phoenix Chapter
(ASIS)
|
Alliance for Innovation
|
Arizona ITSM Professionals
|
ISACA Phoenix Chapter
|
(ISC)² PHOENIX CHAPTER™
|
The 5th Annual Arizona Technology Summit was held at the Phoenix Convention Center (South Ballroom) on September 25th 2013 from 8am-5pm.
The IT environment is constantly shifting, in order to prepare for what's ahead you need to know what's on the horizon. At the Arizona Technology Summit we learned about The IT Forecast including the tools you will need to weather the storms and how to ensure the sunny skies are here to stay.
This year we had specific breakout sessions designed for IT Executives and Security and Education professionals at the 2013 conference. This is a result of continued growth in event attendance and the desire to provide valuable information that will assist you in your organization. Please note that the 2012 Arizona Education Technology Summit has now been combined with the Arizona Technology Summit as we feel it will benefit those in the education sector to be exposed to all that the Arizona Technology Summit has to offer.
Our Sponsors provide invaluable knowledge and expertise to the Technology Summit. They are among the greatest contributors to the success of each conference. Below are the sponsors for the Arizona 2013 event.
Platinum Sponsor |
||
![]() | Smarter business starts with smarter technology. The Internet and wireless revolutions continue to transform the way we create, use and share information; the way we build and maintain relationships; the way we make decisions. And to work smarter, we’ll need smarter organizations transforming the collaborative infrastructure and processes of our places to work to enable people to take advantage of the full scope of an instrumented, interconnected and intelligent world. IBM’s deep understanding of IT systems and cutting edge technologies can help you get the most out of your information, enabling you to reach the new connected customers, alleviate risk and drive profit, and drive smarter business outcomes like agility, performance and growth. Your company is smarter than you think. A smarter business needs smarter software, systems and services. Let’s build a smarter planet. Ibm.com/smarterplanet |
Gold Sponsors |
||
![]() | HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems. More information is available at http://www.hp.com. |
|
![]() | Dell Software and iT1 have teamed up to provide the most comprehensive solution offering and support for Dell’s data protection software. This data protection solution offering enables customers to attain unmatched recovery time and recovery point objectives (RTO and RPO) for applications and data that span virtual, physical and cloud environments. The superior scalability and broad platform support allow you to simplify data protection, minimize risk and will get your system up and running faster. iT1 is a Premiere Partner with Dell and will serve as the go-to VAR for all of your data protection software needs. Find out more at www.it1.com/partners/dell. |
|
![]() | K2 is a platform for building workflows and process-driven applications to automate and manage business processes - such as document approval or inventory tracking - or pull together business processes, people, services, information and systems into a single application that helps drive business. With K2, the complexity of traditional software development is eliminated and replaced with easy-to-use, visual tools. These tools enable business people and technical people to collaborate and assemble process-driven applications. Everything is visual. Everything is declarative. Everything is reusable. Everything is intuitive. www.k2.com |
|
![]() | Neudesic is the trusted technology partner in business innovation, delivering impactful business results to clients through leading-edge technologies, innovative solutions and strategic alliances. Founded in 2002 and headquartered in Irvine, California, Neudesic is a privately held company, serving clients globally from offices across the United States. For more information, visit www.neudesic.com. |
Silver Sponsor |
||
![]() | Mozy is the world's most trusted provider of data access and backup, with more than three million customers, including 80,000 business customers and more than 90 petabytes of information stored. Mozy was acquired by EMC Corporation in 2007 and is included in the EMC Backup Recovery Systems division's solution portfolio. http://mozy.com/ |
Reception Sponsors |
||
![]() | For 23 years, Arrowhead has provided barcode solutions, point-of-sale, RFID, & iOS/OS X applications. We offer enterprise solutions for Asset Management & Inventory Management using barcode, RTLS, & GPS technology. Arrowhead offers on-site service & factory authorized warranty repair for Zebra, Brother, Citizen, Datamax, Samsung and many others. http://www.arrowheadphx.com/ |
|
![]() | Zebra Technologies, a global leader respected for innovation and reliability is a manufacturer of thermal bar code label and receipt printers, RFID smart label printer/encoders, card and kiosk printers. Zebra's extensive portfolio gives a digital voice to assets, people and transactions that provide greater visibility into mission-critical information. http://www.zebra.com |
Presentation Sponsors |
||
![]() | Accuvant is the only research-driven information security partner delivering alignment between IT security and business objectives, clarity to complex security challenges and confidence in complex security decisions. Based on our clients' unique requirements, Accuvant assesses, architects and implements the policies, procedures and technologies that most efficiently and effectively protect valuable data assets. www.accuvant.com |
|
![]() | Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company’s flexible Network Sentry platform is the first network security offering that can automatically identify and profile all devices and all users on a network, providing complete visibility and control. http://www.bradfordnetworks.com |
|
![]() | Cisco helps state and local governments become more efficient and proactive by helping them transform the way they communicate internally and with constituents. Using Cisco® networking and voice solutions, governments can better deliver on their mission. The Cisco Connected Communities approach improves service effectiveness, empowers citizens, promotes social inclusion, facilitates economic growth, and increases public safety. www.cisco.com | |
![]() | cStor helps companies strategize, create, and implement data center solutions that address business needs. Now more than ever, innovative clients know that IT can be a highly-impactful enabler of business transformation, cost reduction, and competitive advantage. cStor's proven capabilities with key data center technologies provides clients with a fresh perspective, the ability to collaborate with recognized data center experts, and the confidence that goals will be met. www.cstor.com | |
![]() | CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage. www.cyberark.com | |
![]() | ePlus Security, a division of ePlus inc. (NASDAQ NGS: PLUS), is a leading security and integration firm that has designed, built, optimized and secured network infrastructures for more than two decades. Founded in 1990, ePlus has 825+ associates serving federal, state, municipal, and commercial customers. For more information, visit www.eplus.com/security. |
|
![]() | ExaGrid offers the only disk-based backup appliance with data deduplication that leverages a unique architecture optimized for performance, scalability and price. ExaGrid is the only solution that combines compute with capacity and a unique landing zone to permanently shorten backup windows, eliminate expensive forklift upgrades, and achieve fast, reliable restores, tape copy and disaster recovery. http://www.exagrid.com/ |
|
![]() | Lenovo is a US$34 billion personal technology company and a global Fortune 500 organization, as well as the second largest PC maker worldwide and an emerging PC Plus leader. Serving customers in more than 160 countries, Lenovo's business is built on product innovation, a highly-efficient global supply chain and strong strategic execution. Its product lines include a full range of commercial and consumer PCs, servers and workstations, and a family of mobile internet devices including smartphones and tablets. http://www.lenovo.com |
|
![]() | Fiberlink is the recognized leader in SaaS solutions for secure enterprise mobile device, application and document management. Its MaaS360 platform provides mobility intelligence and control over devices including iOS, Android and Blackberry to enhance mobile user experience and secure corporate data and has over one million endpoints globally. www.maas360.com |
|
![]() | Meru Networks designs, develops, and distributes virtualized wireless LAN solutions that deliver the performance, reliability and operational simplicity of a wired network with the advantages of mobility. Meru provides automatic, secure BYOD on-boarding and device provisioning, with easy scalability for density and accelerating wireless usage. http://www.merunetworks.com/ |
|
![]() | MicroAge is a leading provider of technology products and services headquartered in Tempe, Arizona. We serve clients from the data center to the desktop with computer products from industry-leading technology manufacturers. www.microage.com |
|
![]() | Mitel is a global provider of business communications and collaboration software and services. Through a single cloud-ready software stream, Mitel delivers a powerful suite of advanced communications and collaboration capabilities that provides freedom from walled garden architectures and enables organizations to implement best-of-breed solutions on any network. For more information visit: http://www.mitel.com. |
|
![]() | NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Customers around the world choose us for our "go beyond" approach and broad product and service portfolio. Our solutions provide nonstop availability of critical business data and simplify business processes so you can deploy new capabilities with confidence and get to revenue faster than ever before. | |
![]() | QCM Technologies is an Arizona-based IBM Premier Business Partner and computer systems integrator that provides solutions and services for such product lines as PureSystems, Power7, System x, and storage systems. QCM has established business partnerships with developers such as Lenovo, Microsoft, and VMware, and provides solutions ranging from virtualization, to ERP. http://qcmtech.com |
|
![]() | Rapid7's solutions, Nexpose, Metasploit and Mobilisafe, give defenders visibility & management of the risk around their IT environment, users & threats. Used by 2,400+ enterprises & government agencies in 65+ countries, its solutions are top rated by Gartner®, Forrester® & SC Magazine. Its free products are downloaded 1,000,000 times a year. www.rapid7.com |
|
![]() | Ruckus Wireless, Inc. is a global supplier of advanced wireless systems for the rapidly expanding mobile Internet infrastructure market. Ruckus technology addresses Wi-Fi capacity and coverage challenges caused by the ever-increasing amount of traffic on wireless networks due to accelerated adoption of mobile devices such as smartphones and tablets. www.ruckuswireless.com |
|
![]() | Skybox Security provides powerful risk analytics that give security teams the intelligence needed to eliminate attack vectors, respond to threats and improve security processes. Our solutions are used for enterprise-scale vulnerability and threat management, firewall management and compliance monitoring. www.skyboxsecurity.com |
|
![]() | Sophos helps organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products. www.sophos.com |
|
![]() | Trans-West Network Solutions was established in 1981. We are a total network solutions provider offering best in class products and services. Some products include: Mitel, VMWare,Ruckus Wireless,Fortinet,ProCurve, Oaisys, Enterasys, CloudNet Group and much more. Trans-West believes in a consultative approach working to improve our clients Business Process. Services Include: Installation, Maintenance, Network Design, implementation, free consultations and complete review of current products and services. | |
![]() | Vector Resources designs, implements and maintains unified voice, video and data networks. Founded in 1988, Vector is today one of the nation’s premiere network integration companies. Vector is based in Torrance, CA with offices in San Diego, Rancho Cucamonga, Phoenix, Harrisburg, PA, and Washington, D.C. Visit www.vectorusa.com and www.vectorfederal.com for more information. |
|
![]() | Veeam Software develops innovative solutions for VMware vSphere and Microsoft Hyper-V virtualization management and data protection. Veeam Backup & Replication is the #1 VM Backup solution. Veeam ONE is a single solution for real-time monitoring, documentation and management reporting for virtual environments. Veeam nworks extends enterprise monitoring to VMware through Microsoft System Center and HP Operations Manager. Learn more by visiting www.veeam.com. |
|
![]() | VXSuite helps companies provide excellent Quality of Experience to their Unified Communications users. VXPulse is a web-based application that monitors the network and allows remote control to both legacy and IP phone systems. VXSuite includes Call Accounting, Cell Phone Reporting, VoIP Monitoring and Reporting. Solve problems such as tracking a 911 call, bomb threat or other harassing call. http://vxsuite.com/ |
The Governing Body is a union of senior executives that directs the content of the Arizona Technology Summit. Machaon Corporation would like to recognize the following Governing Body members for their leadership and direction:
|
8:00 am |
|
|
8:00 am - 9:00 am |
|
8:00 am - 3:45 pm |
|
|
8:00 am - 9:00 am |
|
|
9:00 am - 10:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
|
2:45 pm - 3:45 pm |
|
9:00 am - 10:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
|
2:45 pm - 3:45 pm |
|
9:00 am - 9:30 am |
|
|
9:30 am - 10:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
|
2:45 pm - 3:45 pm |
|
9:00 am - 10:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
|
2:45 pm - 3:45 pm |
|
9:00 am - 10:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
|
2:45 pm - 3:45 pm |
|
9:00 am - 2:00 pm |
|
|
9:00 am - 10:00 am |
|
|
10:00 am - 11:00 am |
|
|
11:00 am - 12:00 pm |
|
|
12:00 pm - 1:00 pm |
|
|
1:00 pm - 2:00 pm |
|
On the Showroom Floor, you will see demonstrations of the latest in IT. We attract the most progressive solutions providers and present attendees with the opportunity to interact with the IT elite throughout the conference.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|