Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Capitalising Your Cloud; financing options for cloud projects
    Capitalising Your Cloud; financing options for cloud projects Jez Back, Senior Manager Deloitte Consulting Live 45 mins
    Every IT organisation is under pressure to deliver services as efficiently as possible, utilising infrastructure and services that may have a significant impact on the financial position and results of the organisation

    Historically, cloud technology has made reference to the potential benefits of transferring costs from the balance sheet (capex) to the income statement (opex). However, an unintended consequence has been that few, if any, cloud related costs could be capitalised. This may not be the desired outcome for all organisations and the capitalisation of certain types of cloud technology maybe preferred, or even required by accounting standards. This session explores this area and what key considerations can be given to the capitalisation of cloud.
  • 7 Qualities that are Revolutionizing CDN Origin Storage - EMEA
    7 Qualities that are Revolutionizing CDN Origin Storage - EMEA Charlie Russel, Sr. Product Marketing Manager & Kerrion Burton Evans, Solutions Engineer II Recorded: May 18 2017 47 mins
    Discover a hidden gem for your digital content delivery. If you’re using or considering a Content Delivery Network (CDN), you’ve probably heard of origin storage. But you may not know much about it.

    Done right, CDN origin storage doesn’t take a lot of your team’s time, dramatically improves user experience, and can even save you money.

    Done wrong, it can waste valuable resources, time, effort and money, only to deliver bad user experience -- and you might not even know it.

    Whether you’re delivering online video, files, websites, gaming or e-commerce, this webinar can provide valuable perspective and opportunities for improvement.

    We will explore:

    • What CDN origin storage is, and why you should care about it
    • 7 qualities that are revolutionizing CDN origin storage
    • Just released capabilities in Limelight Origin Storage that make it a game changer for your team, your audience and your bottom line

    Then we’ll open up the floor to an “Ask the Expert” session with Solutions Engineer Kerrion Burton Evans.

    Register now for this informative session and submit questions for Kerrion!
  • CloudSOC CASB a good opportunity to run new business
    CloudSOC CASB a good opportunity to run new business Stijn ROMMENS, Symantec EMEA Sales Engineering Specialist Recorded: May 18 2017 60 mins
    Learn how to drive new sales opportunities with Symantec CloudSOC CASB solution into your customer conversations.
  • 5 Steps to Build a Cost-Effective Cloud Data Protection Strategy
    5 Steps to Build a Cost-Effective Cloud Data Protection Strategy Mark Galpin, Solution Engineer Dell EMC Data Protection Solutions Recorded: May 18 2017 48 mins
    According to the Global Data Protection Index Survey, more than 51% of the organizations are not fully confident their data stored in the cloud is protected against deletion and corruption.

    Storing backup data in the cloud may also generate multiple hidden fees as well as raise concerns regarding service levels, availability, and control.

    Join our webinar to learn how Dell EMC is helping organizations to build a cost-effective data protection strategy for the cloud environments, including:
    · Highly efficient and secure backups to and within the cloud
    · Cost-effective data protection of enterprise applications running on Amazon Web Services (AWS) and Microsoft Azure
    · Natively tiered de-duplicated data sent directly to the cloud platforms, providing significantly lower TCO
  • Public Safety: Video Surveillance & Security
    Public Safety: Video Surveillance & Security Graham Porter: Surveillance & Security, Dell EMC. Tony Burns: Director, Pelco Recorded: May 18 2017 49 mins
    The video surveillance market continues to see robust growth, with organizations and governments requiring to deter, protect, prosecute and predict with their CCTV systems.

    Body cameras, as an example are starting to be widely implemented, from places of work with signs ‘it is against the law to insult a staff member’ to police officers roaming the street. Independent studies prove that body worn cameras will reduce complaints, reduce the need for the use of force, and provide incontrovertible evidentiary video - Cameras change behaviour.

    Pelco & Dell EMCs skill-set and qualifications are helping many customers in the Video Surveillance space, centralize data from hundreds to thousands of cameras, static, body-worn or vehicle mounted.   

    Join the webcast to learn;
    - Video Surveillance Market
    - Customer concerns with technology migration
    - How Pelco & Dell EMC solutions are solving Customer requirements
    - Customer Success Stories

    Gain the ability to simply Store, Manage, Protect & Analysis petabytes of CCTV data
  • Microservices as Containers on AWS…for Fun and Profit
    Microservices as Containers on AWS…for Fun and Profit Casey Lee, Senior DevOps Engineer at Stelligent, a division of HOSTING Recorded: May 17 2017 59 mins
    The architectural pattern of decomposing an application into microservices has proven extremely effective at delivering software faster. However, this type of an architecture comes with its fair share of challenges.

    Fortunately, Amazon Web Services (AWS) offers many services that can be leveraged to overcome these challenges and adopt microservice best practices. If you are just starting to consider using AWS for running your microservices or if you have already started on the journey and looking for opportunities to improve, then this webinar will be beneficial for you.
  • Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942
    Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942 Jonathan Jew - J&M, Glenn Sexton - NIS, Limor Schafman - TIA Recorded: May 17 2017 82 mins
    Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.

    Speakers:
     Jonathan Jew, J&M Consultants
     Glenn Sexton, President and Principal Consultant, NIS

    1 BICSI CEC

    About TR-42 Telecommunications Cabling Systems Committee:
    The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.

    The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.

    Participate in TR-42: Stephanie Montgomery: [email protected].
  • Transform Your Data Protection Strategy
    Transform Your Data Protection Strategy Jason Iehl Recorded: May 17 2017 59 mins
    Protecting against the loss of critical data should be one of the highest priorities of business and IT leaders today. Losing even small amounts of such data due to a network outage, systems failure, security breach, natural disaster or some other cause can result in significant damage for companies.
    This second edition of our Security and Privacy webinar series will discuss how to safeguard your data and business-critical applications across the enterprise and hybrid cloud. You’ll learn how to quickly recover from outages, maintain the availability of critical applications, and securely back up data to any cloud. Discover how to achieve near-instant recovery from failures with zero data loss.
  • The State of Tech M&A in China: Activity & Outlook
    The State of Tech M&A in China: Activity & Outlook Brenon Daly, Agatha Poon & Tim Miller Recorded: May 17 2017 61 mins
    A decade ago, tech deal flow barely trickled into and out of China. While M&A in the world’s second-largest economy is still relatively small, it has dramatically accelerated in recent years, with the overall number of tech transactions in China having doubled over the past half-decade to a record level in 2016. Spending on deals also surged to unprecedented levels last year. However, there are some concerns about whether the M&A boom will continue. China’s currency has weakened, economic growth has slowed and relations with its main tech partner – the US – have soured. Will M&A falter, too?

    Join 451 Research’s Brenon Daly, Research Director, Financials, Agatha Poon, Research Director of APAC Services, and Tim Miller, VP of Financial Markets for a 45-minute webinar on the state of M&A in China now, as well as the outlook for the coming years.
  • How to Rapidly Identify Assets at Risk to WannaCry Ransomware
    How to Rapidly Identify Assets at Risk to WannaCry Ransomware Jimmy Graham, Director of Product Management, Qualys and Mark Butler, Chief Information Security Officer, Qualys Recorded: May 17 2017 77 mins
    A major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than 150 countries since May 5. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread.

    WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk.

    During this webcast Jimmy Graham, Director of Product Management at Qualys, and Mark Butler, Chief Information Security Officer at Qualys, will discuss how to:

    • Patch and implement other mitigations for WannaCry
    • Detect and get full visibility on impacted assets for prompt remediation
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a live Q&A session.
  • Why You Need A Graph Database to Understand Your Customers
    Why You Need A Graph Database to Understand Your Customers Mike Downie, Senior Developer, Expero & Gehrig Kunz, Product Marketing Specialist Recorded: May 17 2017 42 mins
    Companies across a variety of industries are trying to attain a holistic view of their customers. From creating a more personalized experience, to creating more timely and relevant support, to simply marketing to them more efficiently and effectively, there are tremendous gains to be had with a 360-degree view. However, achieving this 360-degree view requires serious data — or more accurately, serious crunching and analyzing of data to understand customer relationships across every touchpoint and multiple business units. Sound challenging? It was. Until graph databases.
  • Data Protection for IoT – Securing Enterprise Business Intelligence
    Data Protection for IoT – Securing Enterprise Business Intelligence Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security Recorded: May 17 2017 61 mins
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • Top 10 Cloud Trends for 2017
    Top 10 Cloud Trends for 2017 Ashley Kramer, Director of Product Management, Tableau and Marshall Daly, Cloud Data Evangelist, Tableau Recorded: May 17 2017 59 mins
    In 2016, cloud technologies went mainstream. But with maturity came the realization that moving to the cloud doesn’t happen overnight. As the shift to cloud progresses, we’re exploring the newest trends for cloud technology for the upcoming year.

    In this webinar you’ll learn more about:

    •Emerging global trends in cloud and cloud analytics

    •Tableau experts' take on the changing cloud landscape

    •Considerations for your 2017 cloud strategy
  • Burst from On-Premises to the Cloud with NetApp StorageGRID & Intel X86 Servers
    Burst from On-Premises to the Cloud with NetApp StorageGRID & Intel X86 Servers Robert Cox, Senior Product Marketing Manager, NetApp and Ronnie Chan, Product Marketing Manager, NetApp Recorded: May 17 2017 36 mins
    With the advent of Software, Platform, and Infrastructure-as-a-Service offerings in the public cloud, many enterprise IT organizations have a mandate to leverage the public cloud to deliver applications and services. Meanwhile, organizations with petabytes-scale rich content depots are finding moving persistent data storage wholesale to the public cloud is more expensive in the long run. IT has an opportunity to add value by delivering a catalog of standard, S3- and Swift-compatible, object storage services at a cost, quality, and speed comparable to the best external cloud providers.  To address this, IT organizations are turning to the Hybrid Cloud to streamline and automate management of their rich content data at scale.

    In this webinar customers will learn how to evolve to succeed in the data-powered digital era utilizing flexible deployment options, multi-tenant global namespaces, automated data policies, and ease of configuration— all powered by NetApp StorageGRID Webscale software and Intel X86 servers.
  • Hyperledger: Advancing Blockchain Technology for Business
    Hyperledger: Advancing Blockchain Technology for Business Cloud Standards Customer Council Recorded: May 17 2017 62 mins
    Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance, banking, IoT, supply chain, manufacturing and technology.

    In this webinar, Dan O'Prey, CMO at Digital Asset and Chair of the Hyperledger Marketing Committee, and IBM’s Chris Ferris, chair of the Hyperledger Technical Steering Committee, will provide an overview of the Hyperledger Project. They will discuss the basics of distributed ledger technologies, business use cases for blockchain, and how to get involved with Hyperledger projects.
  • European Utilities: The Digital Transformation Journey
    European Utilities: The Digital Transformation Journey Yiru Zhong and Jonathan Robinson Recorded: May 17 2017 45 mins
    As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
  • Architecting Security and Governance Across a Multi-Account Strategy
    Architecting Security and Governance Across a Multi-Account Strategy Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS Recorded: May 17 2017 56 mins
    Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance.

    At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
  • Securing Enterprise Big Data workloads
    Securing Enterprise Big Data workloads Pratim Das, Specialist Solutions Architect – Analytics, AWS Recorded: May 17 2017 33 mins
    Security of big data workloads in a hybrid IT environment often comes as an afterthought. This session discusses how enterprises can architect secure, big-data workloads on AWS. We cover the application of authentication, authorization, encryption, and additional security principles and mechanisms to workloads leveraging Amazon Elastic MapReduce (EMR) and Amazon Redshift.
  • Migrating to the New Performance NVMe and SAS SSD Offering
    Migrating to the New Performance NVMe and SAS SSD Offering Esther Spanjer, Director, Enterprise Business Development EMEA, Western Digital Recorded: May 17 2017 35 mins
    HGST has recently announced new Enterprise SSDs with SAS and NVMe interfaces. In this webinar we will discuss the benefits of upgrading from the existing FusionIO PCIe cards to the new SN260 NVMe SSD and from the existing UltraStar SAS SSD to SS200 SAS SSDs.
  • DevOps with Apache Spark: Building Insightful Applications in the Cloud
    DevOps with Apache Spark: Building Insightful Applications in the Cloud Michael McCune Software developer, Red Hat Recorded: May 16 2017 45 mins
    Data-driven applications in the cloud often consist of several components that must ingest, process, and publish their data to users. Deploying and integrating it all on a bare-metal or virtual platform can prove difficult for any organization. Orchestrating and assembling these components on a cloud platform presents a new set of challenges to engineers, operators, and data scientists.

    However, by combining Apache Spark's deployment methodology with Kubernetes' proven capability for repeatable integration patterns, it’s easy to create insightful analytics applications. Watch this webcast featuring a case study of an Apache Spark-based, data-driven application developed by a distributed team and deployed onto a containerized cloud platform.
  • How to Deliver Optimized SD-WAN Segmentation for your Cloud Network
    How to Deliver Optimized SD-WAN Segmentation for your Cloud Network Fan Gu, Sr. Technical Marketing Manager, VeloCloud Recorded: May 16 2017 29 mins
    Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.

    This webinar discusses:
    - Why Enterprise and Service Provider networks require segmentation
    - What is SD-WAN segmentation
    - How VeloCloud segmentation is implemented and optimized
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: May 16 2017 61 mins
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • DDS Technical Overview Part I - Introduction to DDS and Key Abstractions
    DDS Technical Overview Part I - Introduction to DDS and Key Abstractions Andrew Watson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech May 18 2017 3:00 pm UTC 60 mins
    Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow, DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

    To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group is offering this DDS Technical Overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

    Part I of the OMG DDS Webinar Series will get you started with DDS. We will (1) cover in great details DDS’ key abstractions, (2) introduce the essence of DDS-based data-centric and modular architectures, and (3) clearly position DDS with respect to messaging technologies. After attending this webcast you will know the fundamentals required to start using DDS in your next project. Presented by Angelo Corsaro, Ph.D., CTO at ADLINK Technology and Co-Chair of the OMG's DDS Special Interest Group.

    Part II: DDS QoS to Solve Real World Problems presented by Gerardo Pardo-Castellote, CTO of RTI and Co-Chair of OMG's DDS Special Interest Group is available here: https://www.brighttalk.com/webcast/12231/252387

    Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President, Twin Oaks Computing is available here: https://www.brighttalk.com/webcast/12231/252391
  • Character in TTS
    Character in TTS Rasmus Dall, TTS Researcher at Jibo, Inc. May 18 2017 3:00 pm UTC 30 mins
    Text to speech synthesis systems today sound very realistic, with very few artifacts and minimal signal distortion, however with little expressivity or character. While systems are certainly capable of producing a wide range of emotions and speaking styles, enabling rich character driven experiences, these are seldom, bordering to never, used in commercial applications due to one simple problem. They require human manual design.

    I will not propose a solution to this, but rather aim to state where the field currently is, and make a case for a more concerted effort into automating the use of human conversational elements in speech going beyond simply reconstructing the original signal as faithfully as possible.
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Karen Cordóva Comercial Datavision Ricardo Bobadilla Ingeniería May 18 2017 4:00 pm UTC 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.
    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?
    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.
  • Real-time Threat Hunting - 451 Research Trends & Security Analytics
    Real-time Threat Hunting - 451 Research Trends & Security Analytics Jason Stamper, Analyst, 451 Research and Eric Tran-le, CMO, Logtrust May 18 2017 4:00 pm UTC 60 mins
    Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.

    Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.

    • Learn new trends in machine data analytics from 451 Research
    • Pinpoint cybersecurity attacks and unusual behavior
    • Visualize an attack graph
    • Detect intruder paths and potential vulnerabilities
    • Leverage a single source of truth
  • Are You Prepared for Ransomware?
    Are You Prepared for Ransomware? Carl Leonard, Principal Security Analyst at Forcepoint May 18 2017 4:00 pm UTC 60 mins
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?


    About the Presenter:
    Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
  • Optimizing Flash Storage for SQL Databases
    Optimizing Flash Storage for SQL Databases Storage Switzerland, Tegile May 18 2017 5:00 pm UTC 60 mins
    Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
  • Five steps to data protection success
    Five steps to data protection success Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance May 18 2017 5:00 pm UTC 90 mins
    Feeling tethered to storage vendors whose boxes just can’t cut it? Innovation in hybrid cloud, primary storage, backup, and disaster recovery means enterprises should be able to free themselves – and transform how they consume storage and access data.

    Join this live, interactive webinar to discuss:
    - Ways to break the chains of traditional storage – and gain better performance and scalability – while minimizing on-prem investments
    - What Partners Healthcare and other enterprises do to better manage costly, complex data, while taking advantage of hybrid cloud to extend their infrastructure
    - The death of the traditional data center – and why it’s an opportunity for enterprises
    - How to get on-demand primary storage with offsite backup and DR as a single service.
  • How Mobile & Low-Code AppDev Aid Agile Business Process Management
    How Mobile & Low-Code AppDev Aid Agile Business Process Management Steve O'Keefe, Product Marketing Director, Mobile Application Platform, Red Hat May 18 2017 5:00 pm UTC 60 mins
    Process-oriented mobile applications have the power to transform the way organizations approach digital business. To get these apps to market fast and adapt them on the fly, low-code development tools and approaches are necessary to take the burden off IT and let the business self-serve via the citizen developer.

    Watch this webcast to learn about:
    - Why digital business places new demands on process-oriented mobile applications.
    - Agile business automation—the intersection of mobile, business process management (BPM), and low code.
    - 3 mobile and BPM use cases from the field: Field workforce management, asset management, and self-service applications.
  • Operational Technology & IoT Help Move Monitoring Closer to Users
    Operational Technology & IoT Help Move Monitoring Closer to Users Ryan D. Schmierer, Principal Consultant , RS Consulting NW May 18 2017 5:00 pm UTC 45 mins
    IT organizations have struggled for years to move beyond monitoring of technology components and measure the performance of business processes, services and end user experiences. Operational Technology (OT) and the Internet of Things (IoT) provide a unique opportunity for service management professionals to embed sensors, collectors and instrumentation capabilities directly into the interactions between users and IT Systems. This webinar will provide an overview of the use of OT and IoT in the IT monitoring context, some management considerations and a look forward at how these capabilities are expected to evolve over the next 2-3 years.
  • Data Encryption for the Cloud-First Era
    Data Encryption for the Cloud-First Era Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc. May 18 2017 5:00 pm UTC 60 mins
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • A Step-By-Step Approach For Endpoint Detection & Response
    A Step-By-Step Approach For Endpoint Detection & Response Scott Hardie, System Engineer, Symantec May 18 2017 5:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • The Bright Ops Future: Reinventing Operations In The Age Of Cloud-Native IT​
    The Bright Ops Future: Reinventing Operations In The Age Of Cloud-Native IT​ Guest Speaker Dave Bartoletti, Forrester Principal Analyst and John Allwright, Pivotal May 18 2017 6:00 pm UTC 60 mins
    In the whirlwind of digital business where web, mobile and now line-of-business app growth is exploding across every industry, how should operations teams respond? Do you add more people, automate what your experts already do, or is there another way?

    Join​ ​​guest speaker​ Forrester Principal Analyst Dave Bartoletti and John Allwright from Pivotal for an interactive discussion of how leading companies have successfully transformed their operations function​s to accelerate digital transformation.​​

    They will share​ ​data and research on how operations​ ​​teams are moving from being cost centers to the engine powering modern app development -- and how modern apps delivers value to the business beyond infrastructure efficiency.​
  • Ransomware – The Billion Dollar Thief
    Ransomware – The Billion Dollar Thief Ryan Kalember, SVP Cybersecurity Strategies May 18 2017 7:00 pm UTC 60 mins
    With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.

    Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.

    - The latest attacks, including WannaCry and its variants
    - The challenges in combating Ransomware
    - Tips and suggestions to mitigate WannaCry and other Ransomware attacks
  • TechTalk: CloudCheckr New Features (April - May)
    TechTalk: CloudCheckr New Features (April - May) Todd Bernhard, Product Marketing Manager, CloudCheckr May 19 2017 5:00 pm UTC 60 mins
    During this live webinar, learn the latest enhancements to the CloudCheckr Cloud Management Platform. Todd Bernhard, Product Marketing Manager for CloudCheckr, will highlight the newest noteworthy features, and show you how you can stay updated going forward.

    The CloudCheckr service is updated frequently… every week in fact, so it’s a challenge to stay informed on all of the new features. Attend this webinar and learn the important updates including:

    - Leverage price drops and new pricing policies for AWS Reserved Instances
    - Access over 450 Best Practice Checks
    - Save time and effort with “Fix Now” capabilities
  • SQL Server: On-Prem, in the Cloud, and In-Memory for Faster Reporting
    SQL Server: On-Prem, in the Cloud, and In-Memory for Faster Reporting Sal De Loera, Principal Solution Specialist Big Data & Analytics, Microsoft May 19 2017 6:00 pm UTC 60 mins
    Are you ready to run reports 10 to 100 times faster?

    Microsoft's latest SQL Server advancements, available both on-premises and in the cloud, include blazingly fast in-memory online transactional processing (OLTP), in-memory columnstore, and massively parallel processing (MPP) capabilities.

    Join this webcast to:
    - Improve reporting speed by 10 to 100 times by tapping into these industry-leading modern data platform features
    - See how other government organizations have upgraded to modern technology
    - Find out how those entities can now provide faster, more efficient reporting capabilities to their organizations
  • Deploying Machine Learning Techniques at Petabyte Scale with Databricks
    Deploying Machine Learning Techniques at Petabyte Scale with Databricks Saket Mengle, Senior Principal Data Scientist at DataXu May 22 2017 5:00 pm UTC 60 mins
    The central premise of DataXu is to apply data science to better marketing. At its core, is the Real-time Bidding Platform that processes 2 petabytes of data per day and responds to ad auctions at a rate of 2.1 million requests per second across 5 different continents. Serving on top of this platform is DataXu’s analytics engine that gives their clients insightful analytics reports addressed towards client marketing business questions. Some common requirements for both these platforms are the ability to do real-time processing, scalable machine learning, and ad-hoc analytics.

    This webinar will showcase DataXu’s successful use-cases of using the Apache® Spark™ framework and Databricks to address all of the above challenges while maintaining its agility and rapid prototyping strengths to take a product from initial R&D phase to full production.

    We will also discuss in detail:

    Challenges of using Apache Spark in a petabyte scale machine learning system and how we worked to solve the issues.
    Best practices and highlight the steps of large scale Spark ETL processing, model testing, all the way through to interactive analytics.
  • Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector
    Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector Vaibhav Pathak, Sr. Pre Sales Engineer May 23 2017 9:30 am UTC 45 mins
    What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

    These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

    Key learnings:

    •How to manage data security on shared computing resources?
    •How to secure storage and transfer of data on company-owned, or company-managed endpoints?
    •How to facilitate the path to meeting organizational and industry compliances?
    •How to ease the daily burden of your data security administration functions?
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto May 23 2017 3:00 pm UTC 60 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • Oracle Baselines and Benchmarks for the Business
    Oracle Baselines and Benchmarks for the Business Jonas Mason, Senior Consultant & Jim Hannan, Principal Architect; House of Brick Technologies May 23 2017 4:00 pm UTC 60 mins
    Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.

    Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.

    Discover the importance of benchmarks in establishing baselines that:

    1) Facilitate performance troubleshooting
    2) Enable efficient use of existing hardware
    3) Inform the hardware and software requisition narrative

    Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
  • State of WAN Architecture
    State of WAN Architecture Dr. Jim Metzler, Principal Analyst, Mike Wood, VP of Marketing May 23 2017 5:00 pm UTC 60 mins
    Dr. Jim Metzler, principal analyst at Ashton, Metzler & Associates, presents a detailed analysis of network organizations’ level of satisfaction with current WAN architecture. Jim discusses the issues experienced with existing WAN transmission services, the general interest in adopting an SD-WAN, as well as various related topics such as the differences between a DIY vs. a Managed Services approach.

    Join this webinar to learn more about:
    · Key customer use cases
    · Critical operational issues faced by enterprises
    · Setting up a project team to evaluate SD-WAN options
    · Managing existing WAN contracts
    · Building a business case for adopting a new WAN solution
  • Inside The New Generation of Phishing Attacks
    Inside The New Generation of Phishing Attacks Michael Landewe, Researcher, Avanan Cofounder May 23 2017 5:00 pm UTC 45 mins
    What we know and have trained users about phishing attacks has changed. Old methods no longer apply.

    IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.

    None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.

    Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.

    In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
  • Credential Theft:  A Perspective From the FBI & Unit 42 Threat Intel Team
    Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks May 23 2017 5:00 pm UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
  • Tech Demo - Flexible hybrid cloud application security
    Tech Demo - Flexible hybrid cloud application security Ajay Uggirala – Director of Product Marketing May 23 2017 5:00 pm UTC 45 mins
    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.