Hi [[ session.user.profile.firstName ]]

IBM Cloud & Smarter Infrastructure

  • Date
  • Rating
  • Views
  • Thwarting the Most Damaging Cyber Threats of 2014 and Beyond
    Thwarting the Most Damaging Cyber Threats of 2014 and Beyond
    Rich Caponigro; Sean Brown; Mark Ehr; IBM Recorded: Dec 12 2014 60 mins
    Heartbleed. Shellshock. POS malware. These are just a few of the security-related horror stories that have dominated the headlines this year. And while we only have a few months left in 2014, given the sophisticated nature of cyber-attacks these days, it's doubtful these will be the last.

    In the current landscape of fierce and frequent threats, it is not enough to protect your endpoints and data; you also need an efficient incident response system that can react within minutes to threats that get past your perimeter protection, in order to minimize damage to your organization and your customers.

    How do you protect your organization from advanced threats and ensure you have a robust incident response system in place that can detect and respond to attacks on your data?

    Join our panel of experts as they discuss the top security incidents this year and what you should be doing to ensure you have a comprehensive security system in place that allows you to Protect, Detect and Respond to attacks on your organization.
  • Data in the World of Dynamic Hybrid Clouds
    Data in the World of Dynamic Hybrid Clouds
    Steve (Woj) Wojtowecz, VP Storage & Network Management Software, IBM Tivoli; Richard Spurlock, CEO & Founder, Cobalt Iron Recorded: Nov 19 2014 60 mins
    Hybrid clouds are rapidly emerging as the ideal model for data-driven applications. The allure of better performance and agility at a lower total cost is compelling to business and technical managers alike.

    But how do you stay in control of your data? Through this webcast, you'll see how IBM clients and Business Partners are taking advantage of hybrid clouds, and how they're resolving the important issues of data management, data protection, and data security.
  • IBM: Reducing Risk and Complexity
    IBM: Reducing Risk and Complexity
    IBM Recorded: Sep 22 2014 3 mins
    IBM: Reducing Risk and Complexity
  • IBM: Mitigating Risk
    IBM: Mitigating Risk
    IBM Recorded: Sep 22 2014 2 mins
    IBM: Mitigating Risk
  • Converged Storage, VMs and Data Protection: It Works -- Here's How
    Converged Storage, VMs and Data Protection: It Works -- Here's How
    Greg Van Hise, Storage Software Technical Strategy and Architecture, & Dan Wolfe, Tivoli Storage SW Advanced Technology, IBM Recorded: Sep 18 2014 46 mins
    Storage convergence is being driven by growing demand for information technology (IT) resources in the physical, cloud, and virtual environments. Virtualized environments are rapidly growing as well as storing increasing amounts of data; therefore, many critical applications are now hosted on Virtual Machines (e.g. VMWare). There is little or no tolerance for long provisioning queues, sporadic performance, or downtime. This webcast will help attendees understand how to manage and protect VMWare data better in converged systems, with more flexibility, and often at a lower total cost than they’re paying for storage and backups today.
  • Stay Off the Data Breach List: Protect your data, enterprise and customers
    Stay Off the Data Breach List: Protect your data, enterprise and customers
    Sean Brown, Trusteer; Rich Caponigro, IBM Endpoint Manager; David Lingenfelter, Fiberlink Recorded: Sep 16 2014 43 mins
    Security breaches happen so frequently these days that it is often hard to keep track of who was hacked and what data was at stake. The growing number of incidents have put companies in the limelight for all the wrong reasons subjecting them to significant financial losses and damaged reputations.

    Organizations need a robust security strategy that secures and protects their data, devices and customers. You not only have to protect your enterprise against advanced security threats and malicious code but also your customers against various malware and phishing attacks on their endpoints not under your control. Given the shift to a mobile workforce with BYOD being more commonplace in many organizations, the security risk factor is further exasperated with the complex mix of mobile apps and devices in the workplace.

    Keep your name off the Data Breach List. Join this webcast discussion with senior security experts and learn how you can, not only secure your enterprise and mobile devices but also prevent your customers’ devices from being compromised through the various fraud and phishing scams prevalent on the web.
  • Find and Resolve IT Issues In Minutes with Operations Analytics
    Find and Resolve IT Issues In Minutes with Operations Analytics
    Kevin Myers, IBM Development Program Director, SmartCloud Analytics Recorded: Aug 28 2014 45 mins
    An organization's IT systems and applications can generate up to 1 terabyte of data per day. Traditional decision-support tools lack the breadth and depth to analyze this data to quickly identify and isolate root cause issues, tune performance, and anticipate problems for both data center and physical assets located on site and in the Cloud. Come learn how you can analyze all this data to help you find and resolve IT problems faster.
  • How IT Operations Analytics Predict and Prevent Service Outages
    How IT Operations Analytics Predict and Prevent Service Outages
    Steve Smythe, IBM Analytics Market Segment Manager Recorded: Aug 27 2014 48 mins
    Reacting to performance thresholds is not enough. To ensure your mission critical applications are always available 24X7, you must also prevent outages by predicting problems before they become service impacting. IBM IT Operations Analytics solutions analyze the terabytes of big data from your IT operations. These solutions turn your data into understandable, relevant information that provides insights that you can act on immediately. Come learn how you can use these insights to predict outages before they occur.
  • Mining IT Big Data: Using Analytics to Improve your Cloud/Datacenter Operations
    Mining IT Big Data: Using Analytics to Improve your Cloud/Datacenter Operations
    Steve Smythe, IBM Analytics Product Manager Recorded: Aug 20 2014 60 mins
    An immense amount of data is being collected by IT systems—up to 1TB per day for many organizations. It is created by the day-to-day use of potentially hundreds of interrelated systems, as part of typical IT datacenter and cloud operations. The data can indicate areas of concern or poor performance, areas of under- or over-utilized system components, and areas of focus for potential performance improvement. However, there is far more data, and too many contextual variables, for people to manually interrogate. Advanced IT Operations Analytics tools can mine this "big data" to predict and avoid problems, quickly isolate root causes and optimize workloads across virtualized systems, resulting in improved business operations.
  • Find and Resolve IT Issues in Minutes using IT Operations Analytics
    Find and Resolve IT Issues in Minutes using IT Operations Analytics
    Kevin Myers, IBM Development Program Director, SmartCloud Analytics Recorded: Jun 26 2014 45 mins
    An organization's IT systems and applications can generate up to 1 terabyte of data per day. Traditional decision-support tools lack the breadth and depth to analyze this data to quickly identify and isolate root cause issues, tune performance, and anticipate problems for both data center and physical assets located on site and in the Cloud. Come learn how you can analyze all this data to help you find and resolve IT problems faster.

Embed in website or blog