Hi [[ session.user.profile.firstName ]]

Application Development

  • Under 10 Seconds from Source to Target - Real-Time Data Streaming in the Insuran
    Under 10 Seconds from Source to Target - Real-Time Data Streaming in the Insuran
    Christian Nicoll, Generali Switzerland + Kai Waehner, Confluent + Christopher Knauf, Attunity Recorded: Dec 13 2018 52 mins
    Speakers: Christian Nicoll, Director of Platform Engineering & Operations, Generali Switzerland + Kai Waehner, Technology Evangelist, Confluent + Christopher Knauf, DACH Sales Director, Attunity

    Insurance companies are facing similar challenges like all other disrupted market segments like the change of customer expectations and hence the need of differentiating itself new as a brand in a challenging market environment. But at the same time, it underlies a very strict regulatory pressure.

    Generali Switzerland, as many market leaders in every industry, have understood the power of data to reimagine their markets, customers, products, and business model and managed this change by building their Connection Platform within one year.

    Christian Nicoll, Director of Platform Engineering & Operations at Generali Switzerland guides us through their journey of setting up an event-driven architecture to support their digital transformation project.

    Attend this online talk and learn more about:
    -How Generali managed it to assemble various parts to one platform
    -The architecture of the Generali Connection Platform, including Confluent, Kafka, and Attunity.
    -Their challenges, best practices, and lessons learned
    -Generali’s plans of expanding and scaling the Connection Platform
    -Additional Use Cases in regulated markets like retail banking
  • A Recap of re:Invent 2018: NEW AWS Services and Announcements
    A Recap of re:Invent 2018: NEW AWS Services and Announcements
    Matt van Zanten, DevOps Engineer, Onica Recorded: Dec 13 2018 26 mins
    Didn't make it to re:Invent 2018? Missed some of the key announcements? We got you! Join us for our 60 minutes webinar which will take you through key new AWS announcements including AWS RoboMaker, AWS Timestream and AWS IoT Events hosted by Onica's Matt van Zanten, DevOps Engineer.

    Here's what we will cover:
    -Net New Industry Services to AWS like AWS RoboMaker and AWS Ground Station
    -New Windows improvements and services such as Amazon FSX for Windows File Server
    -Additions and expansions to Serverless computing including Firecracker and AWS Lambda Layers
    -AWS IoT events and Onica’s involvement as a launch partner leveraging IoTanium
    -New management & governance services like the AWS Well-Architected Tool, AWS Control Tower and AWS Security Hub that make it easier for users to take on AWS on their own.
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Recorded: Dec 13 2018 57 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, Kong Recorded: Dec 13 2018 49 mins
    With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.

    As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.

    In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.

    Webinar takeaways:

    - Learn about the three forces leading us towards cloud-native first architectures
    - Understand how we got here – the milestones marking the maturity of Kong
    - Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
    - Why you need a solution that can support all of your deployment patterns.
  • The Future of Backup Isn't Backup
    The Future of Backup Isn't Backup
    Steve Blow Recorded: Dec 13 2018 34 mins
    Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.

    Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
  • Game Thinking for Rapid Innovation
    Game Thinking for Rapid Innovation
    Amy Jo Kim Recorded: Dec 13 2018 56 mins
    How are market-leading products born? What conditions set the stage for successful innovation?

    By definition, successful innovations reach a mainstream audience. But they never start off that way. That’s the paradox of innovation: the “typical” people in your market are not the same ones you need to “woo” when bringing your idea to life.

    That’s where Game Thinking comes in. Game Thinking is a proven system for accelerating innovation and creating products that people love...and keep loving. Game Thinking empowers product leaders, designers and entrepreneurs to engage customers deeply over time - using design techniques from hit games. Learn how to create products that empower your customers to get better at something they care about -- like playing an instrument or leading a team. Building on the principles of lean/agile design and design thinking, Game Thinking delivers powerful strategies that help you:
    Keep customers engaged with a coherent, compelling journey to mastery
    Build a product customers love using insights from high-need Superfans
    Rapidly improve your product concept by testing and tuning the core experience
    Build the right MVP for your product using the Game Thinking roadmap

    If you want actionable insights that will help you innovate faster & smarter, you won’t want to miss this fast-paced, informative talk.
  • The Complete Guide to Crowdsourced Security Testing
    The Complete Guide to Crowdsourced Security Testing
    Rajesh Krishnan, Product Marketing, Synack Recorded: Dec 13 2018 22 mins
    Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.

    Join this webinar to learn:
    - Why crowdsourcing hackers and bug bounty is trending
    - Who these crowdsourced hackers are and what they do
    - Where crowdsourced security programs differ
    - How to decide what crowdsourced programs best fit your organization
    - Where the future of crowdsourced security is heading
  • Distributed Machine Learning with H2O on Containers
    Distributed Machine Learning with H2O on Containers
    Vinod Iyengar, Sr. Director, Alliances, H2O.ai; Nanda Vijaydev, Sr. Director, Solutions, BlueData Recorded: Dec 13 2018 59 mins
    Join this webinar to learn about deploying H2O in large-scale distributed environments using containers.

    Artificial intelligence and machine learning are now a top priority for most enterprises. But it can be challenging to implement multi-node AI / ML environments for data science teams in large-scale enterprise deployments.

    Together, BlueData and H2O.ai deliver a game-changing solution for AI / ML in the enterprise. In this webinar, discover how you can:

    -Quickly spin up containerized H2O and Driverless AI environments whether on dev/test or production
    -Ensure seamless support for H2O running on CPUs or GPUs, and provide a secure connection to your data lake
    -Operationalize your distributed machine learning pipelines and deliver faster time-to-value for your AI initiative

    Find out how to run AI / ML on containers while ensuring enterprise-grade security, performance, and scalability.
  • Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics
    Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics
    Adam Satterfield, Technology Program Director at Anthem and Ryan Yackel, Director of Product at QASymphony Recorded: Dec 13 2018 56 mins
    In today’s hyper-competitive software market, companies are ever pressing to deliver products more quickly and efficiently. As a result, it is imperative for organizations to implement a more strategic approach to quality. A strategic approach requires QA teams to gather more comprehensive data on the value of quality tasks in the delivery pipeline. And it often requires a different approach to reporting, and a focus on metrics that help the business measure release readiness and assess overall application quality.

    Join us as Adam Satterfield shares the key metrics today’s software QA teams should be collecting, how to tell the story of your data and how to better understand different audiences within your organization to deliver insights that matter. Ryan Yackel will also dive into how some of these insights can be applied in qTest Insights.

    In this webinar, you will learn how to gather the metrics for 3 key areas to demonstrate business value, including:

    - The cost of a defect
    - Efficiency gains from test automation
    - Risk identification through coverage metrics
  • Chaos Engineering in a World of Distributed Spring Boot Apps
    Chaos Engineering in a World of Distributed Spring Boot Apps
    Russ Miles, Benjamin Wilms, Codecentric Recorded: Dec 13 2018 62 mins
    As developers, one of our primary goals is to develop stable, secure, and bug-free software that will not deprive us of sleep or keep us away from new and exciting topics. To accomplish these and other goals, we write unit and integration tests that alert us to unexpected behavior and ensure the patterns we test don’t lead to errors. However, today’s architectures contain many components that can’t be fully covered with unit and integration tests. Thus, servers and components we’re not aware of still manage to drag our entire system into the abyss.

    This issue led to the birth of the Chaos Monkey for Spring Boot. The inspiration was Netflix’s Chaos Monkey and the culture of Chaos Engineering. On an application level, we want the possibility to cause specific stress and error situations.

    This session will detail the possibilities and deployment scenarios of the Chaos Monkey for Spring Boot. You will also learn how well the ChaosToolkit works together with the Chaos Monkey for Spring Boot.


    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Codecentric Privacy Statement:
    https://www.codecentric.de/privacy-policy/

    This webinar:
    https://content.pivotal.io/webinars/dec-13-chaos-engineering-in-a-world-of-distributed-spring-boot-apps-webinar
  • The Great DevOps Debate: Evolution or Revolution?
    The Great DevOps Debate: Evolution or Revolution?
    Ed Adams, CEO and Roman Garber, Development & Security Manager Recorded: Dec 13 2018 63 mins
    DevOps continues to be a buzzword in the software development and operations world, but is it really a paradigm shift? It depends on what lens you view it through.

    Roman Garber, an active software security engineering and software team lead thinks so. Ed Adams, Security Innovation CEO, a 20-year software quality veteran and former mechanical engineer, curmudgeonly disagrees.

    Watch our on-demand session to decide which side of the fence you're on.
  • 4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    Yaacov Ben-Yaacov, CEO, Catch Media Recorded: Dec 13 2018 59 mins
    In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.

    Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.

    On this webcast you’ll learn:
    • Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
    • 4 steps needed to engage consumers, drive lifetime value and increase revenue
    • Why Catch Media chose Vertica for scale, performance, and flexibility
    • How businesses that embed Vertica can deliver higher value to customers
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Recorded: Dec 13 2018 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • 3 Key Essentials for Moving AV to the LAN
    3 Key Essentials for Moving AV to the LAN
    Brian Simmons, Copper Product Manager Recorded: Dec 12 2018 52 mins
    AV technologies are advancing rapidly, and the amount of video traffic crossing IP networks is growing at a rate of 25% every year. By 2021, it’s expected that one million minutes of video traffic will cross global IP networks every single second. With that kind of demand, it’s more important than ever to install an AV system that not only delivers flawless image quality with low latency but also delivers the scalability and flexibility needed to expand your system. Attend this webinar to learn best practices for enterprise AV systems.

    This webinar will cover:
    -AV technologies available today and on the horizon
    -Benefits of migrating your AV system to the IP network
    -How to select the right solution to avoid potential pitfalls.
  • Building cloud-native applications with a container-native SQL database in the p
    Building cloud-native applications with a container-native SQL database in the p
    Eamon McCormick manager, Emerging Technologies, Red Hat & Boris Bulanov vice president, Technology, NuoDB Recorded: Dec 12 2018 60 mins
    This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:

    Seamlessly deploy and manage applications in a modern architecture.
    Maintain the benefits of SQL and gain on-demand, horizontal scalability.
    Deploy a technology stack that facilitates efficiency and a DevOps structure.
  • Real Life Secrets and Best Practices of Processing Real-Time Data
    Real Life Secrets and Best Practices of Processing Real-Time Data
    Darren Chinen, Senior Director Data & AI, Malwarebytes and Priya Balakrishnan, Sr. Director of Product Marketing, Redis Labs Recorded: Dec 12 2018 56 mins
    Malwarebytes, the industry-leading anti-malware, and internet security software company, also leads in innovative threat intelligence. One such tool is the interactive remediation map, a worldwide security vulnerability.

    Join us to learn how Malwarebytes uses Redis Enterprise at the heart of their data streams to centralize and visualize data in real-time, providing global information on threats detected, how a virus is conceived and the eventual spread through the world. In this talk, Darren Chinen, Sr. Director, Data and AI at Malwarebytes, will illustrate their use of Redis Enterprise. In this webinar, you will learn to:

    - Drive analytics for heat maps and their threat intelligence tool
    - Capture global malware records and real-time streams and drive stateful transformation
    - Efficiently cache large amounts of data for interactive exploration of malware
  • Agile Portfolio Management: Three best practices
    Agile Portfolio Management: Three best practices
    Alan Wendt, Micro Focus Recorded: Dec 12 2018 59 mins
    DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.

    Join us to hear more about:
    • How lean thinking helps to meet changing business demands and speed up the decision-making
    • The limitations of annual-only portfolio planning cycles
    • The incredible power of aligning the work to the organization’s intended outcomes
  • 10 Things Every Developer Using RabbitMQ Should Know
    10 Things Every Developer Using RabbitMQ Should Know
    Jerry Kuch, Senior Principal Software Engineer & Wayne Lund, Advisory Data Engineer, Pivotal Recorded: Dec 12 2018 64 mins
    RabbitMQ is the most popular open-source message broker. It’s a de facto standard for message-based architectures. And yet, despite the abundant documentation and usage, developers and operators can still get tripped up on configuration and usage patterns.

    Let’s face it: some of these best practices are hard to capture in docs. There’s a subtle difference between what RabbitMQ *can* do, and *how* you should use it in different scenarios. Now is your chance to hear from seasoned RabbitMQ whisperers, Jerry Kuch and Wayne Lund.

    Join Pivotal’s Jerry, Senior Principal Software Engineer, and Wayne, Advisory Data Engineer, as they share their top ten RabbitMQ best practices. You’ll learn:

    - How and when—and when *not*—to cluster RabbitMQ
    - How to optimize resource consumption for better performance
    - When and how to persist messages
    - How to do performance testing
    - And much more!
  • The Evolution and Future of DevOps
    The Evolution and Future of DevOps
    Jonathan Sullivan, CTO Recorded: Dec 12 2018 45 mins
    At NS1, we see DevOps as helping improve scalability and the application delivery process as a whole. Despite its benefits, moving to DevOps can be a challenging undertaking, especially for organizations riddled with legacy applications and technology. Many companies fail to reap the benefits because making the shift requires substantial changes to culture, processes and the resulting toolset.

    As we move into 2019, the emergence of DevOps continues to be a part of a growing number of global enterprises. With the rise of this methodology, what new DevOps trends have yet to appear?

    In this panel we will cover:

    - What DevOps looks like at NS1
    - What has the evolution of DevOps looked like?
    - What are some of the remaining challenges left for DevOps to solve?
    - What we still see as lacking from the DevOps tool belt?
    - What is the future of DevOps?
  • IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    Kevin Prouty, Vice President, IDC Energy Insights Recorded: Dec 12 2018 46 mins
    In this IDC FutureScape presentation, the IDC Worldwide Oil & Gas team discusses the key predictions that will impact CIOs and IT professionals in the worldwide oil & gas industry over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • 10 Things to Consider When Implementing a Secure Message Center
    10 Things to Consider When Implementing a Secure Message Center
    Ally Cancino, DataMotion Recorded: Dec 12 2018 6 mins
    Are you considering implementing a secure message center in your business client portal? If you're in the insurance, healthcare, or financial services industry, this is definitely a good choice. In this video/slideshow learn about how secure message centers improve your customer service, increase customer satisfaction, make it easier for your employees to track and maintain message strings, and of course-- stay compliant! If you'd like more detailed information on implementing a secure message center, check out our whitepaper at: http://info.datamotion.com/implementing-secure-message-center-white-paper-1-0
  • Latest UK trends in Quality Assurance and Software Testing
    Latest UK trends in Quality Assurance and Software Testing
    Gary Moore, Vice President, Sogeti UK, Malcolm Isaacs, Sr. Solution Marketing Manager, Micro Focus Recorded: Dec 12 2018 47 mins
    The latest edition of the World Quality Report 2018-19 analyses responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discussed the trends shaping QA and testing today, along with recommendation for addressing tomorrow’s challenges.

    In this webinar, we will explore the findings for the UK and the capabilities required for:
    -Complex integration testing
    -Test automation across decentralized teams
    -Virtualization and the rise of containerized test environments

    Put your questions to our experts during the live Q&A and leave with a better understanding of what is top of mind for QA and testing professionals in the UK.
  • Illustrating the Systemic Risk Caused by Open Source Library Use
    Illustrating the Systemic Risk Caused by Open Source Library Use
    Tim Jarrett, Senior Director of Enterprise Security Strategy, Veracode Recorded: Dec 12 2018 48 mins
    How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.

    Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
  • Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Victoria Oiknine, Project Manager at WhiteSource Recorded: Dec 12 2018 6 mins
    Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!

    WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.

    Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
  • Why Is Open Source Use Risky?
    Why Is Open Source Use Risky?
    Adrian Lane, Analysis, Securosis Recorded: Dec 12 2018 43 mins
    When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.

    The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
  • Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Александр Аверин, технический консультант по управлению информацией Micro Focus в России и СНГ Dec 17 2018 8:00 am UTC 60 mins
    В рамках вебинара мы расскажем вам о новом функционале программных решений Micro Focus по резервному копированию и восстановлению данных (Data Protector) и аналитике систем резервированя данных (Backup Navigator)
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Dec 17 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Dec 17 2018 9:00 am UTC 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
  • Closing the DevOps/SecOps Security Gap
    Closing the DevOps/SecOps Security Gap
    Bashyam Anant, Vice President Product Management, Cavirin Dec 17 2018 6:00 pm UTC 60 mins
    As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.

    In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.

    Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.

    Earn one CPE credit for attending this webcast.
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Dec 18 2018 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Julian Totzek-Hallhuber, Principal Solutions Architect at Veracode Dec 18 2018 10:00 am UTC 45 mins
    Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.

    Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
  • Smart Buildings, Smart Networks
    Smart Buildings, Smart Networks
    Limor Schafman, Mario Blandini, John Toomajon Dec 18 2018 4:00 pm UTC 75 mins
    Smart buildings are the building blocks that will enable society’s digital transformation. This revolution will leverage data from myriad devices to bring new insights and enable new products and services. Around the globe, the smart buildings technology market will explode 16.1% over the next five years from a 2018 market size of $30.5 billion. In this webinar we will look at the changes inherent in the digital evolution as well as the infrastructure solutions that will support them.
  • Streamline Testing in DevOps With Behavior Driven Development
    Streamline Testing in DevOps With Behavior Driven Development
    Kevins Dunne, SVP of Global Channels, QASymphony and Mike Scott, Principal Consultant, MagenTys Dec 18 2018 6:00 pm UTC 58 mins
    In this webinar, we'll highlight a popular testing methodology for DevOps: behavior driven development (BDD). We’ll discuss the history of BDD and its roots in test-driven development, its key principles and benefits for DevOps, and best practices for getting started with BDD and scaling the practice.

    In this webinar, you will learn:

    - How BDD enhances collaboration to streamline DevOps workflows
    - The key principles of BDD: Collaborate, record, automate
    - Tips for scaling BDD to drive business value in your organization
  • Unlocking data to deliver a unified bank: The SunTrust story
    Unlocking data to deliver a unified bank: The SunTrust story
    David Shonk, SVP EIS Enterprise Solutions Delivery Manager, SunTrust Dec 18 2018 6:00 pm UTC 55 mins
    Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up?

    The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge.
  • Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
    Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
    Marcelo da Cruz Pinto, Principal Engineer, McAfee; Paul Dickens, Product Manager, Kong Dec 18 2018 6:00 pm UTC 45 mins
    Almost four years ago, McAfee embarked in the transition towards microservices. They needed an API platform that could integrate with a very complex infrastructure built using multiple languages and methodologies. Additionally, they required this solution to be able to scale or contract with services, and the team to be able to integrate and build custom capabilities on top of it.

    Kong is now a critical element of McAfee’s infrastructure, enabling its microservices journey and supporting it as it becomes the largest cyber security solutions provider across the globe.

    During its journey, the team at McAfee identified three challenges that are common to microservices architectures. Marcelo da Cruz Pinto, Principal Engineer at McAfee, shares the strategies he implemented to manage and minimize these challenges.

    Join Marcelo, and Paul Dickens, Principal Product Manager at Kong while they discuss McAfee’s journey and strategies to manage the challenges that arise with microservices architectures.

    Webinar Takeaways:

    - Insights into the microservices journey at McAfee
    - Three strategies to manage challenges that typically arise when deploying microservices architectures
    - The true benefits of microservices
  • How to Accelerate Your GDPR Readiness
    How to Accelerate Your GDPR Readiness
    Argin Wong, Data Privacy and Compliance, Box | Vaishnav Gorur, Product Marketing, Box Dec 18 2018 6:00 pm UTC 21 mins
    GDPR has been in effect for a few months now and we are starting to see hefty fines being levied for non-compliance.

    In a recent survey, 80% of companies said they are still in the early stages of planning and initial implementation. Where are you in your GDPR journey?

    Join this session to learn how to show that you are processing data in accordance to the GDPR, how Box helps you address critical GDPR requirements and how to easily execute your self-serve Data Processing Addendum (DPA).
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Mike Larmie, Federal Solutions Architect, Synack Dec 18 2018 7:00 pm UTC 53 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Tackling Microservice Challenges with Istio
    Tackling Microservice Challenges with Istio
    John Osborne principal architect, OpenShift, Red Hat & Jason Dudash senior solutions architect, Red Hat Dec 18 2018 7:00 pm UTC 34 mins
    In this webinar, we'll discuss some tools that support the Istio initiative to build and secure resilient applications:

    Connect—resiliency, discovery, load balancing
    Manage—traffic control, policy enforcement
    Monitor—metrics, logging, tracing
    Secure—end-to-end authentication and authorization
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Optimizing Your AppSec Program with Veracode
    Optimizing Your AppSec Program with Veracode
    Brad Smith, Principal Security Program Manager, Veracode Dec 19 2018 5:00 pm UTC 45 mins
    Hear from one of our customer-facing Services experts to learn how you can leverage the Veracode platform to optimize your application security program. You will start with assessing and managing security risk across your entire application portfolio and gain additional insights into how Veracode can help you adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, you will come away practical guidance to integrating testing into the software development lifecycle- all the way to scaling an application security program using the Veracode cloud-based platform.
  • Why Your MySQL Needs Redis
    Why Your MySQL Needs Redis
    Roshan Kumar, Sr Product Marketing Manager, Redis Labs Dec 19 2018 5:00 pm UTC 57 mins
    If your application stores data in MySQL or any other relational database, you’ll benefit by inserting Redis in between your application and the database. By using Redis as a front-end database you can:

    1. Boost your application’s performance with minimal code changes
    2. Innovate faster; introduce new features and functions faster than ever before
    3. Scale your application with fewer additional resources
    4. Perform real-time analytics using built-in data structures of Redis

    Join this webinar to learn how you can:

    - Complement MySQL with Redis. Get tips for designing look-aside and write-through caching solutions, session stores, and rate-limiters.
    - Perform real-time analytics using built-in data structures of Redis
    - Scale your application with fewer additional resources
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Mike Cooper, Sr. Security Engineer Dec 19 2018 6:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Jim Bugwadia Dec 19 2018 7:00 pm UTC 60 mins
    In this episode of the Enterprise-Wide Kubernetes series, we will show
    how Nirmata makes it easy to integrate your Kubernetes clusters and
    workloads with Vault for enterprise grade secrets management.

    What to expect:
    1. Learn best practices for managing secrets in Kubernetes.
    2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
    3. Discover Nirmata integrations with Vault.
  • Handling Complex Data Integrations in Enterprise Apps
    Handling Complex Data Integrations in Enterprise Apps
    Jai Karve – Principal Solutions Engineer & Sebastian Witalec – Senior Developer Advocate Jan 3 2019 4:00 pm UTC 49 mins
    Demand for new apps keeps increasing, but integration challenges often slow the development process to a crawl. Developers are often left waiting for external teams to integrate with expanding numbers of disparate data sources and implement a variety of authentication schemes. Meanwhile, end users of mobile, web or chat don’t care about enterprise information architecture—they just want a seamless, connected experience.

    The Progress Kinvey platform helps developers deliver the experiences that customers demand faster using the tools and frameworks they already trust, while also:

    - Simplifying integration by providing a layer of abstraction for data virtualization
    - Providing enterprise authentication
    - Delivering mobile-specific features such as notifications and offline data access
    - Allowing developers want to use their standard and open frameworks and tools without having to learn a new or proprietary development stack

    Join us as we explore tackling complex data integrations for modern enterprise apps.
  • The DevOps Revolution at Global Payments
    The DevOps Revolution at Global Payments
    Nick Jones, VP Software Delivery Acceleration and Test Engineering & Elise Carmichael, Vice President of Product, QASymphony Jan 3 2019 5:00 pm UTC 44 mins
    During this webinar, Nick Jones, Vice-President of Software Delivery Acceleration and Test Engineering at a leading payment processor, will share how the Test Engineering team led the organization's first DevOps initiative, gaining buy-in from stakeholders across the business to modernize software development, testing and delivery practices, ultimately reducing deployment time from 14 hours to 4 minutes. During the initiative's early days, the team established a Center of Excellence and a grassroots Community Practice to build trust and reinforce partnerships with development, senior leadership and business stakeholders. Both initiatives have helped improve collaboration and spread new ideas, tools and methods across the business. The result is DevOps pipelines that have significantly reduced delivery timelines and improved production quality, which successfully processes and settles millions of payment transactions daily.

    In this webinar, you will learn:

    - How the test engineering teams initiated the organization's first DevOps project
    - How establishing a Center of Excellence and Community Practice fostered a collaborative approach to transformation
    - How the test engineering teams have significantly reduced performance issues to achieve zero critical production defects
  • Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Daud Qazen storage specialist, , Red Hat & Ricky Nelson senior solution architect, Red Hat Jan 3 2019 7:00 pm UTC 47 mins
    In this webinar, we'll discuss a high-performing, cost-competitive hyperconverged infrastructure solution. Red Hat® Hyperconverged Infrastructure is the only open, integrated virtualization and software-defined storage solution. We'll cover:

    What it is and how it can help you.
    How it's different than what's currently in the market.
    A live demo creating a virtual machine (VM) from a GUI and with Ansible®, creating templates of VMs, and migrating a VM to a different host.
  • Cloudflare im Überblick
    Cloudflare im Überblick
    Christian Paulus, Head Produkt Marketing, Cloudflare Jan 7 2019 9:00 am UTC 68 mins
    Durch die rapide Akzeptanz der Cloud werden Internetanwendungen immer komplexeren DDoS-Angriffen, versuchtem Datendiebstahl und böswilligem Bot-Traffic ausgesetzt. Der Schutz von Anwendungen gegen Attacken führt von Natur aus zu zusätzlichen Performanceeinbußen, während gleichzeitig die Erwartungen an eine schnelle Performance und eine herausragende User Experience stetig steigen. Durch den Wandel hin zur öffentlichen Cloud erweisen sich hardwarebasierte Lösungen immer häufiger als ineffizient und Kunden wenden sich Content Delivery Networks und cloudbasierten Sicherheitsdiensten zu, um damit ihre Anforderungen erfüllt zu sehen.
  • ASX adopts new technology and adapts faster
    ASX adopts new technology and adapts faster
    Theresa Payne, Senior Manager Digital, ASX Jan 7 2019 4:00 pm UTC 19 mins
    Discover how the Australian Securities Exchange (ASX) improved reliability and costs for its digital platform. The organization needed to operate with high stability, security, and performance, but its legacy application server platform was becoming increasingly inconsistent, unstable, and expensive.

    With its new platform, ASX gained greater stability—and faster, more effective recovery for its web applications, allowing them to deliver an improved digital experience to their customers.
  • Black Duck Security Advisories (BDSA): Enhanced Vulnerability Data
    Black Duck Security Advisories (BDSA): Enhanced Vulnerability Data
    Jeff Michael, Senior Product Manager for Black Duck by Synopsys Jan 7 2019 5:00 pm UTC 60 mins
    Black Duck Security Advisories (BDSA) has been receiving great reviews from customers. Come learn about the great advantages of BDSA, migrating to BDSA, and have all your questions answered by Jeff Micheal.
  • Blue Cross Blue Shield NC Case Study: Bringing the business & IT together
    Blue Cross Blue Shield NC Case Study: Bringing the business & IT together
    Adam Hoover, Director of Digital Solutions, BCBS NC Jan 8 2019 4:00 pm UTC 14 mins
    Blue Cross Blue Shield NC recognized a business need: to better engage users in their coverage and claims process through an application called BlueConnect. However, the Blue Cross Blue Shield NC team faced a few challenges: How to align different teams within IT and across IT to build a new application? What kinds of methods and practices should the team utilize to ensure shared understanding across the business? What kind of cultural changes are needed for this team to work together effectively? How can we scale new ways of working in the business?

    In this session, Adam Hoover with Blue Cross Blue Shield NC will walk through his organization’s journey with Red Hat Open Innovation Labs to deliver innovation to market. He will discuss:
    • How to align disparate teams around a shared goal.
    • The importance of practices and culture to introduce a new way of working.
    • How to scale new ways of working in the business.