Hi [[ session.user.profile.firstName ]]

Application Management

  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Recorded: Aug 21 2019 49 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Automating Operations: Impact of  AI, Machine Learning and Low-Code Development
    Automating Operations: Impact of AI, Machine Learning and Low-Code Development
    Phil Simpson Senior Principal Product Marketing Manager, Red Hat Prakasha Aradhya Director of Product Management, Red Hat Recorded: Aug 21 2019 49 mins
    Business process automation technology is rapidly emerging as a key to success in digital transformation projects. Automation is no longer just a set of business operations workflow items. A collaborative convergence of analytics, artificial intelligence or machine learning (AI/ML), robotic process automation (RPA), low-code development, etc. is changing the marketplace. Businesses are recognizing the value of this unified view in automating operations and decisions to improve the efficiency and agility of business operations—and thereby competitiveness and the bottom line.

    Join us for this session, where we'll explore:

    -Exploiting data analytics to make well informed decisions.
    -Building intelligent, context-sensitive applications.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Recorded: Aug 21 2019 57 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Recorded: Aug 21 2019 53 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Recorded: Aug 21 2019 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Cath Goulding on Digital Transformation
    Cath Goulding on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video Cath Goulding, CISO at Nominet, talks of her experiences and provides her perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • James Stickland on Digital Transformation
    James Stickland on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video James Stickland, CEO, at Veridium talks of his experiences and provides his perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Charlie McMurdie on Digital Transformation
    Charlie McMurdie on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video, cyber security expert, Charlie McMurdie, talks of her experiences and provides her perspectives on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Recorded: Aug 21 2019 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Recorded: Aug 21 2019 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Protecting your Portal from File-based Malware
    Protecting your Portal from File-based Malware
    John Stevenson Recorded: Aug 21 2019 32 mins
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Sameer Parulkar, Senior Product Marketing Manager, Red Hat Sameer Parulkar is a Senior Product Marketing Manager for Red Hat Recorded: Aug 20 2019 57 mins
    The need for competitive advantage has driven organizations towards cloud computing, agile programming, and the move toward DevOps unification; and, it’s forced the modernization of IT architecture using innovative technologies such as containers, microservices, and artificial intelligence.

    But unintended consequences now burden organizations with disaggregated IT infrastructure composed of redundant data centers, multi-clouds, managed services, edge computing, devices, and things. To cope, business and IT leaders must conceptualize new agile means to integrate workloads across highly distributed and disparate hybrid multi-cloud architecture.

    During this webcast we discuss:
    - the fundamental elements of strategic analysis and techniques needed to create new competitive advantage
    - how to identify the essential technologies needed for the modern digital business
    - how next-generation hybrid integration platforms can support strategic and transformative initiatives
    - how some customers have embarked on this journey and their learnings
    - the strategy and practices needed to enable and deploy agile integration in the hybrid multi-cloud era
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Recorded: Aug 20 2019 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Recorded: Aug 20 2019 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • Security Tool Misconfiguration and Abuse
    Security Tool Misconfiguration and Abuse
    Thomas Richards, Network and Red Team Practice Director Recorded: Aug 20 2019 40 mins
    As any security program matures, it will use tools and techniques to automate processes to improve the security posture of the organization. This includes asset management and discovery, patch management, deploying software, and vulnerability discovery. However, if these tools are improperly configured, they can lead to a total compromise of your network by an attacker. In this talk we will go over a few case studies of abusing these tools while on penetration tests as well as remediation methods to prevent these attacks from occurring.
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Recorded: Aug 20 2019 58 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Transformation towards digital and automated ordering process
    Transformation towards digital and automated ordering process
    Katherine Gilbert-O'Neil, Anand Sagar- Wipro | Neil Becker, Lokesh Verma- Apttus Recorded: Aug 20 2019 65 mins
    Wipro and Apttus on Cognitive Commerce & CPQ
  • Driving Increased Productivity with Your Vulnerability Management Program
    Driving Increased Productivity with Your Vulnerability Management Program
    Tori Sitcawich, Product Marketing Manager, Rapid7 Recorded: Aug 20 2019 46 mins
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    Elisabeth Thomas, Mohan Kompella, Christoph Goldenstern, Beverly Weed-Schertzer Aug 22 2019 3:00 pm UTC 60 mins
    As AI-enabled tools continue to make a mark on IT operations, the face of proactive problem and incident management in the enterprise is starting to change.

    From making IT staff roles’ easier to encouraging self-service, there is a broad range of AI-powered solutions on offer. Join leading ITSM experts as they debate the complexities, functionalities, benefits and considerations of next-generation cloud and hybrid problem and incident management tools.

    Moderator: Elisabeth Thomas, Launch Product Marketing
    Panellists: Christoph Goldenstern - VP, Kepner Tregoe; Mohan Kompella - VP, BIgPanda and Beverly Weed-Shertzer - ITSM Author
  • Meraki Automation – Multi-Org Management
    Meraki Automation – Multi-Org Management
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Aug 22 2019 3:00 pm UTC 45 mins
    Meraki’s Dashboard is a great and powerful tool for network management and monitoring but it’s limited by the very thing that makes it powerful; it has to be everything to everyone and that granularity can make it overwhelming to use on a day-to-day basis. All enterprises, large and small, have their own way of doing things and this pertains to network management and monitoring as well. In this session, you’ll be introduced to APIs, code, and tools that will allow an organization to build out dynamic interactions with the Meraki platform that aligns with the way that their teams do the business of networking.
  • WebRTC and You
    WebRTC and You
    Adam Bavosa Aug 22 2019 4:00 pm UTC 20 mins
    Have you ever thought about building your own Skype or Google Hangouts video chat? It is necessary in futuristic connected shared experiences. Here’s the easy way to do it!
    Adam will go over: - What WebRTC is - Why it is important for developers - How it works - The necessary code to integrate WebRTC into a video chat app - and finally, write a simple website that uses WebRTC. Audience members need only a basic understanding of front-end web development to be engaged.
    PubNub has been an essential resource for WebRTC app development since its inception. Adam Bavosa has taken it upon himself to learn how to develop thoroughly with PubNub and WebRTC, so he can spread the word, and reduce friction for developers building video chat.
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Gigamon Part #2 - Unleash the Power of True Application Visibility
    Gigamon Part #2 - Unleash the Power of True Application Visibility
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator) Aug 22 2019 5:00 pm UTC 60 mins
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Brian McClain, Assoc. Principal Product Marketing Manager & Tyler Britten, Sr. Principal Technologist, Pivotal Aug 22 2019 5:00 pm UTC 60 mins
    As the popularity of microservices continues to rise, so does the need for an efficient means of intercommunication. Features such as service discovery, client-side load balancing, and circuit breakers become invaluable tools as the complexity of your landscape grows. Thus, the rising popularity of the service mesh as means of delivering those capabilities.

    While this technology space is still young, Istio and Envoy have already become the tools that many use to solve these problems. The Pivotal Application Service (PAS) integration with these solutions introduced weighted routing and guaranteed service identity—and now we’re bringing these features to Pivotal Container Service (PKS) via the new Pivotal Service Mesh.

    In this webinar, we’ll explore why a service mesh matters and how Pivotal Service Mesh works, and we’ll give you a sneak peak into its future.
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Aug 22 2019 5:00 pm UTC 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Aug 22 2019 6:00 pm UTC 60 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Forrester Research: Why agile integration is critical to digital transformation
    Forrester Research: Why agile integration is critical to digital transformation
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research Aug 23 2019 3:00 pm UTC 32 mins
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research discusses the importance of agile integration in digital transformation initiatives. Recorded during Red Hat's Microservices, Containers, API's an Integration Day on May 21, 2019 in Chicago, IL.

    About the speaker:
    Jeffrey helps CIOs and digital leaders succeed by working with them to improve their software delivery capability and by helping them assess the relevance of emerging software technologies. As a 25-plus-year software industry veteran, he's helped clients improve their development shop culture, apply Agile and continuous delivery best practices, and build successful developer ecosystems.
  • Platform of the Future - Efficiency (Part 5)
    Platform of the Future - Efficiency (Part 5)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 27 2019 1:00 am UTC 9 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • SSL Visibility with SSLO Orchestrator
    SSL Visibility with SSLO Orchestrator
    Peter Silva - Senior Solutions Marketing Manager Aug 27 2019 8:00 am UTC 8 mins
    Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 1:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • How Syniti delivers on the journey to SAP S/4HANA Central Finance
    How Syniti delivers on the journey to SAP S/4HANA Central Finance
    Susan Nee, Sr. Value Engineer at Syniti Aug 27 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP Advanced Data Migration for SAP Central Finance. See how to complete and maintain your SAP Central Finance program, allowing you to centralize your financial data and post to the supporting financial source systems. Using Syniti’s proven solutions and agile methodology will result in a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your organization.
  • 10 Tips for Achieving Cultural Change in DevOps
    10 Tips for Achieving Cultural Change in DevOps
    Jeffrey Martin (Director of Product, WhiteSource) Aug 27 2019 3:00 pm UTC 60 mins
    DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
  • Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat Aug 27 2019 3:00 pm UTC 55 mins
    Successful companies are measuring success from "idea to execution" in weeks and months. Getting there means navigating nearly unlimited technical choices, for both application and operations teams. Learn how leading companies are making the right choices for their Hybrid Cloud, to drive new market opportunities and greater business success.

    Brian Gracely (@bgracely) is Director of Product Strategy at Red Hat, focused on OpenShift. He brings 20+ years of experience in Strategy, Product Management, Systems Engineering, Marketing and M&A. He is recognized as an industry thought-leader in Cloud Computing and DevOps, as well as being co-host of the award-winning podcast, The Cloudcast (@thecloudcastnet) and weekly Kubernetes podcast @PodCTL.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat
  • Kickstarting appdev on OpenShift in 5 minutes
    Kickstarting appdev on OpenShift in 5 minutes
    Andre Lee Rubinger, Software Engineering Manager, Red Hat Aug 27 2019 4:30 pm UTC 55 mins
    This session explains how Red Hat fixed cloud application creation. We'll introduce a simple, yet comprehensive, way to build and deploy new applications on Red Hat OpenShift Container Platform in under 5 minutes. We'll demystify common appdev tasks on Red Hat OpenShift Container Platform by uncovering the basics tenants. Join this session to:

    - Create a new modern, front-end application, built with NPM/Yarn and served as static files.
    - Provision a new database or messaging system.
    - Share authentication information between application code and connected services.

    Come ready to dig under the covers and start to learn the cloud development concepts behind our simplified getting started flows.
  • Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Daniella Pontes, Senior Manager of Product Marketing at InfluxData, Jason Bloomberg, President of Intellyx Aug 27 2019 5:00 pm UTC 60 mins
    Kubernetes is more than a container orchestration platform. It’s a harbinger of a new paradigm for IT we’re calling cloud-native computing.

    The cloud-native world recognizes that containers and microservices are inherently ephemeral, and that the massive scalability and performance we expect from applications and services depends upon that ephemerality.

    Monitoring such radically dynamic environments is nothing like IT monitoring used to be. Statelessness, real-time behavior, and abstractions that drive configurations, security, and integration are core to cloud-native computing. These all require a fundamentally different approach to monitoring in order to provide the visibility and control that organizations require to keep this new infrastructure paradigm working at full bore.

    Join Daniella Pontes, Senior Manager of Product Marketing at InfluxData and Jason Bloomberg, president of industry analyst firm Intellyx, for a provocative discussion of the new cloud-native computing paradigm and the monitoring challenges organizations face.

    Attendees of this webinar will:

    -Gain a broad understanding of what it means to be cloud-native

    -Understand the particular monitoring challenges cloud-native infrastructures present

    -Learn how InfluxData’s cloud-native TICK Stack centered on its InfluxDB purpose-built time-series database was built from the ground up to resolve the monitoring challenges organizations face as they move to cloud-native infrastructure.