Browse communities
Browse communities
Presenting a webinar?

Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Whatever the reason for your data center transformation the challenges, complexities and costs associated with these projects can be daunting.

    Join this session where Andy Ebbs will discuss some of the technical challenges faced, the ways to overcome them and look at how the right solution can deliver projects on time at a much reduced cost.
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • You can’t afford to lose even 5 minutes of business due to downtime these days. In this webinar, we will discuss several new strategies available in the marketplace to keep your communications platform safe from network outages, natural disasters and even that rogue backhoe operator.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • For many organizations MS-SQL is the backend to many of their mission critical applications. The environment provides a cost effective foundation for an organization to develop custom designed solutions that drive the business forward. As MS-SQL has risen in importance, the demands on the storage infrastructure have also increased. MS-SQL needs a high performance, well-protected storage system that is also cost effective. To meet these requirements many organizations are now looking at flash storage.

    Join experts from Storage Switzerland and Tegile Systems as we discuss the various options that storage and MS-SQL administrators have as they begin to look for new ways to meet the MS-SQL challenge.
  • Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.

    In particular, the panel will discuss:
    •Whether Big Data necessarily increases the risk of a security breach
    •How to assess the risks associated with different types of Big Data solutions
    •How to avoid data breaches in a Big Data environment
  • Do you know how to calculate how your network downtime costs and the financial impact it has per location?

    Every hour of network downtime can cost companies between $250,000 and $1 million. How many hours of network downtime do you experience each month?

    When network connections fail, there is a loss of productivity, brand credibility and revenue – revenue that is likely lost to competitors. Whether your unplanned downtime is due to wired line outages or hardware failure, the cost of that downtime multiplied by expensive troubleshooting is simply too high.

    Many put off business continuity planning until a problem occurs, which tends to be more expensive than investing in a solution now. If your business cannot afford network downtime, join this webinar to learn about failover solutions and the benchmarking formula to calculate your cost of downtime.

    We are all guilty of procrastinating – and we all know the costs associated with procrastinating. Let us provide you with the solutions and tools to calculate the cost of downtime for your organization and the ROI a failover solution will provide.

    Attendees will learn how to:
    •Integrate wireless failover into existing network environments
    •Reduce the high costs of staying connected
    •Limit expensive truck rolls
    •Calculate your network downtime costs
  • If transforming your data center without service interruptions is imperative, join this session to learn about a tested and proven methodology, the DKGm, that will get you there. It has produced to date on time and on budget data center transformations without service interruptions 100% of the time.

    Join David-Kenneth Group’s Kristofer Mathisen as he presents the details of the DKGm, including its processes, procedures, tools and technologies for data center transformations.
  • Do you know where your data is? Backup isn't a simple matter of copying data to an offsite box each night anymore, especially if you're running hundreds of workloads on virtual servers.

    Do you know which files are located on which media? Can you restore data accurately and reliably, and how long will the job take? These are the questions that keep IT admins up at night, but we have the answers.

    Join this presentation as Rick Vanover will explain how to:

    · Integrate backup with virtualization management platforms

    · Protect virtual machines as well as data

    · Leverage cloud resources for backup and recovery

    · Optimize deduplication to keep backup workloads manageable

    · Recover individual files and app items with ease
  • Faster, less-expensive backups using in-the-wire deduplication is not only possible, but easier than you might expect. Our live webcast shows you how it’s possible — without disrupting mission-critical operations.

    Join storage analyst and vendor watchdog, Jon Toigo, along with Marc Mombourquette, a Dell data protection subject matter expert, for a hype-free examination of appliance-based data deduplication, and how it can benefit your production storage and backup environments immediately
  • Backup appliances vendors promise more confidence to IT professionals and a reduced total cost of ownership via all-in-one solutions. Backup software vendors promise a low initial purchase price and say that their offerings are “easy to use” using shrink-wrapped software. The problem? All the vendors seem to be hopelessly biased toward whatever they are selling.

    Join Unitrends – which uniquely offers all-in-one physical backup appliances and virtual backup appliances as well as other data protection software – for an irreverent, unbiased review of how you can make the best decisions not only for your company – but for you personally.
  • The Modern Data Center is the central part of many organisations today. Running critical applications, a robust virtual infrastructure and storage resources that hold the central unit of every organization: data. While the data center is dealing with increased demands and growth of data; there is an inherent need to make it available whilst keeping operational expense in check.

    Attend this webinar to see how a timeless practice, the 3-2-1 Rule, can be used to enhance the availability of the Modern Data Center.

    Specific points covered in this session include:

    - Which technologies can be used to deliver the best RTO and RPO with the 3-2-1 Rule
    - How can the replicated VM be part of 3-2-1 Rule strategy
    - Define the off-site element of a data center availability strategy
  • Businesses are struggling to keep up with unpredictable demands, extreme data growth, and aggressive service-level agreements related to application and data availability. IT management is changing, and there is need for greater application administrator control over backup and recovery. Research shows that most enterprises have not significantly updated their data protection processes in the last 5-7 years. This has resulted in highly fragmented environments with multiple copies of information owned and protected in silos—in turn elevating cost and complexity. The need is there, and customers are aware of current data protection shortcomings

    Join Tim Nolte for this webinar to understand how software and hardware can come together to deliver a joint backup, recovery and archiving solution
  • Whatever the reason for your data center transformation the challenges, complexities and costs associated with these projects can be daunting.

    Join this session where Ian Masters will discuss some of the top challenges faced, the ways to overcome them and look at how the right solution can deliver projects on time at a much reduced cost.
  • Managing data has entered a higher realm. Enterprises are looking for a flexible approach to data management to move, store, protect, and recover data – without tying their business to specific hardware, network or interconnect protocols. Migrating data from old legacy platforms to new ones and having too many complex incompatible tools present challenges. Businesses need converged data services that work horizontally as well as modernizing data storage without “rip and replace.” FreeStor is the new paradigm in data services. With the brilliance of a single, software-defined platform that works across legacy, modern and virtual environments, IT managers can tap the smartest data solutions from one pane of glass.

    Peter McCallum from FalconStor will discuss the following topics on April 28th at 3:00pm:

     True Software Defined Storage and its impact on a hybrid datacenter

     How Intelligent Abstraction merges legacy and modern infrastructure for optimized IT processes

     Rethinking how we provision, protect, and recover data resources, and how that impacts your

    business.

     FalconStor in the modern datacenter: meeting you where you are, and getting you to where you

    want to be.
  • How often have you heard, “We don’t need a Business Continuity Plan because Everyone Can WFH (Work From Home)!” How many times has this oft-quoted bromide been an excuse for lack of proper planning? How many times has this strategy been proven to be inadequate? Who will be the next organization to learn the hard way? Will it be yours?
    In this discussion you will learn:
    · The common myths about working remotely

    · The pitfalls and problems you will encounter

    · Why WFH is an essential but not complete solution

    · Lessons learned from practice – and actual – mass Work From Home events

    · How to strengthen your WFH strategy and mitigate the shortcomings
  • For years vendors have been trying to drive down the cost of flash so that the all-flash data center can become reality. The problem is that even the rapidly declining price of flash storage can’t keep pace with the rapidly declining price of hard disk. As a result data that does not need to be on flash storage has to be stored on something less expensive. But does that less expensive storage need to be another hard disk array or could it be stored in the cloud?

    In this webinar join Storage Switzerland’s founder George Crump and Avere Systems CEO, Ron Bianchini for an interactive webinar Using the Cloud to Create an All-Flash Data Center.

    In this webinar you will learn:

    1. The Challenges to Building an All-Flash Data Center

    2. The Challenges to using On-Premise Hybrid Arrays

    3. The Cloud Answer

    4. The Three Steps to a truly All-Flash Future

    A. Identifying Data

    B. Designing The Right Infrastructure

    C. Implementing That Infrastructure

    Register today to learn how you can create an all-flash data center today, and be able to afford it. As always, we will leave plenty of time for an extensive Q&A session, so tune in to get your flash and cloud storage questions answered by our panel of storage experts. All registrants will also be able to access Storage Switzerland’s extensive library of on-demand webinars, many with exclusive white papers, without having to re-register.

    Special Offer: All pre-registrants for this webinar will receive a copy of Storage Switzerland's latest white paper "How Cloud can enable the All-Flash Data Center" emailed after they register.
  • The road to data center efficiency is paved with good intentions…but littered with unintended consequences. In this presentation, Chris Crosby will discuss how the industry-wide drive to increase data center efficiency by data center operators, end users, IT equipment manufacturers and others can ironically lead to major inefficiencies and dysfunction that go directly against the objects of these efforts. Crosby will discuss how high-density server architecture, government regulations, virtualization and other efficiency-minded initiatives are resulting in unexpected challenges and negative results. Crosby will also talk through approaches to achieving data center efficiency that avoid these unintended consequences.
  • In today’s economy, companies need to be highly focused on managing costs. Strategies involving far-flung suppliers with single-source, just-in-time contracts and outsourced manufacturing and assembly agreements are aimed at reducing costs and boosting the bottom line. This type of procurement strategy may increase profit margins, but it also significantly raises the risk and potential impact of an unexpected disruption in the supply chain. This is particularly true when little is known about key and critical suppliers and their business continuity plans.

    The most recent port slowdown in the US had global ramifications. Eight months of failed labor talks with longshore workers have brought West Coast port congestion to a breaking point.

    It is no wonder that the results from the most recent BCI/BSI Horizon Scan report showed that Supply chain disruption has risen by 11 places from 16th last year. As a global economy with so many interrelated processes, it is imperative that we evaluate and address third party risk with the utmost urgency in order to find a way to mitigate and manage them.

    Approaches to addressing risk can vary greatly with what types of risk are considered acceptable along with the methods chosen to mitigate and minimize potential impacts. Assessing critical suppliers as well as those downstream Tier 2 and Tier 3 providers is a critical part of doing business in a globalized marketplace. Objective evidence of compliance, such as certification to international business continuity standards like ISO 22301, as well as updating supplier information on a regular basis is quickly becoming part of the initial screening process for choosing suppliers and maintaining a level of confidence and transparency.

    Join us as we discuss best practice business solutions.
  • FREESTOR™
    Software-Defined Storage
    The power to seamlessly migrate, recover, protect, and deduplicate data - on or off the cloud - without tying your business to specific hardware, networks or protocols.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
  • FREESTOR™
    Software-Defined Storage
    The power to seamlessly migrate, recover, protect, and deduplicate data - on or off the cloud - without tying your business to specific hardware, networks or protocols.
  • Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,

    The webinar will be led by Ian Beale, Senior Director, CEB Risk
  • The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.

    Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.


    Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.

    The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.

    Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
  • Is Software Defined Storage (SDS) getting hijacked? It seems every vendor, old and new, is claiming that their storage is “software defined”. The original intent was to create software-only solutions that could be deployed on the customer’s choice of servers. But that original intent has evolved, and now hardware vendors are providing what they claim to be software defined storage solutions too. In addition, SDS is being combined with an embedded compute function to create hyper-converged solutions as well.

    In this webinar we will discuss the differences in these approaches and you will learn what the four key deliverables of a SDS solution should be so you can decide which makes the most sense for your organization.
  • Join us in a series of fast-paced and informative 60-minute webinars on vSphere Virtual Volumes (VVol). In this session, the Taneja Group will talk with David Glynn from Dell Storage. VVols is packaged as a feature in nearly all VMware vSphere Editions and is being embraced by VMware’s storage partners an unprecedented rate. IT professionals, especially those involved in datacenter operations, are showing great interest in implementing VVol in their own environments. The Taneja Group will discuss VVol technology with David and the impact this game-changing capability will have in the datacenter and how Dell is enabling this technology with their arrays. Attendees will be encouraged to submit their questions during the session.
  • If you’ve ever felt alone with your data protection frustrations, this webcast will prove you’re not ― and that there are some simple, real-world strategies that’ll make your job a whole lot more enjoyable. We’ve put together a panel of IT professionals from a range of industries ― including a network engineer, an IT director and a CTO ― to share with you what worked for them, and what didn’t, when it comes to data protection. You’ll get to hear about the common struggles they shared and the best practices that empowered them to stop wasting time and energy on slow backup and recovery processes.

    By the end of this educational webcast, you’ll be able to:

    •Manage the gap between users who expect "always on" and the reality of system downtime.
    •Overcome the headache of administrative challenges.
    •Modernize your data protection strategy while keeping costs low and meeting requirements.
  • What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
  • Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices. Hadoop clusters can use a mix of solid-state and spinning disk storage, while Hadoop compatibility layers and connectors can use enterprise storage systems or share storage between Hadoop and legacy applications.

    In this webinar, 451 Research Director Matt Aslett will review the storage options available to Hadoop architects and provide recommendations for each use case. WANdisco's Randy DeFauw will then present an active-active replication option that makes data available across multiple storage systems.
  • For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?

    The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.

    There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.

    Attendees will learn:
    • The basics of Disaster Recovery and accessibility of your data
    • How to extend your DR strategy all the way to the desktop
    • DaaS deployment best practices
  • Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?

    Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:

    -Top peer challenges, according to leading industry research
    -What the future holds for the competing data storage architectures
    -The difference between converged and hyper-converged infrastructures
    -Best and worst use case for SDS

    How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
  • Organizations need to be more business-centric in their approach if data loss prevention is to be successful. By supplying McAfee Data Loss Prevention (DLP) with reliable insight into the meaning and value of data, Classifier complements the detection methods based on keywords and regular expressions alone, helping reduce the risk of data- loss.

    The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of DLP decision making, improves system effectiveness and reduces false positives.

    In this webinar we will explore:

    - The role of user-driven classification
    - How user-driven classification benefits DLP
    - When to introduce user-driven classification into a DLP project
    - How to measure and monitor the benefits of user-driven classification
  • If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • ISO 31000 was published as a standard on the 13th of November 2009, and provides a standard on the implementation of risk management. A revised and harmonised ISO/IEC Guide 73 was published at the same time. The purpose of ISO 31000:2009 is to be applicable and adaptable for "any public, private or community enterprise, association, group or individual."[3] Accordingly, the general scope of ISO 31000 - as a family of risk management standards - is not developed for a particular industry group, management system or subject matter field in mind, rather to provide best practice structure and guidance to all operations concerned with risk management.
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
  • With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

    Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.

    To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
  • Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • Rapidly deploy and dynamically manage secure networks at geographically distributed stores, branch locations, and on the road with Cradlepoint’s Enterprise Cloud Manager. This innovative cloud platform is the next generation management and application platform that helps you improve productivity, increase security and network reliability, and reduce costs; all while enhancing the intelligence of your network and business operations.

    The webinar is a cloud presentation and live product demonstration.

    Attendees will learn how to:
    •Set up and configure groups of devices for “zero-touch” installation and continuous remote management.
    •Troubleshoot their network, limit truck rolls, and reduce downtime
    •Perform remote diagnostics – status reports, error logs, and alerts
    •Easily upgrade firmware on multiple routers at once
    •Use next generation Out-of-Band Management through the cloud
    •Implement best-in-breed security applications from the cloud