Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Data Center Outage Trends, Causes and Costs
    Data Center Outage Trends, Causes and Costs
    Andy Lawrence, Executive Director of Research; Chris Brown, CTO; Todd Traver, VP IT Optimization & Strategy Recorded: Jan 23 2019 59 mins
    Members of Uptime Institute’s executive team discuss the newest findings about data center outages, including trends in causes and types, along with strategies for reducing the number and impact of outages.
  • Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Marco Riboli, VP Southern Europe di FireEye Recorded: Jan 23 2019 36 mins
    Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.

    Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:

    •Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
    •Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
    •Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa

    Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
  • The Software-Defined Data Center: A Foundation for Digital Transformation
    The Software-Defined Data Center: A Foundation for Digital Transformation
    David Hines, Vice President of Architecture and Engineering - TierPoint Recorded: Jan 22 2019 47 mins
    As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.

    A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.

    Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
  • Are your Data Management Tools and Processes Scalable for a Multi-cloud World?
    Are your Data Management Tools and Processes Scalable for a Multi-cloud World?
    Tony Liau, Veritas & Matt Sirbu, Softchoice Recorded: Jan 22 2019 41 mins
    Digital transformation is causing infrastructure to evolve faster than ever and managing data must be the top priority for any modern enterprise. Most organizations are working towards transforming their IT infrastructure and its associated capabilities, but traditional environments are being disrupted by cloud, virtualization, open source and hyper converged infrastructure. The need for holistic modern data management remains as crucial as ever to navigate this complexity and leverage information for strategic advantage.

    Join us on this webinar as Tony Liau, Director, Product & Solutions Marketing at Veritas Technologies and Matt Sirbu, Director of Data Management & Data Center Infrastructure at Softchoice discuss how the most important barrier to adopting hybrid IT is to have an intuitive data management solution.

    Attendees of this webinar will learn how you navigate through these IT obstacles to build an agile solution that extends across on-prem and off-prem architectures.

    About the speakers:

    Tony brings over 15 years of enterprise experience to Veritas, taking innovative data management solutions to market. In his current role as Director and Head of Product & Solutions Marketing for Data Protection and management, he leads product launch, go-to-market and global campaign strategy. Before joining Veritas, Tony held senior roles at other data protection and security companies such as Barracuda Networks, Symantec and Cisco.

    Matt Sirbu has spent over two decades in Information Management; focusing on Data Center Optimization, Protection, Availability and Data Intelligence solutions. Having covered most market segments across North America, he has demonstrated an ability to enter new industries, learn their unique requirements, and develop comprehensive strategic direction with exceptional results. He joined Softchoice in July of 2015, coming from Dell where he was the Director of Storage Strategy for North America.
  • Tech Tuesday: Using the Swarm Object Storage Content Portal UI
    Tech Tuesday: Using the Swarm Object Storage Content Portal UI
    John Bell, Sr. Consultant & Brian Guetzlaff, Engineering Manager Recorded: Jan 22 2019 55 mins
    In this webinar, John Bell and Brian Guetzlaff will explore the advanced capabilities of Caringo Swarm’s Content Management API, including managing user access, usage and content (using collections and metadata). They will provide a live demonstration and show you how to use the Swarm Object Storage Content Portal User Interface (UI). Attendees will also have the opportunity to ask questions throughout the webinar.
  • The Game-Changing Impact of Gigabit-Class LTE on Enterprise Networking
    The Game-Changing Impact of Gigabit-Class LTE on Enterprise Networking
    Donna Johnson, Vice President of Product and Solution Marketing, Cradlepoint Recorded: Jan 22 2019 41 mins
    With the arrival of Gigabit-Class LTE network solutions for enterprises and public safety agencies, the era of wireless WAN is here — and enterprise networking will never be the same. Utilizing Elastic Wideband technology, Cradlepoint’s new cloud-managed routers featuring built-in Gigabit-Class LTE modems provide the speeds, reliability, and flexibility necessary to drastically improve existing use cases, and to enable new ones that have never been possible in branch or vehicle settings.

    With game-changing Gigabit-Class LTE, which leverages technologies that are foundational pieces of 5G, wireless now meets or exceeds other broadband networks, but with the added value of mobility, immediate deployment, and standardized billing on a single nationwide carrier.

    Join Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore how the world’s first Gigabit-Class LTE solutions for enterprise networking can revolutionize wireless WAN and put organizations on the Pathway to 5G.
  • Digital Trust in the Age of Normalized Data Breaches
    Digital Trust in the Age of Normalized Data Breaches
    Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & Sullivan Recorded: Jan 22 2019 44 mins
    In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.

    With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.

    Key Takeaways:

    • Do perceptions of customers in the business community align with consumer reality?
    • What makes (or breaks) consumer digital confidence in organizations?
    • Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
  • Why is DNS so important?
    Why is DNS so important?
    Nominet Cyber Security Recorded: Jan 22 2019 3 mins
    The domain name system (DNS) is at the heart of everything we do.

    The internet has grown up around this signposting system that allows us to browse the web and allows applications and programs to find the systems they need to operate. We couldn’t do without it.

    This short film shows how the DNS works and explains why it’s exploited by cyber criminals. That makes it the perfect place for us to detect signs of cyber threats and protect organisations against them.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • How GameStop Leverages the Cloud to Meet SLAs
    How GameStop Leverages the Cloud to Meet SLAs
    Jon Gery International IT Manager, GameStop and Seyi Verma Product Marketing Director, Druva Recorded: Jan 22 2019 51 mins
    GameStop, a global Fortune 500 company (NYSE: GME), needed an efficient cloud backup and recovery solution to meet business continuity requirements across its 7,200 retail stores in 14 different countries. The company had a myriad of virtualized environments with over 250TB of data but its on-premises backup infrastructure and procedures were so complex and inefficient, that GameStop was unable to meet business continuity SLAs.

    GameStop turned to Druva, and secured its data in enterprise server workloads and virtual environments through Druva Phoenix. Register for this webinar with special guest speaker Jon Gery, International IT Manager at GameStop, to hear how the company was able to:

    - Unify global data protection requirements within a single system
    - Increase the backup footprint of virtual machines by 20%
    - Easily achieve their business continuity SLAs
    - Reduce backup and recovery operating expenses by 70%

    Don't miss this informative webinar — Register today!
  • A CISO, CIO, and Compliance Officer Grab Coffee
    A CISO, CIO, and Compliance Officer Grab Coffee
    Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Recorded: Jan 21 2019 47 mins
    What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

    Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

    This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

    Here's what they'll discuss:
    -How to get executives and users to care about security and compliance
    -Top of mind security or compliance issues (and tackling them)
    -The toughest challenges they faced
  • 15 Minute Friday: Design Cloud Storage for the Data Center, the Edge, and Cloud
    15 Minute Friday: Design Cloud Storage for the Data Center, the Edge, and Cloud
    Storage Switzerland, ClearSky Data Recorded: Jan 18 2019 19 mins
    When most vendors talk about solving an organization’s storage problems, they typically are talking about solving their challenges in one of three categories: the data center, the edge or the cloud. The reality is that even within these three categories, most vendors only solve one of several problems: primary storage, secondary storage, archive storage or backup storage. IT needs a solution that can address not only all the categories of storage but also the types of storage within them.

    Join Storage Switzerland and ClearSky to learn:

    - The storage and data protection demand on the data center, the edge, and the cloud
    - Why traditional data center, edge and cloud storage and data protection solutions fall short
    - How to design an architecture that integrates data center, edge and cloud storage architectures and solves the storage and data protection problem
  • Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Recorded: Jan 18 2019 53 mins
    Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
  • [Earn 1 CPE]  Critical Actions to Survive a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace. Recorded: Jan 17 2019 65 mins
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • How to Put an End to Hyperconverged Silos
    How to Put an End to Hyperconverged Silos
    Storage Switzerland, Axellio Inc. Recorded: Jan 17 2019 62 mins
    Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
  • Virtualization and Storage Networking Best Practices
    Virtualization and Storage Networking Best Practices
    Cody Hosterman, Pure Storage; Jason Massae, VMware; J Metz, Cisco Recorded: Jan 17 2019 65 mins
    With all the different storage arrays and connectivity protocols available today, knowing the best practices can help improve operational efficiency and ensure resilient operations. VMware’s storage global service has reported many of the common service calls they receive. In this webcast, we will share those insights and lessons learned by discussing:
    - Common mistakes when setting up storage arrays
    - Why iSCSI is the number one storage configuration problem
    - Configuring adapters for iSCSI or iSER
    - How to verify your PSP matches your array requirements
    - NFS best practices
    - How to maximize the value of your array and virtualization
    - Troubleshooting recommendations
  • Protect Patient Data & Achieve 100% Uptime for Your Mission-Critical Apps
    Protect Patient Data & Achieve 100% Uptime for Your Mission-Critical Apps
    Sander Puerto, Sr. Product Marketing Manager, DataCore Software Recorded: Jan 16 2019 45 mins
    Did you know that unplanned downtime at a healthcare organization can cost an average of $7,900 per minute? This is a fact reported by the Ponemon Institute.

    Join our webinar, which also includes a live demo and audience Q&A to learn:

    - How to keep patient and systems data accessible, even during a natural or unexpected disaster
    - How to keep mission-critical applications running 100% of the time, even if there is a hardware failure
    - How to protect the privacy and security of patient information against cyber attacks
    - How to easily migrate and consolidate data due to mergers and acquisitions
    - How to accelerate high I/O workloads without spending your budget on expensive All-Flash storage appliances
  • Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Storage Switzerland, KeepItSafe, Veeam Recorded: Jan 16 2019 56 mins
    Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster strikes. DRaaS resolves these issues by creating an on-demand DR site where the cloud delivers IT resources as they are needed. IT planners though, may overlook some aspects of DRaaS solutions, especially when using the large public cloud providers.

    In this webinar join Storage Switzerland, Veeam and KeepItSafe where we leverage a panel of backup and recovery veterans to identify common oversights seen in organizations’ DRaaS strategies and how to address them.
  • How Cloud Applications Affect Branch Architectures
    How Cloud Applications Affect Branch Architectures
    Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle Research Recorded: Jan 16 2019 44 mins
    Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.

    Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
  • Enhanced Enterprise Readiness for Automation and Reporting
    Enhanced Enterprise Readiness for Automation and Reporting
    Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: Jan 16 2019 52 mins
    Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?

    Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.

    Tufin Orchestration Suite R18-3 GA delivers:

    - New workflow support for Cisco and Palo Alto Networks NGFWs
    - Policy-based routing automation for Cisco network devices
    - New reporting options
    - Methods to identify risk for non-zone included IPs for risk flows

    Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
  • Destination Hybrid Cloud: Tips & Tricks to a Safer and Faster Cloud Migration
    Destination Hybrid Cloud: Tips & Tricks to a Safer and Faster Cloud Migration
    Mor Cohen-Tal, CTO of Cloud at Turbonomic and Tom Reynolds, Director of Technology Solutions at Razor Technology Recorded: Jan 16 2019 58 mins
    Are you tasked with transforming your data center to meet today’s Cloud Computing needs? If yes, you know a migration is easier said than done. From deciding what cloud is best for your environment to avoiding cloud cost-overruns and performance problems, these are just some of the headaches that IT Leaders are facing today.

    Join Turbonomic CTO of Cloud, Mor Cohen and Razor Technology Director of Technology Solutions, Tom Reynolds on Wednesday, January 16th at 11am EST, as they reveal how an intelligent strategy paired with an AI driven solution can ensure a safer and faster cloud migration.

    Our Executive Panel will Discuss:

    - Managing Lift-and-Shift migrations while avoiding cost over-runs
    - How to continuously optimize your hybrid cloud environment to assure performance & compliance at the lowest cost to the business
    - Save up to 40% on your Cloud Bill
  • NoSQL Replication is Not Backup
    NoSQL Replication is Not Backup
    Kapil Chhabra, Principal Product Manager at Rubrik and Aaron Delp, Director of Technical Solutions at Rubrik Recorded: Jan 16 2019 30 mins
    Native replication in NoSQL databases such as MongoDB, Apache Cassandra, and Datastax, provides high scale and availability. However, does it provide protection of critical data against logical errors and data corruption? Is native replication a good substitute for disaster recovery and other enterprise backup needs? Is your database protected for compliance and governance use-cases?

    Watch this 30 minute webinar to learn about the top fallacies of using only native NoSQL database replication and the consequences of this approach to enterprise backup and recovery.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Jan 16 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • It doesn’t end with GDPR.
    It doesn’t end with GDPR.
    Sheila FitzPatrick President FitzPatrick & Associates, Patrick McGrath Digital Transformation Leader Commvault Recorded: Jan 15 2019 52 mins
    Companies raced to meet the May 2018 deadline to meet Europe’s General Data Protection Regulation with varying degrees of success, but if they learned anything since it is this: GDPR isn’t a one and done exercise. The GDPR might be the most eye-catching data privacy law on the books because of the outsized potential fine (up to 4% of revenue), but it is simply one of the first and most far-reaching such laws. Many more are emerging around the world and, indeed, in many US states. Some of the regulations overlap, while others conflict, meaning organizations face the ugly reality of having to deal with a patchwork quilt of laws.

    In this webinar we’ll examine:

    - Lessons learned to date
    - The key differences between the new regulations
    - Pain points companies are having (simply shutting off customers in
    the EU is not a sustainable practice)
    - Best approaches moving forward
  • Supply Chain & Risk Management (SCRM): Disciplines Joined-at-the-Hip
    Supply Chain & Risk Management (SCRM): Disciplines Joined-at-the-Hip
    Gregory L. Schlegel, CPIM Recorded: Jan 15 2019 60 mins
    Supply chains are becoming ever more complex, particularly with the increase in outsourcing and the advancement of multi-tiered global supply networks. More and more organisations are now faced with direct and continuously evolving operational and legislative risks as a result of global market disruption or malpractice in their supply chains.

    “Supply chain risk management is the implementation of strategies to manage every day and exceptional risks along the supply chain, underpinned by continuous risk assessment with the objective of reducing vulnerability and ensuring continuity.” (Supply Chain Risk Management: An Emerging Discipline”)

    This Supply Chain & Risk Management webinar provides participants with a glimpse of the global supply chain risk landscape. Definitions of risk management and new techniques and tactics to mitigate risk will be discussed, along with profiles of early adopters of Supply Chain Risk Management.

    Attend this Supply Chain & Risk Management webinar and get a brief introduction on how to:
    Identify global supply chain risks
    Assess risks within your supply chain
    Mitigate risks throughout your enterprise with new tools and tactics
    Manage volatility, uncertainty, complexity, ambiguity and risk
    Create a resilient supply chain
  • Commvault Activate : Valorisez vos données
    Commvault Activate : Valorisez vos données
    Philippe Decherat Jan 24 2019 8:30 am UTC 45 mins
    Analyse des données :
    Depuis les sauvegardes et les données de production
    Content Indexing :
    Détection de type de données (RGPD)
    Recherche conformité : eDiscovery, legal hold
    Gestion des données sensibles
  • AI in Financial Services, it's all about the data
    AI in Financial Services, it's all about the data
    Patrick Smith, Pure Storage Jan 24 2019 10:00 am UTC 45 mins
    The increasingly competitive climate within Financial Services means that enhancing business outcomes by leveraging AI is essential. Data has never been more important to business success and a key aspect to optimising its value is in conjunction with AI.

    In this session we will discuss the areas in which Financial Services are looking to leverage their data together with AI and some of the considerations for successful implementation of an AI infrastructure that accelerates time to value for these projects.
  • Data Center Transformation with HPE Microsoft Storage Solutions
    Data Center Transformation with HPE Microsoft Storage Solutions
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Jan 24 2019 4:00 pm UTC 60 mins
    Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
  • Show and Tell: Blue Prism Digital Exchange and v6.4
    Show and Tell: Blue Prism Digital Exchange and v6.4
    Richard Pauly, Head of DX | Bart Peluso, Head of Product Marketing | Chieng Moua, Solutions Engineering Manager Jan 24 2019 4:00 pm UTC 60 mins
    Following the launch of the Blue Prism Digital Exchange, come and join us for our inaugural Pulse Online Webinar to see the platform in action, as well as a demo of the new features of Blue Prism's v6.4.

    -= What is the Blue Prism Digital Exchange? =-
    The Digital Exchange (DX) is a “shop window” for finding & consuming pre-built AI, cognitive & disruptive technologies. The DX gives global enterprise customers direct access to technologies from Blue Prism and its technology partners as downloadable connectors, reusable Visual Business Objects (VBOs) or via referrals to the partner via an easy-to-use storefront. Thanks to a robust ecosystem of partners, Blue Prism customers can instantly execute their choice of AI, Machine Learning, Analytics, OCR & more through open API’s.

    -= What's new in v6.4? =-
    * Integrated ‘Skills’ (Toolbar) in the product
    * Simple drag & drop functionality.
    * New Web API Services (‘API Configurator’) facilitates easier integration of APIs.
    * Simplifies web services within a process flow.

    -= Speakers =-
    * Richard Pauly, Global Head of the Digital Exchange, Blue Prism
    * Chieng Moua, Solutions Engineering Manager, Blue Prism
    * Bart Peluso, Global Head of Product Marketing, Blue Prism

    Our panel of Blue Prism experts will be taking questions from the audience during the webinar, so make sure to join us for the live webinar.

    Pulse Online is Blue Prism’s product and technology focused webinar series. Every last Thursday of the month, get hands-on demos, tactical insight and best practices for taking your Digital Workforce to the next level.
  • Hybrid multi-cloud infrastructure for modern app delivery
    Hybrid multi-cloud infrastructure for modern app delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Jan 24 2019 5:00 pm UTC 58 mins
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • The Hybrid Cloud Data Gravity Problem and How to Fix It
    The Hybrid Cloud Data Gravity Problem and How to Fix It
    Storage Switzerland, Infinite IO Jan 24 2019 6:00 pm UTC 60 mins
    Most organization’s use of public cloud storage resources is the hybrid use case. A hybrid cloud strategy enables organizations to leverage the location and resources that make the most sense for the given workload. A hybrid cloud strategy though requires a free-flow of information between on-premises and cloud storage. The problem is that most of the information exchange is metadata, not actual data and most cloud solutions don’t specifically address metadata acceleration.

    Key Takeaways:
    - A clear understanding of why lack of metadata management breaks hybrid cloud
    - Why most cloud solutions don’t solve the metadata problem
    - How to finally fix the hybrid cloud meta problem and create the ideal hybrid cloud infrastructure
  • Backblaze Hard Drive Stats for 2018
    Backblaze Hard Drive Stats for 2018
    Andrew Klein, Backblaze Jan 24 2019 6:00 pm UTC 60 mins
    At the end of 2018 Backblaze had over 750 petabytes of data storage on over 100,000 hard drives. We’ll examine the quarterly, yearly and lifetime failure rates for the hard drive models in service in our data centers. We’ll get our first look at the new 14 TB drives we started using in Q4 and get updates on the 8, 10, and 12 TB drives currently in service. In addition, we will:

    •Take a look at the SMART stats we are collecting and what they are telling us.
    •Compare the failure rates of consumer hard drives versus enterprise hard drives
    •Compare the failure rates of helium-filled versus air-filled hard-drives

    Join us.
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort
    Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort
    Ramin Ghassemi, Hakan Arslanboga Jan 28 2019 1:00 pm UTC 61 mins
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.
  • Защита gmail & gdrive
    Защита gmail & gdrive
    Дмитрий Иванюк, эксперт по решениям Commvault Jan 29 2019 8:00 am UTC 90 mins
    Приглашаем Вас и ваших коллег принять участие в техническом вебинаре "Защита gmail & gdrive"
    В ходе вебинара вы сможете узнать:
    - принципы работы Commvault Complete Backup & recovery
    - методы защиты облачных решений от Google
    - задать вопросы техническому консультанту Commvault
  • Live Interview Panel: Addressing the Cyber Threats on the Horizon
    Live Interview Panel: Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Jan 29 2019 8:30 am UTC 60 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Zukunftsprognosen: Cybersicherheit im Jahr 2019 und darüber hinaus
    Zukunftsprognosen: Cybersicherheit im Jahr 2019 und darüber hinaus
    Mike Hart, VP of Sales, Central Europe Jan 29 2019 10:00 am UTC 45 mins
    In der Cybersicherheitsbranche sind wir häufig so beschäftigt, dass der Jahreswechsel fast unbemerkt bleibt. Dies gibt Anlass, über die Entwicklungen und Erfahrungen aus den vergangenen zwölf Monate zu reflektieren und Strategien zur Bewältigung von Herausforderungen zu entwickeln.

    In der IT-Sicherheits-Branche ist es zudem wichtig, neue und potenzielle Trends zu erkennen, die in Zukunft eine Rolle spielen könnten. Mike Hart, VP Central Europe bei FireEye, gibt Einblick zur Cybersicherheit im Jahr 2019.

    Erfahren Sie mehr über:

    - Bedrohungen für die Luftfahrtindustrie, einschließlich Cyberspionage und Cyberkriminalität.
    - Was Sie von Angreifern aus etablierten und aufstrebenden Schwellenländern erwarten können.
    - Wie Bedrohungsakteure ihre Taktiken ändern, um ihrem Gegenüber immer einen Schritt voraus zu sein.

    In diesem Webinar erfahren Sie, wie Sie Cybersicherheitsbedrohungen immer einen Schritt voraus sein können.
  • Live Interview Panel: IoT Cyber Attacks and Proactive Security
    Live Interview Panel: IoT Cyber Attacks and Proactive Security
    Moshe Shlisel, Hal Lonas, Itai Tevet, Guy Dagan Jan 29 2019 11:00 am UTC 60 mins
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Panellists
    Hal Lonas, CTO, Webroot
    Itai Tevet, CEO, Intezer
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
  • ISM Webinar: Could personalised technology give you that extra 10%?
    ISM Webinar: Could personalised technology give you that extra 10%?
    Iain Sinnott – Sales and Marketing director – VanillaIP Jan 29 2019 11:00 am UTC 30 mins
    Key Takeaways:

    Technology is constantly evolving, and businesses are becoming more and more dependent on technology to run their businesses efficiently.

    Technology is transforming businesses and disrupting entire industries. One of those industries that has been heavily affected is sales.

    From prospecting to closing, today’s mobile, social, big data, and cloud technologies are revamping the sales process in ways that would have been unthinkable only a few decades ago.

    As a result, many sales organizations are embracing new technologies to drive productivity, profitability, and competitive advantage to revamp the sales process.

    With that in mind, here’s a look at some of the technological tools organizations are using to streamline the selling process:

    -Big Data
    -Social Platforms
    -Sales Force Automation Systems
    -Cloud-based CRM Technology
    -Mobile technology

    Reasons to Attend:

    -Why individuals need to be involved in the choice of business productivity tools
    -The different benefits different users derive
    -Why learning to work with salespeople is the best way for buyers to avoid white elephants

    Technology is constantly reinventing and improving, and the world is being constantly reinvented around it.
  • Live Interview Panel: Top Challenges for CISOs and How to Solve Them
    Live Interview Panel: Top Challenges for CISOs and How to Solve Them
    Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman, Avivit Kotler Jan 29 2019 1:00 pm UTC 60 mins
    According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technolofy and human talent
    - Coping with analyst fatugue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    Noam Erez, co-founder and CEO, XM Cyber
    Aviv Grafi, CEO and co-founder, Votiro
    Guy Dagan, Cofounder and Partner, Consienta
    Avivit Kotler, CISO - Head of Cyber Security & Business Continuity, Clal Insurance
    Kobi Freedman, Co-founder & CEO, IDRRA
  • Symantec Web and Cloud Security - Secure Web Gateway (SWG)
    Symantec Web and Cloud Security - Secure Web Gateway (SWG)
    Dr. Michael Teschner, Michael Straschydlo Jan 29 2019 1:00 pm UTC 35 mins
    Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
    Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
  • Modernizing your Data Protection Strategy Through the Druva and AWS Partnership
    Modernizing your Data Protection Strategy Through the Druva and AWS Partnership
    Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, Druva Jan 29 2019 3:00 pm UTC 40 mins
    Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.

    Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.

    Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.

    Don't miss this informative webinar - register today!
  • Transform Your Security Operations With SOAR Technology -  IncMan SOAR Overview
    Transform Your Security Operations With SOAR Technology - IncMan SOAR Overview
    John Moran, Senior Product Manager, DFLabs Cody Mercer, Manager of Pre-Sales & Sales Marketing, DFLabs Jan 29 2019 4:00 pm UTC 60 mins
    IncMan SOAR from DFLabs is the only Security Orchestration, Automation and Response (SOAR) platform available capable of full incident lifecycle automation, including built-in, automated threat intelligence gathering, risk assessment, triage and notification, context enrichment, hunting and investigating, threat containment and more.

    This feature rich, unique and scalable solution provides context to security incidents, automates actions, orchestrates response to activities, while enabling full reporting and measurement functionality across all stakeholders. With its Open integration Framework, REST API and Automated START Triage, it is the most open and customizable SOAR platform in the industry, helping organizations to overcome some of the most common challenges and pain points when it comes to incident response.

    Join this webinar to learn how to transform your Security Operations by using SOAR technology and discover how DFLabs can help you to detect, respond to and remediate all security incidents fast, before they impact your organization.

    Key Features & Capabilities:

    - Security Automation and Orchestration
    - Threat Hunting and Investigation
    - Incident Management
    - Flexible Integrations and Event Parsing
    - Forensic Evidence Management
    - Reporting and KPIs
    - Knowledge Transfer & Machine Learning
    - Community Portal and Community Edition
  • How to Protect Your Data While Keeping Infrastructure Costs Under Control
    How to Protect Your Data While Keeping Infrastructure Costs Under Control
    Eran Brown CTO EMEA, INIFINDAT Jan 29 2019 7:00 pm UTC 25 mins
    With data security regulations on the rise globally, end-to-end encryption will have a dramatic effect on your IT infrastructure costs and operations. What's your plan to secure your data and stay within your budget? In this on-demand webinar, Eran Brown, INFINIDAT’s CTO for EMEA, will discuss how to strategically address these issues, recognizing the significant impact on the choice of large-scale storage when moving encryption higher in the IT stack.

    Included in this webinar:

    •An Overview of Regulatory Requirements
    •Why Encrypted Data Matters for GDPR
    •A Hacker's View of Your Data
    •The Implications of Upstream Encryption
    •AI/ML-Based Data Security
    •Key Takeaways

    About Eran Brown

    Eran Brown is the EMEA CTO at INFINIDAT.

    Over the last 14 years, Eran has architected data center solutions for all layers — application, virtualization, networking and most of all, storage. His prior roles include Senior Product Management, systems engineering and consulting roles, working with companies in multiple verticals (financials, oil & gas, telecom, software, and web) and helping them plan, design and deploy scalable infrastructure to support their business applications.
  • Architectural Nexus Achieves Fast Application Performance On-Time & On-Budget!
    Architectural Nexus Achieves Fast Application Performance On-Time & On-Budget!
    Steve Hunsaker, Dir. Systems Engineering- DataCore, Kent Hansen, CIO- ArchNexus, Johnathan Kendrick Tech. Account Exec. - USI Jan 29 2019 7:00 pm UTC 60 mins
    Join us to hear the story of Architectural Nexus, Inc. and Universal Systems Incorporated (USI). ArchNexus provides customized architectural, landscape and interior design services. As a company with over 100 power user engineers and architects, ArchNexus needed a storage solution to meet the company’s high demand for performance. With the help of USI and DataCore Software, ArchNexus found a smart and affordable storage solution.

    In this webcast you will discover:
    - A business problem & how it was solved
    - The business impact
    - The on-time and on-budget solution
    - The ROI achieved
    - How the customer would change the process or outcome

    Are you searching for a smart storage solution that is right for your business? Please join us!
  • Live Interview Panel: Strategies for Cyber Resilience in 2019
    Live Interview Panel: Strategies for Cyber Resilience in 2019
    Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel Koren Jan 30 2019 8:30 am UTC 60 mins
    With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

    Join security and business continuity experts as they review:
    - Threats to cyber resilience and business continuity
    - Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
    - Attack trends and business preparedness
    - Steps for enterprises to take today

    Panellists
    Aviv Cohen, CMO, Pcysys
    Ariel Koren, CTO, SNDBOX
    Israel Levy, CEO, Bufferzone Security
    Eddy Bobritsky, Founder & CEO, Minerva Labs
  • Live Interview Panel: Managing Compliance and Security in the Cloud
    Live Interview Panel: Managing Compliance and Security in the Cloud
    Benny Czarny, Guy Dagan, Ariel Zeitlin, Diana Kelley Jan 30 2019 1:00 pm UTC 60 mins
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Presenters
    Benny Czarny, CEO and Founder, OPSWAT
    Guy Dagan, Cofounder and Partner, Consienta
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • What do we know about recent attacks on foreign embassies in Iran?
    What do we know about recent attacks on foreign embassies in Iran?
    Denis Legezo, senior security researcher at Kaspersky Lab Global Research and Analysis Team Jan 30 2019 2:00 pm UTC 15 mins
    Kaspersky Lab Global Research and Analysis Team has recently detected multiple attempts to infect foreign diplomatic entities in Iran with homebrew spyware, that contains an updated version of Remexi backdoor. What do we know about this malware? What does it mean for the threat landscape? And is there a link between the spyware and the Chafer group – who has previously been known as a local threat actor in Iran?
  • The Rise of Nation State Attacks and what you can do about it
    The Rise of Nation State Attacks and what you can do about it
    Ulf Mattsson, Mark Rasch and David Morris Jan 30 2019 5:00 pm UTC 90 mins
    In this session you will lean what is a Nation-State attack, who are the primary perpetrators and what if any legal sanctions can be brought to bear
  • Myth Busting - The Four NVMe Myths
    Myth Busting - The Four NVMe Myths
    Storage Switzerland, Western Digital Jan 30 2019 6:00 pm UTC 60 mins
    NVMe enables storage system vendors to once again raise expectations on the performance capabilities of all-flash arrays. NVMe provides a higher command count, greater queue depth and leverages the PCIe interface to deliver a significant increase in IOPS potential with a corresponding reduction in latency. NVMe though, brings with it some confusion about who can best benefit from the technology and what are the right steps to implementing it.

    Watch the webinar and get answers to these questions:
    - Can “regular” data centers benefit from NVMe or just companies specializing in AI?
    - Does NVMe have to be end-to-end for data centers to benefit?
    - Do features such as deduplication and compression impact performance?
    - Does NVMe Flash mean that SAS Flash is no longer relevant?
  • Announcing Backblaze Cloud Backup 6.0
    Announcing Backblaze Cloud Backup 6.0
    Yev Pusin, Backblaze Jan 30 2019 7:00 pm UTC 45 mins
    Join us as we introduce the new and updated features of Backblaze Cloud Backup 6.0.

    This release for consumers and businesses delivers:

    - Restore by Mail hard drives that are twice the size - up to 8TB.
    - The ability to archive data directly to Backblaze B2 Cloud Storage.
    - Up to 50% faster backups.
    - Create your own network blocklist to help avoid data caps.
    - More efficient and performant Mac and Windows applications.
    - Mobile enhancements for iOS and Android.
    - SSO support with Google, and more

    We'll walk you through many of these features such as archiving to B2 and explain how they can be helpful to you.