Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • The Evolution of File The Evolution of File Glen Olsen Product Manager Recorded: Aug 25 2016 54 mins
    Over a decade ago, API-accessible key/value-based storage was introduced as a service by Amazon and as software by Caringo. Amazon’s service-based approach matured quickly, while the general storage market slowly adopted the API approach. The on-premise market demanded a traditional file interface, leading to various “gateway” products. However, for the majority of use cases, the logical file gateway architecture is flawed. Is it time for file to evolve with object? This webinar examines the past decade in file interface gateways and the needs of the market versus what is available.
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Recorded: Aug 24 2016 39 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • ClearCase to Git ClearCase to Git Doug Robinson Recorded: Aug 24 2016 61 mins
    On the surface, ClearCase and Git seem like polar opposites, yet setting architecture aside, they have interesting similarities. A deeper understanding of ClearCase and Git will ease the migration planning process.

    Register for this webinar to learn:
    - How Git and ClearCase differ and how they support some of the same development models
    - Options for moving data into Git with low technical risk
    - How ClearCase MultiSite, ClearCase UCM, and ClearQuest fit into the picture
    - ...and more!
  • Next Generation Data Centers – Are you ready for scale? Next Generation Data Centers – Are you ready for scale? Qing Xu, Technology and Applications Manager, Belden; Stephen Worn, CTO, DatacenterDynamics Recorded: Aug 24 2016 51 mins
    This presentation will provide a general overview of the data center trends and the ecosystem that comprises of “hyperscale DC”, “MTDC”, and “enterprise DC”.
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Recorded: Aug 24 2016 32 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • Bringing the Speed of Flash to Your Software-Defined Storage Infrastructure Bringing the Speed of Flash to Your Software-Defined Storage Infrastructure Augie Gonzalez, Director Product Marketing, DataCore; Steve Wilkins, Manager Product Marketing, SanDisk Recorded: Aug 23 2016 38 mins
    Do you run a mix of virtualized and diverse workloads, including block storage? Are you looking to increase density and maintain blazingly fast speeds? If so, this webinar is for you!

    In this webinar, speakers from DataCore and SanDisk will discuss the performance and economic advantages of combining software-defined-storage with all-flash storage. We’ll also share two customer stories on how they were able to:

    - Achieve effortless and non-disruptive data migration from magnetic to flash storage
    - Prevent storage-related downtime
    - Dynamically control the movement of data from flash to high-capacity storage
    - Strike the right economic balance between fast performance and low cost

    Don’t let data growth and complex workloads slow you down. Attend this webinar and learn about new possibilities.
  • What Your Object Storage Vendor Isn't Telling You About NFS Support What Your Object Storage Vendor Isn't Telling You About NFS Support George Crump, Storage Switzerland Recorded: Aug 23 2016 61 mins
    NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
  • Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro G2M Communications Recorded: Aug 23 2016 53 mins
    The costs of running VMWare have risen to unmaintainable levels for companies that are looking to expand and scale operations. The ESX Tax over burdens IT budgets, hindering their ability to scale and manage OPEX. In this webcast, we will show IT managers how Microsoft Hyper- V and Storage Spaces can be a game changer for their organization, providing a cost effective, stable and easy to manage virtualization platform. LifeStore Bank will tell you how they transitioned from an infrastructure based on VMWare ESX and EMC VNXe to Microsoft Hyper-V and DataON Storage's Cluster-In-Box (CIB) storage to scale their capabilities, optimize service level agreements and lower the cost of running virtual environments by 1.5X

    Speakers

    Howard Lo, VP of Sales, Dataon Storage
    Aidan Finn – Microsoft MVP
    Josh Rountree – IT Manager, LifeStore Bank
    Kris Menon - Business Development Manager, HSGT
    Shaun Walsh – Managing Partner, G2M Communications
  • Connectivity Matters: Understanding EMC's Networking Portfolio Connectivity Matters: Understanding EMC's Networking Portfolio Dee Wassell and Doug Fierro Recorded: Aug 23 2016 25 mins
    By attending this webinar, you will learn about EMC’s industry-leading Storage Networking offering for the Modern Data Center and why connectivity matters in an all flash storage environment.
  • MeetTheCEO: The CEO of Copy Data, Ash Ashutosh MeetTheCEO: The CEO of Copy Data, Ash Ashutosh Charlie Hodges, Storage Switzerland Recorded: Aug 23 2016 51 mins
    Ash Ashutosh with Actifio is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Ashutosh’s background, introduces listeners to Copy Data Management as the next stage in data protection and what makes Actifio’s solution different. We will also ask him about his goals for Actifio and get his predictions for the future of IT. NO REGISTRATION REQUIRED.
  • Hunting for Threats: tips and tricks for SOC experts Hunting for Threats: tips and tricks for SOC experts Matias Bevilacqua, Mandiant Principal Consultant Recorded: Aug 23 2016 49 mins
    Many Security Operation Centers operate in a reactive mode. They primarily respond to alerts that are being presented to them by implemented detection technologies. And we all know alerts are generated in overwhelming volumes, severely crippling SOC’s effectiveness and efficiency. Today’s threat landscape requires SOCs to operate ever more proactively to keep up with the threat actors. More and more SOCs therefor are actively ‘hunting’ for threats that may be residing in the environment they are to defend. ‘Hunting' however requires a different approach from the traditional, reactive mode, not least for the SOC experts themselves.

    Join Matias Bevilacqua, Mandiant Principal Incident Response Consultant, as he discusses tips and tricks for hunting for those lurking threats: what to look for, what tools to use, etc.? You will leave the session with some hands-on material to start turning over stones and uncover threats you never knew were there.
  • Arcserve's Triple Play Arcserve's Triple Play Kervin Myrtil, Chris Rockholt, & Gary Sussman Recorded: Aug 18 2016 49 mins
    Cloud, Virtual Physical – The Arcserve Triple Play
    If yours is like most environments today, you have a mix of hardware, software, virtual platforms, as well as cloud platforms supporting different applications with diverse needs.
    As your IT environment has evolved to support cloud, virtual, and legacy, how has your data protection infrastructure kept pace with the changing needs and functionality of today’s data center? And as more and more data is generated, processed, stored and preserved for longer periods of time, what are the additional threat risks you need to protect your data and applications against?
    This webcast looks at the industry trends, issues, and challenges you face as your environment quickly evolves, and helps you determine the best protection strategy and implementation for your environment: The Triple Play.
  • Protect Your Applications and Data with Fault Tolerant Software Protect Your Applications and Data with Fault Tolerant Software James Chillingworth, Founder (CEO), The Consulting Practice Inc. Recorded: Aug 18 2016 27 mins
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers Ransomware Realities for Healthcare: Cloud Backup and Security Answers Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent Recorded: Aug 18 2016 49 mins
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Frank Stienhans, CTO at Ocean9 Recorded: Aug 18 2016 49 mins
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol Monitor with Discipline – Protect Your Data Protocol Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Aug 18 2016 36 mins
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Recorded: Aug 18 2016 61 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Kevin Orbaker & Rajinder Gill Recorded: Aug 17 2016 65 mins
    Migration is a process. We have in-depth methodologies, resources, offers and tools to help you move from Oracle to SQL Server quickly and painlessly. Learn 5 steps to migrate from Oracle and unlock value from your data using the cutting edge capabilities of SQL Server.

    Join this session to learn about the 5 steps in migration:
    •Assess your current data systems
    •Develop a Migration Plan
    •Deploy to the new system
    •Validate everything is working properly
    •Cutover from your old system
  • Aligning IT Disaster Recovery with Business Requirements Aligning IT Disaster Recovery with Business Requirements Dustin Mackie, Managing Consultant at Avalution Consulting Recorded: Aug 17 2016 42 mins
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
  • Managing Media in a ‘Multi-Multi’ Broadcast World Managing Media in a ‘Multi-Multi’ Broadcast World Moderator: Mary Yurkovic - Digital Strategies Inc. Recorded: Aug 17 2016 62 mins
    As broadcast station groups grow larger through consolidation and acquisition, they’re looking for ways to avoid duplicating content and effort while control costs. And it’s not just dealing with the complexity of multi-site operations, it’s multi-source, multi-format content created for multi-platform delivery.

    By creating “hubs” for content, processes and distribution, station groups can deliver the same content to multiple owned-and-operated stations for multiple platforms, while at the same time tailoring or differentiating the content so that it fits the local audiences or regional market they need to target.

    Attend this webinar and learn how to:
    • Intelligently manage media assets brought into your organization from multiple sources
    • Resolve collaboration issues for content development, processing and approvals
    • Automatically process and prepare content for multiple distribution platforms
    • Optimize storage to streamline processes and meet scalability and cost requirements

    Speakers:
    Eivind Sandstrand - Arvato
    Amy Lounsbury - Diversified
    Josh Hatter - Diversified
    Karl Paulsen - Diversified
    Dave Frederick - Quantum
  • DRaaS Just Got Real! Public Cloud Democratizes Disaster Recovery DRaaS Just Got Real! Public Cloud Democratizes Disaster Recovery Brett Schechter, Product Marketing, Druva Recorded: Aug 17 2016 50 mins
    Have you been looking for cost efficient, highly reliable, infinitely testable DR for years?

    Find out how organizations can now enjoy both low RTO/RPO performance AND low cost due to natively designed cloud solutions and architectures for DRaaS. The costs and complexities of DR for virtualized environments are greatly reduced, when combined with high data durability and global scale of AWS for public cloud.

    Join Brett Schechter from Druva to hear the benefits of a native cloud disaster recovery strategy and the related best practices. Brett will also focus on the attributes that make VMware and AWS the right choice, for a wide range of use cases.

    You'll also learn:
    * The importance of having both a backup and a DR strategy
    * How security is no longer a concern due to two factor encryption
    * How you can combine best of breed cloud and virtualization to save money and man hours
  • Flash Myth: Flash is for Everything vs. Flash is for One Thing Flash Myth: Flash is for Everything vs. Flash is for One Thing George Crump, Storage Switzerland Recorded: Aug 17 2016 62 mins
    Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Aug 26 2016 12:00 pm UTC 45 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
  • The Cost Shift Model for Video Storage and Data Management The Cost Shift Model for Video Storage and Data Management Brian Morsch, VP of Sales, Surveillance & Security – Americas and Andy Brinck, VP of Channel Sales – Americas Aug 30 2016 4:00 pm UTC 45 mins
    If you are a security integrator then this webinar is for you!

    Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform.

    Join us on Tuesday, August 30 at 9:00 AM PST for The Cost Shift Model
    for Video Storage and Data Management to learn how Quantum is taking a different approach to revolutionize storage solutions within the surveillance and security industry.

    Attend this webinar and learn:
    - How a multi-tier storage approach is shifting the budget spent in the surveillance market
    - How to extend your customers’ surveillance budget
    - How you can offer a scalable storage solution without compromising video quality, retention time, or camera streams

    Quantum can help you design and implement a scalable storage foundation that will enable you to differentiate your offerings in the market.
    Register for this webinar today!
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

     about other available Azure programs
     application development tests on Azure
     what other customers are doing on Azure and how it is paying large dividends
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Arcserve's Battle Royale Arcserve's Battle Royale Gary Sussman, Kervin Myrtil, Chris Rockholt Sep 1 2016 6:00 pm UTC 60 mins
    There is a lot of talk about who's the best in the business. But what do the numbers say? Join us as we take a look in the world of data back up and disaster recovery to see how Arcserve stands up against the competition.
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

     Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

     Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

     Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • Exercising your continuity plan Exercising your continuity plan Barbro Thöyrä MBCI Sep 5 2016 2:00 pm UTC 60 mins
    Exercising is vital in order to keep your continuity plan and staff up-to date.
    We will talk more about why it is important to exercise and what the useful prerequisite are to exercise.
    There are several types of exercises and I will high light some of them and how to conduct an exercise.
  • Best Practices for Running Virtualized Workloads in All-Flash Data Centers Best Practices for Running Virtualized Workloads in All-Flash Data Centers Mike Cooney Sep 6 2016 4:00 pm UTC 60 mins
    This session explores the reasons for one of the quickest revolutions that the storage industry has seen in the last 20 years, and how XtremIO can enable breakthrough capabilities for your server virtualization and private cloud deployments. We through specific use case issues and how to overcome them. With lots of real-world tips and tricks, you can consolidate your most demanding virtualization workloads successfully and gracefully.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Mike Fazio, Product Marketing Manager, DataCore Software Sep 6 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Data Protection 101: Follow and protect your critical data, wherever it lives Data Protection 101: Follow and protect your critical data, wherever it lives Sunil Choudrie, Global Solutions Marketing Manager Sep 7 2016 10:00 am UTC 45 mins
    When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

    Organizations today face the following challenges:
    •Identifying the type of data that needs to be protected
    •Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
    •Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

    Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

    Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
  • Network security, seriously? 2016 Network Penetration Tests Network security, seriously? 2016 Network Penetration Tests Peter Wood Sep 7 2016 10:00 am UTC 45 mins
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Protection des données:comment gérer & protéger les données,où qu’elles résident Protection des données:comment gérer & protéger les données,où qu’elles résident Hervé Doreau, Directeur Technique – Symantec France Sep 7 2016 1:00 pm UTC 45 mins
    Lorsqu’il s’agit de vos données sensibles, comment pouvez-vous être certain qu’elles sont protégées et qu’aucune ne quitte votre environnement ?

    Les entreprises sont aujourd’hui confrontées aux difficultés suivantes :

    - Identifier le type de données à protéger
    - Contrôler l’accès aux données et garantir la confidentialité des identités, en particulier face aux fortes amendes prévues par la réglementation
    - Empêcher les fuites de données en dehors de l’organisation, les mégafuites et pertes de données s’accroissant d’année en année. 

    En 2015, plus d’un demi-milliard d’enregistrements personnels ont été dérobés ou perdus, et les campagnes de spear-phishing à l’encontre des salariés d’entreprise ont augmenté de 55 %.

    Dans un premier temps, il convient de permettre aux bonnes personnes d’accéder aux données pertinentes, où qu’elles se trouvent, en contrôlant l’accès, en surveillant les flux et en évitant qu’elles tombent entre de mauvaises mains. Vous pouvez alors facilement passer à la seconde étape : appliquer des politiques qui contrôlent l’accès aux données et leur utilisation, que ce soit sur le cloud, les appareils mobiles ou le réseau.

    Assistez à un webinaire Symantec sur les derniers enseignements tirés en matière de protection des données pour l’ensemble des applications qui composent votre environnement.
  • Exploring Russia’s Cyber Operations Exploring Russia’s Cyber Operations Dan McWhorter, Chief Intelligence Strategist at FireEye Sep 7 2016 1:00 pm UTC 45 mins
    Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
  • Deep-dive into Linux Based Applications on Microsoft Azure Deep-dive into Linux Based Applications on Microsoft Azure Jose Miguel Parrella, Open Source Product Manager, Microsoft Corporation Sep 7 2016 6:00 pm UTC 60 mins
    As a follow-up to the previous highly rated session, this session will deep dive into all the relevant features of enterprise development pertinent to an open source developer. It’s no surprise that one in three Virtual Machines in Azure run Linux. In fact, over 60% of the images provided by our application partners in Azure Marketplace are Linux-based and chances are you are running applications on top of Linux as well.

    Which applications are a better fit for the cloud, and what are common use cases and patterns for them? How can Azure provide a first-class experience for your Linux-based applications?

    Attend this webcast to discover:

     How Docker, LAMP, Gluster, JBoss, Hadoop and MySQL enterprise-grade applications running on top of Linux can benefit from Azure.

     How Azure offers you a hyper-scale, open and flexible cloud platform that adds value to your existing investments.

     The powerful architectures made possible with Azure Resource Manager and more.
  • Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Sep 8 2016 8:00 am UTC 45 mins
    Quando le comunicazioni condividono dati sensibili, come puoi assicurarti che siano protetti e non filtrino fuori dal tuo ambiente?

    Le aziende oggi devono affrontare le seguenti sfide:

    - Identificare il tipo di dati da proteggere
    - Controllare l’accesso ai dati e garantire la riservatezza delle identità, soprattutto per non esporsi a pesanti sanzioni normative
    - Prevenire le fughe di dati sensibili, considerato che il numero di grandi violazioni e perdite di dati aumenta di anno in anno. 

    Nel 2015, infatti, oltre mezzo miliardo di dati personali sono stati rubati o persi e, nello stesso anno, le campagne di spear phishing contro i dipendenti aziendali sono aumentate del 55%

    Qual è il primo passo? Consentire a specifici utenti di accedere a specifici dati, ovunque siano, monitorando il flusso dei dati per evitare che cadano nelle mani sbagliate. Il secondo: la semplice applicazione di policy per controllare accessi e uso dei dati su cloud, sui dispositivi mobili e/o sulla rete.

    Partecipa al webinar Symantec per sapere come proteggere i dati in molte applicazioni del tuo ambiente.
  • Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Ramsés Gallego - Symantec Strategist Sep 8 2016 9:00 am UTC 45 mins
    Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

    En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

    - Identificar los tipos de datos que se deben proteger.
    - Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
    - Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

    En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

    El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

    Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.
  • Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Alexander Peters, Senior Manager Office of the CTO - Symantec Germany Sep 8 2016 12:00 pm UTC 45 mins
    Wie können Sie sicher sein, dass wichtige Daten geschützt sind und Ihre Umgebung nicht verlassen?

    Unternehmen stehen vor verschiedenen Herausforderungen. Sie müssen:

    - Die Art von Daten identifizieren, die geschützt werden sollen.
    - Den Zugriff auf Daten kontrollieren und sicherstellen, dass Identitätsdaten nicht offengelegt werden, insbesondere angesichts empfindlicher Bußgelder.
    - Verhindern, dass vertrauliche Daten das Unternehmen verlassen – Mega-Datenpannen und Datenverlust nehmen Jahr für Jahr zu. 

    2015 wurden mehr als eine halbe Milliarde Datensätze mit persönlichen Informationen gestohlen oder gingen verloren und die Anzahl von Spear-Phishing-Kampagnen, die auf Mitarbeiter in Unternehmen abzielten, stieg um 55 %.  

    Der erste Schritt besteht darin, den richtigen Personen von überall aus Zugang zu den entsprechenden Daten zu ermöglichen, indem Sie den Zugriff steuern, den Fluss der Daten überwachen und dafür sorgen, dass sie nicht in falsche Hände geraten.  Anschließend setzen Sie dann Richtlinien durch, um Zugriff und Nutzung zu kontrollieren – in der Cloud, auf Mobilgeräten oder im Netzwerk.

    Nehmen Sie an einem Webinar von Symantec teil, in dem es um gewonnene Erkenntnisse in Bezug auf den Schutz von Daten für die zahlreichen Anwendungen in Ihrer Umgebung geht.
  • How hyper converged infrastructures transform databases How hyper converged infrastructures transform databases Augie Gonzalez, Storage Virtualisation Specialist Sep 8 2016 1:00 pm UTC 45 mins
    HyperConverge like a Pro - part 2

    Regardless of your industry, databases form the core of your profitability. Whether online transaction processing systems, Big Data analytics systems, or reporting systems, databases manage your most important information – the kind of data that directly supports decisions and provides immediate feedback on business actions and results. The performance of databases has a direct bearing on the profitability of your organization, so smart IT planners are always looking for ways to improve the performance of databases and the apps that use them.

    Join Augie Gonzalez, Subject Matter Expert, DataCore to see if hyper covergence holds an answer to reducing latency and driving performance in database operations. But be careful, not all hyper converged solutions show dramatic improvements across the I/O path.
  • VoIP on an LTE Network VoIP on an LTE Network Ken Tucker, Senior Solutions Architect for Cradlepoint Sep 8 2016 4:00 pm UTC 60 mins
    Voice Over Internet Protocol (VoIP) is deployed one of two ways: on-premises or cloud. Each deployment strategy has its pluses and minuses — with variables including features, upfront costs and total cost of ownership, existing infrastructure, and scalability.

    VoIP services traverse the WAN and are subject to overall WAN bandwidth. If adequate WAN resources are not available, call quality degradation can result. That’s why more and more IT professionals are asking this question: “How would using an LTE WAN for failover or primary connectivity impact VoIP services in our network?”

    Join our webinar at 9 a.m. PDT/12 p.m. EDT on Sept. 8, 2016, to learn the best practices and considerations for deploying VoIP on an LTE network.

    We also will discuss:

    — VoIP on an LTE network vs. VoLTE
    — VoIP on LTE for failover or primary connectivity
    — VoIP network conditions
    — LTE vs. 3G/2G
    — Best practices
    — Quality of Service (QoS)
    — Cradlepoint field testing
  • Migrating Your Big Data Infrastructure to Cloud Migrating Your Big Data Infrastructure to Cloud GigaOM analyst William McKnight with experts from Qubole and WANdisco Sep 8 2016 5:00 pm UTC 60 mins
    GigaOM analyst William McKnight will be joined by experts from Qubole and WANdisco, who will explain the benefits of moving to the cloud and review the tools available for cloud migration and hybrid cloud deployments.

    Learn what's required to avoid the downtime and business disruption that often accompany cloud migration projects.
  • Key to Productivity & Collaboration: The Right Project Management Tools Key to Productivity & Collaboration: The Right Project Management Tools Prasanna Adavi Partner, EPMA, Inc. Microsoft Project MVP Sep 8 2016 6:00 pm UTC 60 mins
    Project Management can mean different things to different people, depending upon the kind of work they do. In that context, it becomes very important to select the right tool for the job at hand.

    Microsoft Office 365 suite has many products that enable project management and collaboration at various levels of maturity of organizations. Project Online, Office 365, SharePoint Online, and Planner each give a different set of capabilities to the users. It is extremely important to select the right tool for the right work, to help maximum productivity and efficiency.

    This session will cover each of these products and discuss when these tools are appropriate and what can and cannot be achieved with them.
  • Creating Business Value in Manufacturing with IoT Creating Business Value in Manufacturing with IoT Kevin Orbaker, Technical Solution Professional (TSP), Microsoft Sep 8 2016 8:00 pm UTC 60 mins
    Tune in for the first webinar in our Hybrid Data Platform Series!

    IoT is a quantum leap for the manufacturing industry—the market potential by 2018 is projected to be $913B, according to IDC. It’s an exciting time as we see the powerful possibilities for manufacturers to use this technology to work smarter, generate new revenue models, transform traditional business models—and even disrupt entire industries.

    In this session, we will discuss how to look beyond the hype and create a strategy that will unlock the potential of the Internet of Your Things in Manufacturing.
  • HackerCraft - Avoid the Breach HackerCraft - Avoid the Breach Rob Krug, Systems Engineer Sep 12 2016 5:30 pm UTC 45 mins
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.

    Rob will discuss the following:
    • Threat landscape 2016 recap
    • Fortifying the network
    • Security craftsmanship
    • Implementing the solution
  • DDoS Fossils to Future: A Brief History and What to Expect DDoS Fossils to Future: A Brief History and What to Expect Darren Anstee, Chief Security Technologist, Arbor Networks Sep 13 2016 4:00 pm UTC 45 mins
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective