The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Extending your WAN to the public cloud presents unique challenges to Enterprise IT operators regarding the management of WAN connectivity to ensure optimal service, performance and security. In the final part of our webinar series, which is focused on SD-WAN and the Cloud, Viptela expert David Klebanov will demonstrate how simple it is to extend your WAN to your IaaS workloads, specifically Amazon.
This demonstration will showcase:
- Simplicity of installation of Viptela vEdge Cloud
- Ease of policy configuration of your IaaS endpoint
- Utilization of multiple transport types for your Cloud workloads
- Value of single-pane-of-glass management of your WAN
David Klebanov, Director of Technical Marketing, demonstrates the security landscape available with Viptela’s SD-WAN solution. This includes a breakdown of their segmentation and multi-tenancy protocols, as well as use cases when these would apply.
Here's a 'don't miss' webcast providing a refresher on deployment options you can take advantage of.
From exploring the benefits of Windows-as-a-Service, to easier and faster deployment options and live Q&A, this robust yet efficient webcast will get you set up to move quickly with Windows 10.
Join this webcast to:
- Learn how Windows as a Service provides for frequent upgrades, less burden on IT staff, and increased control over deployments
- Explore options that would make deployment easier and faster
- Get your top deployment questions answered in real time
Submit your questions in advance: Tag @MSFT_Business on Twitter and use the hashtag #Win10webcast. Top questions will be answered during the webcast.
David Klebanov, Director of Technical Marketing, reviews how Viptela can enable optimal cloud performance for the enterprise. Their SD-WAN implementation intelligently routes cloud applications, optimizing for performance no matter which route is chosen. This process is automated by Viptela without any need for interaction once initiated.
Whether you're a company looking to evaluate a data center, or a data / tech company looking to upgrade and improve their physical security, we'll discuss some of the requirements from major organizations along with important considerations for each facility layer, from ‘curb to core.
Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage
Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.
Join this webcast to learn how to:
- Implement disaster recovery for all your major IT systems
- Unify data management, security, and protection
- Provide protection for your data and applications, no matter where they reside
- Extend on-premises backups storage and data archiving solutions to the cloud
This webcast is part of our Why and how to move to the cloud webcast series. Sign up for this session, or the entire series today!
In this webinar Storage Switzerland and Caringo, providers of cloud and object storage, will discuss why preservation, distribution and delivery is so critical for M&E IT and also why it is so challenging to deliver. More importantly, we will discuss practical solutions to these challenges so IT departments can lead their organizations to more monetization opportunities.
In this session, Natalia will speak to new capabilities in the Office 365 Suites that provide innovate new productivity capabilities while offering the highest level of security and compliance for government customers.
This session explores how cloud connected sensor devices are providing new crime fighting tools and real-time situational awareness for law enforcement. Jeff will demonstrate how data from cameras, LPRs, and drones are used to investigate crime and improve officer safety.
Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations. Join CISO, Bret Arsenault as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
Deploying and supporting traditional infrastructure for remote offices, retail stores, and hospitality sites can be challenging. Virtualization and high availability can prove complex and costly, often leaving the IT team no choice but to cut corners and send valuable IT resources into the field with short notice.
It doesn’t have to be this way.
Join us to hear how StorMagic’s software-defined storage platform, SvSAN, leverages Cisco Unified Computing System (Cisco UCS) infrastructure to offer you the best of both worlds - hyperconverged, low-cost, and highly available IT infrastructure for remote sites.
Hear from Brenntag and Enterprise Strategy Group about how StorMagic SvSAN and Cisco UCS can deliver a highly available converged server and storage footprint at remote sites without compromising performance whilst cutting OPEX and CAPEX costs in half.
Discover more on what you can achieve with StorMagic SvSAN on Cisco hardware by visiting http://stormagic.com/cisco
Retailers and banks are rolling out end-to-end segmentation for isolating POS, Banking Functions, and ATMs from other applications like Guest Wireless, Surveillance video etc. These segments could have different topologies like full-mesh or hub-and-spoke and automatically be secured by a cloud-security provider like Zscaler. The webinar covers why segmentation is hard to deploy today, the major vulnerabilities that arise from lack of segmentation, and how to deploy segmentation using the new overlay SD-WAN architecture.
Work on the cutting edge in the cloud and empower your IT.
Microsoft Azure empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.
Join this webcast to learn how to:
- Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
- Develop cutting edge “born in the cloud” applications
- Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment
High Performance or Capacity - Making the Right Choice
The flash market started out monolithically. Flash was a single media type (high performance, high endurance SLC flash). Flash systems also had a single purpose of accelerating the response time of high-end databases. But now there are several flash options. Users can choose between high performance flash or highly dense, medium performance flash systems. At the same time, high capacity hard disk drives are making a case to be the archival storage medium of choice. How does an IT professional choose?
The FireEye Advanced Threat Report for EMEA provides an overview of the advanced persistent threats (APT) targeting computer networks that were discovered by FireEye during the first half of 2016.
In this webinar we will discuss the findings and also the potential implications this may have on organisations within EMEA.
Motivated by numerous objectives, threat actors are evolving the level of sophistication to steal personal data and business strategies, gain a competitive advantage or degrade operational reliability.
The webinar will draw on data gleaned from the FireEye Dynamic Threat Intelligence (DTI) cloud. There will be information and insight around Advanced Threats at a country, vertical and government level.
Faster, more efficient development for your DevOps teams is vastly important. With App Service, you can easily create, consume, and orchestrate REST APIs that are straightforward for web and mobile developers. Combined with secured on-premises connective and isolated environments, App Service offers end-to-end solutions to enable a mobile workforce.
Join this webcast to learn how to:
- Understand the key features of App Service
- Review the capabilities of App Service and how they benefit your dev team
- Gain confidence in selecting the best backend for your mobile app
The benefits of server virtualization are well understood in the modern data center. By abstracting, pooling, and automating compute resources, companies have achieved massive savings. In the past decade, web-scale companies have shown how to operate data centers with ruthless efficiency. ScaleIO Software-Defined Storage applies the principles of abstraction, pooling, and automation to local storage in standard x86 servers, creating a high performance SAN entirely with software. At the same time ScaleIO enables a highly efficient web-scale operating model. Combined, these deliver a radical reduction in storage lifecycle costs. In this session we’ll explain how ScaleIO Software-Defined Storage is redefining the modern data center and where the technology is best suited.
As cloud and mobile services become more widespread, your organizations need to keep up and support better application performance even in remote locations. Doing this quickly, reliably, securely and cost effectively is the key when you decide on any new network infrastructure solutions. Typically this means adding bandwidth isn’t just an option, you need to transform your network to create a single intelligent platform that responds to your applications’ needs and helps you make changes quickly. Verizon’s Managed SD WAN allows you to do just that. Viptela and Verizon bring this fully integrated and customizable hybrid networking solution, and help you implement and manage it to fit your specific business needs.
In this on-demand webinar, our strategic partner Verizon joins us to discuss our Managed SD WAN solution. This session will explain how Managed SD WAN can help increase bandwidth, agility and reliability while maintaining security through real life use cases and in-field deployment scenarios.
In the first episode of "The DR Crowd", the IT helpdesk have hit the wall. Dealing with application performance issues and protecting the business from pesky ransomware infections has got everybody in a kafuffle. The team find out how you can't compare sloths to cheetahs and the secret to dealing with all their issues in one simple solution!
Europe’s General Data Protection Regulation (GDPR) is now a reality and organisations have until May 2018 to be compliant.
While that may not seem imminent, the complexity involved in addressing this shift makes it more important than ever for organisations to understand the regulatory requirements and how to action their business to prepare for them.
These regulations require you to take a fresh look at how you manage your data and information, specifically where you store your data – in the cloud or on-premise – and how to leverage it for analytics.
Join us on this webinar to hear from Commvault Advanced Solutions Group expert Thomas Sharkey.
Despite the rise of the cloud and increased reliance on web applications, native desktop applications are still highly relevant and often the delivery method of choice in enterprise IT. As penetration testers, we still see a number of very poorly architected native applications being used to protect extremely sensitive information.
This webcast will discuss some of the core issues relating to native desktop applications, why they are so frequent, and the severe impact that their insecurity can cause.
In the 2017 threat landscape, we propose that these flaws are not going away, and the industry isn't currently in a position to help developers resolve them effectively.
Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST.
It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Ian for his thoughts on the cyber security industry and in particular:
- The big breaches of 2016 and lessons to be learnt
- The current threatscape
- The big vulnerabilities on the horizon
- Ian's insights into how to keep your company secure in 2017
We look forward to you joining us for the session.
Databases are continuing to grow rapidly, creating scalability and performance challenges and escalating costs. Learn how Dell EMC all-flash storage standardizes your databases and applications on a modern, consolidated platform, manages copy data efficiently and accelerates your time to market.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
Por desgracia, el 2016 ha sido otro mal año para la seguridad informática. Si bien nuestro enfoque se centró en el aumento de las amenazas para los dispositivos del Internet de las cosas, a lo largo del año aparecieron diferentes amenazas de malware y varios eventos importantes en materia de seguridad. Todo esto tendrá una gran relevancia en el próximo año.
Nuestro webcast analizará el panorama de las amenazas en 2016 y se centrará en los aspectos a recordar ante la llegada del 2017.
Anche quest’anno la sicurezza informatica ha subito duri attacchi. L'attenzione verso le minacce che mirano ai dispositivi IoT è alta, ma nel corso dell'anno ci sono stati numerosi altri eventi negativi per la sicurezza e si sono diffusi nuovi malware. Tutto questo avrà ripercussioni sull’anno che sta per cominciare.
Questo webcast riesamina il panorama delle minacce 2016 considerando anche tutto ciò che è importante ricordare mentre avanziamo verso il 2017.
We’re starting to see the refining of techniques that have been built over a number of years. The past 5 years have been dominated by ransomware and economic espionage. While they haven’t gone away, cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have also started to become a part of the political landscape which has been particularly evident during US election where we have seen them being used for subversive purposes.
This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.
Gartner predicts hybrid clouds will be the most common cloud architecture by 2020. With AWS and VMware vSphere, companies have the ability to create a hybrid cloud architecture with ease. But what is the optimal storage architecture for a hybrid cloud? What’s the best way to build it? How do you guarantee your data will be highly-available and protected?
This webinar will answer those questions. Specifically, we will cover:
-Hybrid cloud architecture with AWS and vSphere
-Use Cases: backup, disaster recovery and more
-Demo: Learn how to replicate storage across vSphere and AWS
-Common management interface across on-premises vSphere and AWS deployments
**The first 100 attendees to register during the live webinar will receive a FREE $100 Amazon Web Services credit!**
Brian Cha, Solutions Architect, SoftNAS
Nous venons de vivre, une fois de plus, une année déplorable en termes de sécurité informatique. Mais bien que l'attention se concentre aujourd'hui sur les menaces toujours plus nombreuses pour les appareils IoT, l'année a été marquée par bien d'autres événements majeurs en matière de sécurité et d'attaques de malware. Et tous resteront des enjeux d'importance pour l'année à venir.
Ce webcast passera en revue le paysage des menaces en 2016 en insistant sur les points à retenir pour 2017.
Le rapport “FireEye Threat Report” pour la zone EMEA fourni une vision chiffrée des activités malveillantes recensées par la plateforme de sécurité de FireEye tout au long du premier semestre 2016.
Lors de ce webinaire nous vous présenterons les chiffres, tendances et potentielles implications pour les organisations européennes.
Motivés par différents objectifs, financiers, politiques ou activistes par exemple, les groupes APT augmentent leurs capacités, leurs sophistications d’approches afin de récupérer leur butin: Propriété Intellectuelle, numéraire, avantage concurrentiel.
Ce webinaire, à travers un retour de statistiques réelles provenant du terrain via les alertes de nos clients et les investigations de nos équipes, présentera les tendances par verticales de marché et par pays sur la zone EMEA.
Mandiant, a FireEye company, has recently discovered the use of Shamoon malware targeting GCC based organizations. The identified malware exhibits destructive behavior on Windows based Operating systems. The malware uses a signed RawDisk driver from EldoS. Mandiant suspects the objective of the malware is to render a disk unbootable.
Join Stuart Davis as he details what you need to know to protect against this type of malware recently seen in the Middle East.
Wieder einmal war es ein schlechtes Jahr für Computersicherheit. Doch obwohl wir uns jetzt zum Jahresende verstärkt mit der erhöhten Gefahr durch IoT-Geräte beschäftigen, gab es im vergangenen Jahr eine Vielzahl anderer signifikanter Sicherheitsvorfälle und Malware-Bedrohungen. Und sie alle haben eine Bedeutung für das kommende Jahr.
Dieser Webcast hält eine Rückschau auf die Bedrohungslandschaft 2016 – mit Schwerpunkt auf den Dingen, die wir für 2017 im Gedächtnis behalten sollten.
Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017?
In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine these trends and highlight key tactics to better prepare you for what the coming year may bring. We’ll explore:
Key factors in today’s security landscape that shape our future defense strategies:
•Many attacks are about money today, what will they be about tomorrow?
•Without DNS, there’s no Internet as we know it. Recent attacks against DNS have set new records for scale and taken down some of the Internet’s biggest names. What’s your strategy for assuring that DNS doesn’t fail your business?
•The hidden agenda of attackers who use these techniques as a means to a more serious end
•Tactics for strengthening your resilience, to better prepare you for the coming year – and beyond
Has your security strategy responded to these factors – and is it ready to take the hit from what may come next? Join us to learn more about what your organization can do to be better prepared for these too-often hidden aspects of highly visible threats.
Google has recently announced expansion of their cloud storage service. It offers similar service levels as Amazon S-3 and Glacier, but with simplified pricing. How viable is their cloud storage product for the average customer? How do their service levels compare to Amazon and Azure service levels? What about pricing? Is it really that different? And what are some example use cases?
Other questions center around applications that support these offerings. If an application supports Amazon, will it be easy for them to support Google? Is there anything about Google cloud storage that makes it easier or harder for service providers to work with them?
If you’re concerned about the challenges of vendor lock-in, and how it impacts your organisation’s ability to adopt new technologies, join this webinar in which Nigel Tozer, Commvault Solutions Marketing Director, will reveal ‘3 Ways to Achieve Workload Portability’ for application, virtual and big data workloads.
This webinar is an expanded version of the speaker session delivered by Nigel at the Gartner Data Center, Infrastructure & Operations Management Summit in London on 29 November 2016.
Black Friday and Cyber Monday are behind us, but if you are still working on your holiday shopping then you may be thinking about the risks associated with online payment options. Just in time for the 2016 shopping season, the PCI Security Standards Council recently announced changes to the Payment Card Industry Data Security Standard (PCI DSS).
While usually associated with retail and financial services, PCI DSS compliance is in fact a challenge that crosses industries since online transactions are essential for any digital business. Join this webinar to learn how leaders from different industries are running network security policy orchestration to ensure continuous compliance with PCI DSS requirements.
Ransomware has become the Number 1 threat facing organizations in 2016; and it is of particular threat to any company that relies heavily on documents to run their business. With adoption of cloud computing for more mission-critical use cases growing, IT leaders are naturally concerned about protecting against ransomware in the cloud as well as on-premise.
Join the Chief Cybersecurity Officer of Trend Micro and the CTO of iland for this webinar where they'll delve into the significant threat that Ransomware poses to enterprise IT organisations - and discuss how to protect and remediate your business from ransomware attacks in the cloud.
This webinar will look into how Ransomware has changed; and how it’s becoming more targeted and harder to identify. With email still being the number 1 attack vector and a reported 70% of spam now delivering Ransomware, we will look at how advanced sandboxing technology can be used to identify new and unknown threats, like Ransomware, and why you need a robust disaster recovery and back-up plan.
What will be covered:
· Insight into Trend Micro’s ransomware and 2017 threat predictions
· Threat detection techniques to identify new and unknown threats
· How Trend Micro threat intelligence is integrated in the iland cloud platform
· How a cloud-based disaster recovery and back-up plan helps remediate ransomware attacks
Any organization that takes a moment to study the data on their primary storage system will quickly realize that the majority (as much as 90 percent) of data that is stored on it has not been accessed for months if not years. Moving this data to a secondary tier of storage could free up massive amount of capacity, eliminating a storage upgrade for years. Making this analysis frequently is called data management, and proper management of data can not only reduce costs it can improve data protection, retention and preservation.
The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.
To support this demand the service desk must be aware of and prepared for several key trends:
•Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?
•Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?
•New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?
Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.
Join former developer and current Product Manager Ryan Meek for an informative webcast where he will take a deep dive into advanced object storage. Ryan will review protocols, metadata and data protection, with a focus on performance and high availability at petabyte scale. With live Q&A throughout, this webcast is geared towards application developers, software and storage architects.
Storage Switzerland and HyperGrid recently held a webinar entitled "How and Why to Containerize Your Legacy Applications.”. It is one of our highest attended webinars this year. The number one request from that webinar? "I want to see this thing work!" To answer that request Storage Switzerland and HyperGrid are conducting another webinar where we will review how to containerize legacy applications, provide a couple of specific examples of how customers are using and benefiting from containerized legacy applications and, most importantly, have a live demo showing a legacy application’s transformation into a modern, containerized application.