The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Andy Lawrence, Executive Director of Research; Chris Brown, CTO; Todd Traver, VP IT Optimization & StrategyRecorded: Jan 23 201959 mins
Members of Uptime Institute’s executive team discuss the newest findings about data center outages, including trends in causes and types, along with strategies for reducing the number and impact of outages.
Marco Riboli, VP Southern Europe di FireEyeRecorded: Jan 23 201936 mins
Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.
Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:
•Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
•Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
•Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa
Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
David Hines, Vice President of Architecture and Engineering - TierPointRecorded: Jan 22 201947 mins
As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.
A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.
Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
Tony Liau, Veritas & Matt Sirbu, SoftchoiceRecorded: Jan 22 201941 mins
Digital transformation is causing infrastructure to evolve faster than ever and managing data must be the top priority for any modern enterprise. Most organizations are working towards transforming their IT infrastructure and its associated capabilities, but traditional environments are being disrupted by cloud, virtualization, open source and hyper converged infrastructure. The need for holistic modern data management remains as crucial as ever to navigate this complexity and leverage information for strategic advantage.
Join us on this webinar as Tony Liau, Director, Product & Solutions Marketing at Veritas Technologies and Matt Sirbu, Director of Data Management & Data Center Infrastructure at Softchoice discuss how the most important barrier to adopting hybrid IT is to have an intuitive data management solution.
Attendees of this webinar will learn how you navigate through these IT obstacles to build an agile solution that extends across on-prem and off-prem architectures.
About the speakers:
Tony brings over 15 years of enterprise experience to Veritas, taking innovative data management solutions to market. In his current role as Director and Head of Product & Solutions Marketing for Data Protection and management, he leads product launch, go-to-market and global campaign strategy. Before joining Veritas, Tony held senior roles at other data protection and security companies such as Barracuda Networks, Symantec and Cisco.
Matt Sirbu has spent over two decades in Information Management; focusing on Data Center Optimization, Protection, Availability and Data Intelligence solutions. Having covered most market segments across North America, he has demonstrated an ability to enter new industries, learn their unique requirements, and develop comprehensive strategic direction with exceptional results. He joined Softchoice in July of 2015, coming from Dell where he was the Director of Storage Strategy for North America.
John Bell, Sr. Consultant & Brian Guetzlaff, Engineering ManagerRecorded: Jan 22 201955 mins
In this webinar, John Bell and Brian Guetzlaff will explore the advanced capabilities of Caringo Swarm’s Content Management API, including managing user access, usage and content (using collections and metadata). They will provide a live demonstration and show you how to use the Swarm Object Storage Content Portal User Interface (UI). Attendees will also have the opportunity to ask questions throughout the webinar.
Donna Johnson, Vice President of Product and Solution Marketing, CradlepointRecorded: Jan 22 201941 mins
With the arrival of Gigabit-Class LTE network solutions for enterprises and public safety agencies, the era of wireless WAN is here — and enterprise networking will never be the same. Utilizing Elastic Wideband technology, Cradlepoint’s new cloud-managed routers featuring built-in Gigabit-Class LTE modems provide the speeds, reliability, and flexibility necessary to drastically improve existing use cases, and to enable new ones that have never been possible in branch or vehicle settings.
With game-changing Gigabit-Class LTE, which leverages technologies that are foundational pieces of 5G, wireless now meets or exceeds other broadband networks, but with the added value of mobility, immediate deployment, and standardized billing on a single nationwide carrier.
Join Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore how the world’s first Gigabit-Class LTE solutions for enterprise networking can revolutionize wireless WAN and put organizations on the Pathway to 5G.
Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & SullivanRecorded: Jan 22 201944 mins
In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.
With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.
• Do perceptions of customers in the business community align with consumer reality?
• What makes (or breaks) consumer digital confidence in organizations?
• Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
The domain name system (DNS) is at the heart of everything we do.
The internet has grown up around this signposting system that allows us to browse the web and allows applications and programs to find the systems they need to operate. We couldn’t do without it.
This short film shows how the DNS works and explains why it’s exploited by cyber criminals. That makes it the perfect place for us to detect signs of cyber threats and protect organisations against them.
Aaron Cockerill, Chief Strategy OfficerRecorded: Jan 22 201929 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Jon Gery International IT Manager, GameStop and Seyi Verma Product Marketing Director, DruvaRecorded: Jan 22 201951 mins
GameStop, a global Fortune 500 company (NYSE: GME), needed an efficient cloud backup and recovery solution to meet business continuity requirements across its 7,200 retail stores in 14 different countries. The company had a myriad of virtualized environments with over 250TB of data but its on-premises backup infrastructure and procedures were so complex and inefficient, that GameStop was unable to meet business continuity SLAs.
GameStop turned to Druva, and secured its data in enterprise server workloads and virtual environments through Druva Phoenix. Register for this webinar with special guest speaker Jon Gery, International IT Manager at GameStop, to hear how the company was able to:
- Unify global data protection requirements within a single system
- Increase the backup footprint of virtual machines by 20%
- Easily achieve their business continuity SLAs
- Reduce backup and recovery operating expenses by 70%
Don't miss this informative webinar — Register today!
Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP ComplianceRecorded: Jan 21 201947 mins
What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.
Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.
This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.
Here's what they'll discuss:
-How to get executives and users to care about security and compliance
-Top of mind security or compliance issues (and tackling them)
-The toughest challenges they faced
Storage Switzerland, ClearSky DataRecorded: Jan 18 201919 mins
When most vendors talk about solving an organization’s storage problems, they typically are talking about solving their challenges in one of three categories: the data center, the edge or the cloud. The reality is that even within these three categories, most vendors only solve one of several problems: primary storage, secondary storage, archive storage or backup storage. IT needs a solution that can address not only all the categories of storage but also the types of storage within them.
Join Storage Switzerland and ClearSky to learn:
- The storage and data protection demand on the data center, the edge, and the cloud
- Why traditional data center, edge and cloud storage and data protection solutions fall short
- How to design an architecture that integrates data center, edge and cloud storage architectures and solves the storage and data protection problem
Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis TeamRecorded: Jan 18 201953 mins
Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.Recorded: Jan 17 201965 mins
With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:
- Implement security analytics for incident detection and response.
- Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
- Leverage AI to autonomously respond to emerging threats before they can do serious damage.
- Understand key information that needs to be communicated to various stakeholders in the event of a breach.
- Apply a “standard of due care” in order to prove compliance to regulatory agencies.
Storage Switzerland, Axellio Inc.Recorded: Jan 17 201962 mins
Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
Cody Hosterman, Pure Storage; Jason Massae, VMware; J Metz, CiscoRecorded: Jan 17 201965 mins
With all the different storage arrays and connectivity protocols available today, knowing the best practices can help improve operational efficiency and ensure resilient operations. VMware’s storage global service has reported many of the common service calls they receive. In this webcast, we will share those insights and lessons learned by discussing:
- Common mistakes when setting up storage arrays
- Why iSCSI is the number one storage configuration problem
- Configuring adapters for iSCSI or iSER
- How to verify your PSP matches your array requirements
- NFS best practices
- How to maximize the value of your array and virtualization
- Troubleshooting recommendations
Sander Puerto, Sr. Product Marketing Manager, DataCore SoftwareRecorded: Jan 16 201945 mins
Did you know that unplanned downtime at a healthcare organization can cost an average of $7,900 per minute? This is a fact reported by the Ponemon Institute.
Join our webinar, which also includes a live demo and audience Q&A to learn:
- How to keep patient and systems data accessible, even during a natural or unexpected disaster
- How to keep mission-critical applications running 100% of the time, even if there is a hardware failure
- How to protect the privacy and security of patient information against cyber attacks
- How to easily migrate and consolidate data due to mergers and acquisitions
- How to accelerate high I/O workloads without spending your budget on expensive All-Flash storage appliances
Storage Switzerland, KeepItSafe, VeeamRecorded: Jan 16 201956 mins
Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster strikes. DRaaS resolves these issues by creating an on-demand DR site where the cloud delivers IT resources as they are needed. IT planners though, may overlook some aspects of DRaaS solutions, especially when using the large public cloud providers.
In this webinar join Storage Switzerland, Veeam and KeepItSafe where we leverage a panel of backup and recovery veterans to identify common oversights seen in organizations’ DRaaS strategies and how to address them.
Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle ResearchRecorded: Jan 16 201944 mins
Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.
Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, TufinRecorded: Jan 16 201952 mins
Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?
Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.
Tufin Orchestration Suite R18-3 GA delivers:
- New workflow support for Cisco and Palo Alto Networks NGFWs
- Policy-based routing automation for Cisco network devices
- New reporting options
- Methods to identify risk for non-zone included IPs for risk flows
Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
Mor Cohen-Tal, CTO of Cloud at Turbonomic and Tom Reynolds, Director of Technology Solutions at Razor TechnologyRecorded: Jan 16 201958 mins
Are you tasked with transforming your data center to meet today’s Cloud Computing needs? If yes, you know a migration is easier said than done. From deciding what cloud is best for your environment to avoiding cloud cost-overruns and performance problems, these are just some of the headaches that IT Leaders are facing today.
Join Turbonomic CTO of Cloud, Mor Cohen and Razor Technology Director of Technology Solutions, Tom Reynolds on Wednesday, January 16th at 11am EST, as they reveal how an intelligent strategy paired with an AI driven solution can ensure a safer and faster cloud migration.
Our Executive Panel will Discuss:
- Managing Lift-and-Shift migrations while avoiding cost over-runs
- How to continuously optimize your hybrid cloud environment to assure performance & compliance at the lowest cost to the business
- Save up to 40% on your Cloud Bill
Kapil Chhabra, Principal Product Manager at Rubrik and Aaron Delp, Director of Technical Solutions at RubrikRecorded: Jan 16 201930 mins
Native replication in NoSQL databases such as MongoDB, Apache Cassandra, and Datastax, provides high scale and availability. However, does it provide protection of critical data against logical errors and data corruption? Is native replication a good substitute for disaster recovery and other enterprise backup needs? Is your database protected for compliance and governance use-cases?
Watch this 30 minute webinar to learn about the top fallacies of using only native NoSQL database replication and the consequences of this approach to enterprise backup and recovery.
Sheila FitzPatrick President FitzPatrick & Associates, Patrick McGrath Digital Transformation Leader CommvaultRecorded: Jan 15 201952 mins
Companies raced to meet the May 2018 deadline to meet Europe’s General Data Protection Regulation with varying degrees of success, but if they learned anything since it is this: GDPR isn’t a one and done exercise. The GDPR might be the most eye-catching data privacy law on the books because of the outsized potential fine (up to 4% of revenue), but it is simply one of the first and most far-reaching such laws. Many more are emerging around the world and, indeed, in many US states. Some of the regulations overlap, while others conflict, meaning organizations face the ugly reality of having to deal with a patchwork quilt of laws.
In this webinar we’ll examine:
- Lessons learned to date
- The key differences between the new regulations
- Pain points companies are having (simply shutting off customers in
the EU is not a sustainable practice)
- Best approaches moving forward
Gregory L. Schlegel, CPIMRecorded: Jan 15 201960 mins
Supply chains are becoming ever more complex, particularly with the increase in outsourcing and the advancement of multi-tiered global supply networks. More and more organisations are now faced with direct and continuously evolving operational and legislative risks as a result of global market disruption or malpractice in their supply chains.
“Supply chain risk management is the implementation of strategies to manage every day and exceptional risks along the supply chain, underpinned by continuous risk assessment with the objective of reducing vulnerability and ensuring continuity.” (Supply Chain Risk Management: An Emerging Discipline”)
This Supply Chain & Risk Management webinar provides participants with a glimpse of the global supply chain risk landscape. Definitions of risk management and new techniques and tactics to mitigate risk will be discussed, along with profiles of early adopters of Supply Chain Risk Management.
Attend this Supply Chain & Risk Management webinar and get a brief introduction on how to:
Identify global supply chain risks
Assess risks within your supply chain
Mitigate risks throughout your enterprise with new tools and tactics
Manage volatility, uncertainty, complexity, ambiguity and risk
Create a resilient supply chain
Analyse des données :
Depuis les sauvegardes et les données de production
Content Indexing :
Détection de type de données (RGPD)
Recherche conformité : eDiscovery, legal hold
Gestion des données sensibles
Patrick Smith, Pure StorageJan 24 201910:00 amUTC45 mins
The increasingly competitive climate within Financial Services means that enhancing business outcomes by leveraging AI is essential. Data has never been more important to business success and a key aspect to optimising its value is in conjunction with AI.
In this session we will discuss the areas in which Financial Services are looking to leverage their data together with AI and some of the considerations for successful implementation of an AI infrastructure that accelerates time to value for these projects.
Mike Harding, Product Manager - Microsoft Storage Solutions, HPEJan 24 20194:00 pmUTC60 mins
Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
Richard Pauly, Head of DX | Bart Peluso, Head of Product Marketing | Chieng Moua, Solutions Engineering ManagerJan 24 20194:00 pmUTC60 mins
Following the launch of the Blue Prism Digital Exchange, come and join us for our inaugural Pulse Online Webinar to see the platform in action, as well as a demo of the new features of Blue Prism's v6.4.
-= What is the Blue Prism Digital Exchange? =-
The Digital Exchange (DX) is a “shop window” for finding & consuming pre-built AI, cognitive & disruptive technologies. The DX gives global enterprise customers direct access to technologies from Blue Prism and its technology partners as downloadable connectors, reusable Visual Business Objects (VBOs) or via referrals to the partner via an easy-to-use storefront. Thanks to a robust ecosystem of partners, Blue Prism customers can instantly execute their choice of AI, Machine Learning, Analytics, OCR & more through open API’s.
-= What's new in v6.4? =-
* Integrated ‘Skills’ (Toolbar) in the product
* Simple drag & drop functionality.
* New Web API Services (‘API Configurator’) facilitates easier integration of APIs.
* Simplifies web services within a process flow.
-= Speakers =-
* Richard Pauly, Global Head of the Digital Exchange, Blue Prism
* Chieng Moua, Solutions Engineering Manager, Blue Prism
* Bart Peluso, Global Head of Product Marketing, Blue Prism
Our panel of Blue Prism experts will be taking questions from the audience during the webinar, so make sure to join us for the live webinar.
Pulse Online is Blue Prism’s product and technology focused webinar series. Every last Thursday of the month, get hands-on demos, tactical insight and best practices for taking your Digital Workforce to the next level.
Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product MarkeJan 24 20195:00 pmUTC58 mins
IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
Storage Switzerland, Infinite IOJan 24 20196:00 pmUTC60 mins
Most organization’s use of public cloud storage resources is the hybrid use case. A hybrid cloud strategy enables organizations to leverage the location and resources that make the most sense for the given workload. A hybrid cloud strategy though requires a free-flow of information between on-premises and cloud storage. The problem is that most of the information exchange is metadata, not actual data and most cloud solutions don’t specifically address metadata acceleration.
- A clear understanding of why lack of metadata management breaks hybrid cloud
- Why most cloud solutions don’t solve the metadata problem
- How to finally fix the hybrid cloud meta problem and create the ideal hybrid cloud infrastructure
Andrew Klein, BackblazeJan 24 20196:00 pmUTC60 mins
At the end of 2018 Backblaze had over 750 petabytes of data storage on over 100,000 hard drives. We’ll examine the quarterly, yearly and lifetime failure rates for the hard drive models in service in our data centers. We’ll get our first look at the new 14 TB drives we started using in Q4 and get updates on the 8, 10, and 12 TB drives currently in service. In addition, we will:
•Take a look at the SMART stats we are collecting and what they are telling us.
•Compare the failure rates of consumer hard drives versus enterprise hard drives
•Compare the failure rates of helium-filled versus air-filled hard-drives
Ramin Ghassemi, Hakan ArslanbogaJan 28 20191:00 pmUTC61 mins
E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.
Дмитрий Иванюк, эксперт по решениям CommvaultJan 29 20198:00 amUTC90 mins
Приглашаем Вас и ваших коллег принять участие в техническом вебинаре "Защита gmail & gdrive"
В ходе вебинара вы сможете узнать:
- принципы работы Commvault Complete Backup & recovery
- методы защиты облачных решений от Google
- задать вопросы техническому консультанту Commvault
Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth SchneiderJan 29 20198:30 amUTC60 mins
Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.
Join security experts as they discuss:
- New on the threat landscape
- Notable cyber attack methods and strategies and how to protect against them
- Areas for improvement
- Solutions for network visibility, breach detection and response
- Recommendations for improving security and steps to take today
Elad Schulman, CEO, Segasec
Yoram Salinger, CEO, Perception Point
Mille Gandelsman, CTO and co-founder, Indegy
Guy Dagan, Cofounder and Partner, Consienta
Kenneth Schneider, VP Fellow, Symantec
Mike Hart, VP of Sales, Central EuropeJan 29 201910:00 amUTC45 mins
In der Cybersicherheitsbranche sind wir häufig so beschäftigt, dass der Jahreswechsel fast unbemerkt bleibt. Dies gibt Anlass, über die Entwicklungen und Erfahrungen aus den vergangenen zwölf Monate zu reflektieren und Strategien zur Bewältigung von Herausforderungen zu entwickeln.
In der IT-Sicherheits-Branche ist es zudem wichtig, neue und potenzielle Trends zu erkennen, die in Zukunft eine Rolle spielen könnten. Mike Hart, VP Central Europe bei FireEye, gibt Einblick zur Cybersicherheit im Jahr 2019.
Erfahren Sie mehr über:
- Bedrohungen für die Luftfahrtindustrie, einschließlich Cyberspionage und Cyberkriminalität.
- Was Sie von Angreifern aus etablierten und aufstrebenden Schwellenländern erwarten können.
- Wie Bedrohungsakteure ihre Taktiken ändern, um ihrem Gegenüber immer einen Schritt voraus zu sein.
In diesem Webinar erfahren Sie, wie Sie Cybersicherheitsbedrohungen immer einen Schritt voraus sein können.
Moshe Shlisel, Hal Lonas, Itai Tevet, Guy DaganJan 29 201911:00 amUTC60 mins
The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.
Join IoT and security experts to learn more about:
- Unique challenges of securing IoT systems
- IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
- Proactive security strategies to stave off the threat of IoT cyber attacks
Hal Lonas, CTO, Webroot
Itai Tevet, CEO, Intezer
Moshe Shlisel, CEO and Co-Founder, GuardKnox
Guy Dagan, Cofounder and Partner, Consienta
Iain Sinnott – Sales and Marketing director – VanillaIPJan 29 201911:00 amUTC30 mins
Technology is constantly evolving, and businesses are becoming more and more dependent on technology to run their businesses efficiently.
Technology is transforming businesses and disrupting entire industries. One of those industries that has been heavily affected is sales.
From prospecting to closing, today’s mobile, social, big data, and cloud technologies are revamping the sales process in ways that would have been unthinkable only a few decades ago.
As a result, many sales organizations are embracing new technologies to drive productivity, profitability, and competitive advantage to revamp the sales process.
With that in mind, here’s a look at some of the technological tools organizations are using to streamline the selling process:
-Sales Force Automation Systems
-Cloud-based CRM Technology
Reasons to Attend:
-Why individuals need to be involved in the choice of business productivity tools
-The different benefits different users derive
-Why learning to work with salespeople is the best way for buyers to avoid white elephants
Technology is constantly reinventing and improving, and the world is being constantly reinvented around it.
Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman, Avivit KotlerJan 29 20191:00 pmUTC60 mins
According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?
Join security experts across the industry for an interactive discussion on:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technolofy and human talent
- Coping with analyst fatugue
- Threats on the horizon
- Recommendations for strengthening security
Noam Erez, co-founder and CEO, XM Cyber
Aviv Grafi, CEO and co-founder, Votiro
Guy Dagan, Cofounder and Partner, Consienta
Avivit Kotler, CISO - Head of Cyber Security & Business Continuity, Clal Insurance
Kobi Freedman, Co-founder & CEO, IDRRA
Dr. Michael Teschner, Michael StraschydloJan 29 20191:00 pmUTC35 mins
Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, DruvaJan 29 20193:00 pmUTC40 mins
Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.
Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.
Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.
Don't miss this informative webinar - register today!
John Moran, Senior Product Manager, DFLabs Cody Mercer, Manager of Pre-Sales & Sales Marketing, DFLabsJan 29 20194:00 pmUTC60 mins
IncMan SOAR from DFLabs is the only Security Orchestration, Automation and Response (SOAR) platform available capable of full incident lifecycle automation, including built-in, automated threat intelligence gathering, risk assessment, triage and notification, context enrichment, hunting and investigating, threat containment and more.
This feature rich, unique and scalable solution provides context to security incidents, automates actions, orchestrates response to activities, while enabling full reporting and measurement functionality across all stakeholders. With its Open integration Framework, REST API and Automated START Triage, it is the most open and customizable SOAR platform in the industry, helping organizations to overcome some of the most common challenges and pain points when it comes to incident response.
Join this webinar to learn how to transform your Security Operations by using SOAR technology and discover how DFLabs can help you to detect, respond to and remediate all security incidents fast, before they impact your organization.
Key Features & Capabilities:
- Security Automation and Orchestration
- Threat Hunting and Investigation
- Incident Management
- Flexible Integrations and Event Parsing
- Forensic Evidence Management
- Reporting and KPIs
- Knowledge Transfer & Machine Learning
- Community Portal and Community Edition
Eran Brown CTO EMEA, INIFINDATJan 29 20197:00 pmUTC25 mins
With data security regulations on the rise globally, end-to-end encryption will have a dramatic effect on your IT infrastructure costs and operations. What's your plan to secure your data and stay within your budget? In this on-demand webinar, Eran Brown, INFINIDAT’s CTO for EMEA, will discuss how to strategically address these issues, recognizing the significant impact on the choice of large-scale storage when moving encryption higher in the IT stack.
Included in this webinar:
•An Overview of Regulatory Requirements
•Why Encrypted Data Matters for GDPR
•A Hacker's View of Your Data
•The Implications of Upstream Encryption
•AI/ML-Based Data Security
About Eran Brown
Eran Brown is the EMEA CTO at INFINIDAT.
Over the last 14 years, Eran has architected data center solutions for all layers — application, virtualization, networking and most of all, storage. His prior roles include Senior Product Management, systems engineering and consulting roles, working with companies in multiple verticals (financials, oil & gas, telecom, software, and web) and helping them plan, design and deploy scalable infrastructure to support their business applications.
Steve Hunsaker, Dir. Systems Engineering- DataCore, Kent Hansen, CIO- ArchNexus, Johnathan Kendrick Tech. Account Exec. - USIJan 29 20197:00 pmUTC60 mins
Join us to hear the story of Architectural Nexus, Inc. and Universal Systems Incorporated (USI). ArchNexus provides customized architectural, landscape and interior design services. As a company with over 100 power user engineers and architects, ArchNexus needed a storage solution to meet the company’s high demand for performance. With the help of USI and DataCore Software, ArchNexus found a smart and affordable storage solution.
In this webcast you will discover:
- A business problem & how it was solved
- The business impact
- The on-time and on-budget solution
- The ROI achieved
- How the customer would change the process or outcome
Are you searching for a smart storage solution that is right for your business? Please join us!
Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel KorenJan 30 20198:30 amUTC60 mins
With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.
Join security and business continuity experts as they review:
- Threats to cyber resilience and business continuity
- Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
- Attack trends and business preparedness
- Steps for enterprises to take today
Benny Czarny, Guy Dagan, Ariel Zeitlin, Diana KelleyJan 30 20191:00 pmUTC60 mins
"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.
Join cloud, security and compliance experts as they discuss:
- How to proactively analyze security risk from the business perspective
- What you need to know about your data, and how to ensure it is compliant when in the cloud
- How to automate security policy changes
- Top challenges for CISOs and CIOs
- Achieving security and compliance across multiple clouds
- Steps to take today"
Benny Czarny, CEO and Founder, OPSWAT
Guy Dagan, Cofounder and Partner, Consienta
Ariel Zeitlin, CTO and co-founder, Guardicore
Diana Kelley, Cybersecurity Field CTO, Microsoft
Denis Legezo, senior security researcher at Kaspersky Lab Global Research and Analysis TeamJan 30 20192:00 pmUTC15 mins
Kaspersky Lab Global Research and Analysis Team has recently detected multiple attempts to infect foreign diplomatic entities in Iran with homebrew spyware, that contains an updated version of Remexi backdoor. What do we know about this malware? What does it mean for the threat landscape? And is there a link between the spyware and the Chafer group – who has previously been known as a local threat actor in Iran?
Storage Switzerland, Western DigitalJan 30 20196:00 pmUTC60 mins
NVMe enables storage system vendors to once again raise expectations on the performance capabilities of all-flash arrays. NVMe provides a higher command count, greater queue depth and leverages the PCIe interface to deliver a significant increase in IOPS potential with a corresponding reduction in latency. NVMe though, brings with it some confusion about who can best benefit from the technology and what are the right steps to implementing it.
Watch the webinar and get answers to these questions:
- Can “regular” data centers benefit from NVMe or just companies specializing in AI?
- Does NVMe have to be end-to-end for data centers to benefit?
- Do features such as deduplication and compression impact performance?
- Does NVMe Flash mean that SAS Flash is no longer relevant?
Join us as we introduce the new and updated features of Backblaze Cloud Backup 6.0.
This release for consumers and businesses delivers:
- Restore by Mail hard drives that are twice the size - up to 8TB.
- The ability to archive data directly to Backblaze B2 Cloud Storage.
- Up to 50% faster backups.
- Create your own network blocklist to help avoid data caps.
- More efficient and performant Mac and Windows applications.
- Mobile enhancements for iOS and Android.
- SSO support with Google, and more
We'll walk you through many of these features such as archiving to B2 and explain how they can be helpful to you.