Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • When Bad Things Happen to Good Data:  Plan For & Achieve Business Continuity When Bad Things Happen to Good Data: Plan For & Achieve Business Continuity Jon Toigo, Chairman, Data Management Institute Jul 28 2016 1:00 pm UTC 45 mins
    High Availability doesn’t trump Disaster Recovery and there is nothing simple about creating a recovery capability for your business – unless you have a set of data protection and business continuity services that can be applied intelligently to your workload, managed centrally, and tested non-disruptively. The good news is that developing such a capability, which traditionally required the challenge of selecting among multiple point product solutions then struggling to fit them into a coherent disaster prevention and recovery framework, just got a lot easier.

    Join us and learn how DataCore’s Software-Defined and Hyper-Converged Storage platform provides the tools you need and a service management methodology you require to build a fully functional recovery strategy at a cost you can afford.
  • Object Storage for Developers, Part 2 Object Storage for Developers, Part 2 Ryan Meek, Product Manager Jul 28 2016 4:00 pm UTC 60 mins
    Join us for this insightful look into object storage for developers with Caringo Product Manager Ryan Meek. Ryan will take a close look at best-of-breed object storage architectures and discuss best practices for product integration through the HTTP REST API and the upcoming Dart SDK module and Search API.
  • MeetTheCEO: Spectra Logic's CEO Nathan Thompson MeetTheCEO: Spectra Logic's CEO Nathan Thompson Charlie Hodges, George Crump Aug 2 2016 2:00 pm UTC 60 mins
    Spectra Logic's Nathan Thompson is our guest on this MeetTheCEO podcast with Storage Swiss’ George Crump and Charlie Hodges. The team will discuss Nathan's new book “Society’s Genome: Genetic Diversity’s Role in Digital Preservation” and how enterprises can overcome the challenge of preserving an organization's knowledge base and evolutionary approaches to safeguarding it forever.

    Join us for this live conversation and get your long term data preservation questions answered by our panel of experts.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Damia Gilner, Field Marketing Manager, DataCore Software Aug 2 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Building Modern Business Applications in a Mobile First, Cloud First Universe Building Modern Business Applications in a Mobile First, Cloud First Universe John Wilson, Sales and Business Process Executive Aug 2 2016 6:00 pm UTC 60 mins
    An overview of a secure, fast solution to building user apps that takes advantage of existing Microsoft collaboration tools like Office 365 in a mobile first, cloud first universe.
  • Demystifying the Cloud Series - Business Benefits of the Cloud Demystifying the Cloud Series - Business Benefits of the Cloud Mark Skoog, Technical Solutions Professional Aug 3 2016 6:00 pm UTC 60 mins
    In a digital economy, we shift to empowering employees and customers to innovate while embracing new business models and approaches. The new world requires reevaluation of how you improve productivity, move faster, do more with your infrastructure, and do it all securely.

    In this webcast, viewers will learn:
    •Key reasons why businesses are moving to the cloud
    •How to empower employees through improved productivity
    •Optimizing operations through leveraging cloud solutions
  • ClearCase to Subversion: Get More Agile ClearCase to Subversion: Get More Agile Doug Robinson Aug 4 2016 5:00 pm UTC 60 mins
    For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Join us to learn how moving from ClearCase to Subversion/MultiSite can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion/MultiSite migration techniques.

    Topics covered include:

    - Differences and similarities between Subversion and ClearCase
    - Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    - ClearCase vs. Subversion in a distributed development environment
    - Migrating from ClearCase to Subversion
  • Demystifying the Cloud Series - Top 5 Ways to Transition to the Cloud Demystifying the Cloud Series - Top 5 Ways to Transition to the Cloud Mike Gannotti & Todd Furst, Technical Solutions Professionals, Microsoft Aug 4 2016 6:00 pm UTC 60 mins
    With so much information floating around, how should you get started with the cloud transition in your organization?

    In this webcast, viewers will learn:
    •How to properly evaluate your potential needs
    •What are the top 5 ways to get started with your transition to the cloud
  • Arcserve's High Availability Software For All Arcserve's High Availability Software For All Kervin Myrtil, Chris Rockholt, & Gary Sussman Aug 4 2016 6:00 pm UTC 60 mins
    Because Fortune 500s shouldn’t be the only ones to guard against expensive downtime.

    Meet Arcserve High Availability—your data geek that never sleeps.
  • Demystifying the Cloud Series - Scaling your Business with the Cloud Demystifying the Cloud Series - Scaling your Business with the Cloud David Hansford, Microsoft Aug 5 2016 6:00 pm UTC 60 mins
    Your business naturally needs to change over time, so how do you ensure your IT solutions keep pace? One solution: get the best of both worlds by leveraging your current infrastructure while accessing cloud resources to flexibly scale to meet demand.

    In this webcast, viewers will learn:
    •What flexible, scalable IT infrastructure looks like
    •How to move workloads to the public cloud while maintaining a complete view of your existing infrastructure
    •How to think about storage, backup and recovery for mission critical activities
  • The Next Generation of Cyber Crime is here The Next Generation of Cyber Crime is here Rob Coderre Aug 9 2016 1:00 pm UTC 45 mins
    Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.
  • Demystifying the Cloud Series - Best Practices for Security in the Cloud Demystifying the Cloud Series - Best Practices for Security in the Cloud Paul Edlund, Technical Solutions Professional, Microsoft Aug 9 2016 6:00 pm UTC 60 mins
    With the shift to the cloud, how do you ensure you retain control of your data? Security, compliance and privacy are all paramount to making the most of leveraging the cloud.

    In this webcast, viewers will learn:
    •What are best practices for security in the cloud
    •How to securely and easily manage and deploy solutions across the organization
    •Modern techniques for data loss prevention
  • Securing Your Organization with a Network Sandbox Securing Your Organization with a Network Sandbox Brook Chelmo Aug 9 2016 6:00 pm UTC 45 mins
    Businesses of all sizes are being attacked with new forms of threats trying to exploit recently discovered vulnerabilities in systems. With over 64 million unique pieces of Malware detected last year, hackers are making it more difficult for traditional anti-malware software to keep up. So how can organizations keep their networks safe? Security researcher and advocate, Brook Chelmo will briefly talk about Network Sandboxing and how to stop unknown threats. Brook will talk about ways to stop advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to stop them.

    1.Learn how to stay safe from current and common attacks with advanced security technology
    2.Learn how to practice good security hygiene
    3.Understand how the threat landscape changes day to day with a hundreds of thousands of pieces of malware being authored daily.
  • Delivering Data Security with Hadoop and the IoT Delivering Data Security with Hadoop and the IoT Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security Aug 9 2016 10:00 pm UTC 60 mins
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Laurence Pitt, Solution Marketing - Symantec & Robert Westervelt, Research Manager - IDC Security Aug 10 2016 10:00 am UTC 60 mins
    Endpoint security is a critical component in an organisation's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources. But identifying custom malware and sophisticated attacker techniques requires an approach that combines existing security investments with modern defenses to protect critical corporate assets.

    In this webinar you'll learn about:

    •Why organisations of all sizes are increasingly targeted by criminals using advanced tactics and zero-day attacks designed to bypass traditional antivirus and remain stealthy on systems.

    •What technologies typically make up modern threat protection solutions, from sandboxes, advanced machine-learning, to behavioral analytics systems to quickly identify infected endpoints and determine the scope of an attack

    •Why endpoint visibility must be combined with network, web, and messaging security solutions
  • Sécurité intelligente des terminaux: une nouvelle approche est nécessaire Sécurité intelligente des terminaux: une nouvelle approche est nécessaire Hervé Doreau, Directeur Technique – Symantec France Aug 10 2016 12:00 pm UTC 45 mins
    La sécurité des terminaux est un composant essentiel dans votre politique de sécurité. Il est important que vous ayez la visibilité nécessaire pour détecter rapidement les menaces et les contenir avant que les attaquants ne puissent accéder à vos ressources critiques. Hors, l’identification des variantes de malwares et des techniques sophistiquées d’attaques requière une approche combinant vos infrastructures existantes de sécurité avec des moyens de défense modernes pour protéger votre capital d’entreprise.

    Lors de ce webcast, nous vous proposons d’en savoir plus sur :

    •les menaces avancées et vulnérabilités zero-day utilisées dans les attaques ciblées pour contourner les défenses traditionnelles et s’installer furtivement sur les systèmes des entreprises de toutes tailles,
    •les technologies qui sous-tendent les solutions modernes de protection contre les menaces : sanboxing, advanced machine-learning, analyse comportementale pour identifier rapidement les terminaux infectés et déterminer l'ampleur de l’attaque,
    •le bénéfice de la visibilité sur les terminaux combinée à des solutions sécurité réseau, web et messagerie.
  • Intelligente Sicherheit für Endgeräte: Darum ist ein zeitgemäßer Ansatz wichtig Intelligente Sicherheit für Endgeräte: Darum ist ein zeitgemäßer Ansatz wichtig Alexander Peters, Senior Manager Office of the CTO - Symantec Germany Aug 10 2016 1:00 pm UTC 45 mins
    Sicherheit für Endgeräte ist ein entscheidender Bestandteil des Sicherheitskonzepts in Unternehmen. Sie ist erforderlich, um Bedrohungen rasch identifizieren und eindämmen zu können, bevor Kriminelle sich Zugriff auf wichtige Ressourcen verschaffen. Um zielspezifisch angepasste Malware und raffinierte Angriffstechniken zu erkennen, braucht es jedoch einen Ansatz, der bestehende Investitionen in Unternehmenssicherheit mit modernen Abwehrtechnologien kombiniert, um wichtige Unternehmensressourcen zu schützen.

    In diesem Webinar erfahren Sie,

    •warum Unternehmen jeder Größe zunehmend ins Visier von Kriminellen geraten, die innovative Taktiken und Zero-Day-Angriffe anwenden, um herkömmliche Antivirusprogramme zu umgehen und sich heimlich dauerhaften Zugang zu Systemen zu verschaffen.
    •mit welchen Technologien zeitgemäße Lösungen für den Bedrohungsschutz arbeiten – von Sandboxing über erweitertes maschinelles Lernen bis zu Systemen zur Verhaltensanalyse, um auf schnellstem Weg infizierte Endgeräte zu erkennen und das Ausmaß eines Angriffs zu ermitteln.
    •warum Transparenz für Endgeräte mit Sicherheitslösungen für das Unternehmensnetz, das Internet und Messaging-Systeme kombiniert werden muss.
  • Executive Webinar Series: Tufin is the Strategic Vehicle for Cloud Security at D Executive Webinar Series: Tufin is the Strategic Vehicle for Cloud Security at D John Parmley, Area VP, Tufin Aug 10 2016 3:00 pm UTC 30 mins
    The business doesn't care about infrastructure. As you shift your focus to productivity and time-to-market you need a way to ensure compliance with security policies and regulations without slowing down the business. What if you could accomplish this with the Tufin solution you already own? Instead of searching for new tools, join this webinar to learn how Tufin Orchestration Suite can maximize agility, inherent with security and enable you to turn your vision and strategy into reality.

    John Parmley, Tufin area VP and an expert with >25 years of experience in the security space, will share how enterprise customers around the world use the Tufin Orchestration Suite to:
    •Gain visibility and control into public cloud platforms and across the hybrid network
    •Tighten security posture and accelerate audit readiness with continuous compliance
    •Boost agility via end-to-end change automation with inherent security control
  • The New World of Field Service: Delivering Remarkable Customer Experiences The New World of Field Service: Delivering Remarkable Customer Experiences Jim Burkeholder, Dynamics Field Service Sales, FieldOne Aug 10 2016 6:00 pm UTC 60 mins
    What is a great customer experience? How can your mobile workforce not only provide great service, but delight your customers? How can you continue to increase customer satisfaction yet reduce costs to deliver exceptional service? In this session, you will learn from FieldOne and FPL FiberNet, a wholly-owned subsidiary of NextEra Energy, how to delight your customers and your CFO by changing the way you think about delivering services.
  • Disaster Prevention: Best Practices for Backup and Recovery Disaster Prevention: Best Practices for Backup and Recovery Manjot Singh, Data & Infrastructure Architect at Percona Aug 10 2016 6:00 pm UTC 45 mins
    In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.
  • Intelligent Endpoint Security: l’importanza di un approccio moderno Intelligent Endpoint Security: l’importanza di un approccio moderno Antonio Forzieri - Cyber Security Symantec Strategist Aug 11 2016 8:00 am UTC 45 mins
    Componente fondamentale del programma di sicurezza di un’azienda, la sicurezza degli endpoint è indispensabile per acquisire la visibilità necessaria a rilevare rapidamente le minacce e contenerle prima che i criminali riescano ad accedere a risorse preziose. L’identificazione di specifici malware e di tecniche di aggressione sofisticate richiede un approccio che unisca le misure di sicurezza preesistenti a strategie di difesa evolute, in grado di proteggere il patrimonio delle risorse aziendali.

    In questo webinar scoprirai:

    • Perché aziende di ogni grandezza sono sempre più spesso nel mirino di criminali che usano tattiche avanzate e attacchi zero-day studiati per aggirare gli antivirus tradizionali e restare invisibili sui sistemi.
    • Quali sono le tecnologie oggi comunemente usate nelle soluzioni di protezione dalle minacce – dalle sandbox e dall’apprendimento automatico avanzato ai sistemi di analisi dei comportamenti – per identificare rapidamente gli endpoint infetti e determinare la portata di un attacco
    • Perché la visibilità degli endpoint è un componente essenziale delle soluzioni di protezione di reti, web e messaggi
  • Seguridad inteligente en los endpoints: la importancia un enfoque moderno Seguridad inteligente en los endpoints: la importancia un enfoque moderno Ramsés Gallego - Symantec Strategist Aug 11 2016 9:00 am UTC 45 mins
    La seguridad en los endpoints es un componente fundamental del programa de seguridad de toda organización. De hecho, es imprescindible para obtener la visibilidad necesaria con el fin de detectar las amenazas rápidamente y contenerlas antes de que los criminales puedan acceder a sus recursos más importantes. Sin embargo, para identificar el malware personalizado y las sofisticadas técnicas de los atacantes necesita un enfoque que combine sus inversiones actuales en seguridad con mecanismos de defensa modernos para proteger efectivamente sus activos corporativos más importantes.

    En este webminario le desvelaremos:

    • Por qué las organizaciones de todos los tamaños están sufriendo cada vez más ataques de día cero y otras amenazas de técnicas avanzadas, todos diseñados para burlar los antivirus tradicionales y mantenerse ocultos en los sistemas.
    • Qué tecnologías son las que conforman generalmente las soluciones modernas de protección frente a amenazas: desde tecnologías de aislamiento, aprendizaje avanzado sobre la máquina, hasta sistemas de análisis de conducta para identificar rápidamente los endpoints infectados y determinar el alcance del ataque.
    • Por qué la visibilidad del endpoint debe combinarse con las soluciones de seguridad de la red, web y mensajería.
  • Big Data Storage: Options & Recommendations Big Data Storage: Options & Recommendations TBD Aug 11 2016 5:00 pm UTC 60 mins
    Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices, including solid-state or spinning disk for clusters and enterprise storage for compatibility layers and connectors.

    In this webinar, our experts will review the storage options available to Hadoop architects and provide recommendations for each use case, an active-active replication option that makes data available across multiple storage systems.
  • Microsoft Visio Video Guide: How to Interact with AutoCAD Drawings Microsoft Visio Video Guide: How to Interact with AutoCAD Drawings David Parker, Founder, bVisual Aug 11 2016 6:00 pm UTC 60 mins
    Layout and design is one of the key Visio scenarios loved by architects, engineers, and operations teams. Come learn about how the latest features can make office and facilities management easier and more collaborative. And get the best practices to import and simplify AutoCAD files and add data visualizations on top of your processes and plans
  • Maintaining Organizational Trust in IT: Is Your Data Ready for a Disaster? Maintaining Organizational Trust in IT: Is Your Data Ready for a Disaster? Dan Thompson, 451 Research; John Freimuth, Digital Realty Aug 11 2016 6:00 pm UTC 60 mins
    For many firms, particularly smaller and medium-sized ones, disaster recovery (DR) systems are seen as necessary but expensive and they are low on the list of priorities. This was certainly true in previous years, when backup/DR involved copying data regularly to a duplicate set of hardware, often in a second datacenter. However, with the growth of cloud and prevalence of colocation, there are ever more options for backup and DR, including DR-as-a-Service options that can be much more cost-effective.

    However, IT decision makers have been primed to proceed with caution when it comes to the transition of services from inside their four walls to a cloud provider’s data center – and for good reason. The dizzying array of services offered today, and the perceived loss of control, weigh heavy on the minds of admins and leadership alike.

    If disaster recovery is important to you, but you’re unsure how to navigate the litany of products and services available today, get started by understanding the basics, and learn about what your peers are doing to solve the real world problems of DR.

    In this webinar we’ll take a look at 3 key considerations when doing DR planning:

    1.How have cloud services changed the possibilities for RTO / RPO objectives?

    2.Why are latency and carrier options important to DR planning?

    3.Why (and how) are other organizations leveraging colocation as part of their overall DR strategy?