The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?
If you answered yes to any of these questions, you need to register for this webcast. You will learn:
•How to replicate any workloads to Microsoft's global datacenters
•How to back up data and protect workloads with nearly infinite scalability
•How to implement a hybrid replication using both cloud and on-premises solutions
•How to create a backup without needing to buy more tape
•How to back up your Windows clients (including Windows 10) to remote storage
Register now to watch live or receive notification when this program is available on-demand.
Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.
In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.
Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
Overhead power distribution in your data center offers many attractive possibilities, but is not without its challenges.
Join Starline's Director of Marketing, Mark Swift; CPI’s Senior Data Center Consultant, Steve Bornfield; and University of Florida's Joe Keena for an exploration of the options and some of the pitfalls, supported by real-life examples from the field.
The goal of Virtual Desktop Infrastructure (VDI) is to lower the operational costs of supporting an organization’s desktops and laptops. A VDI project should make it easier for IT to support users, keep the organization safe from viruses and better protect its data assets. The key to a successful VDI project is user adoption. But while many organizations consider using an All-Flash Array (AFA) to deliver the performance that will lead to user adoption, the problem is AFAs drive up the cost per desktop, increase the vulnerability of the architecture and encourage additional storage silos.
Join Storage Switzerland and Cloudistics for an informative webinar that will provide an alternative approach that meets user’s performance expectations while leveraging existing – and often already paid for – storage hardware and does not introduce new silos of storage.
In this session we will discuss how state and local government organizations can create modern cloud applications in Microsoft Azure. Learn how you can help modernize your agency and the services you deliver to citizens using:
•Devices that are sensors, sensor gateways or IoT devices that are publishing events to Event Hub either directly or using Microsoft IoT Hub SDK
•Gateways - a logical component that groups processing, management of event processors
•Event processor routes and device actors - Device Actors are chained with various other actor types that are responsible for aggregating, storing, analysis and reporting on device events
•Initiate a project using Visual Studio Online
•How an IoT pattern can be used in Azure IoT Hub using a presentation and references to real tenants.
Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect, impacting critical applications. Determining the root cause of the problem is a challenge for most IT organizations, since ESBs serve as a ‘black box’, offering little insight into the issue.
Now, you can assess and resolve performance issues for applications that communicate across your ESB, before they affect your users. Join Richard Nikula, Vice President, Product Development and Support at Nastel, to learn how Nastel AutoPilot for CA Cross-Enterprise APM lets you analyze application behavior in real-time in production, test and development environments.
At the BCI World Conference in November, the Business Continuity Institute, supported by Zurich Insurance Group, launched their annual Supply Chain Resilience Report. This webinar is a presentation of some of the key findings of the report. This includes that nearly one in ten organizations are not aware of who their key suppliers are, leaving them open to severe disruption as they are unable to manage their supply chain effectively.
Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will explain what this new offering is, and how it enables you to leverage the public cloud for disaster recovery with a solution that plugs into your existing backup environment.
Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.
Register for this webcast to learn about:
•New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
•How to provide remote access and single sign-on to on-premises web applications with Application Proxy
•Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service
Register now to watch live or receive notification when this program is available on-demand.
Joshua “Jedi Master” Stenhouse will show you how to protect your data center from the worst disasters the death star can dish out. We’re talking all of Alderaan failed over and live within seconds. Governor Tarkin can suck it! Plus, you don’t want to miss the best giveaways and network diagrams in the galaxy…register today!
In this Star Wars themes webinar you’ll learn more about Zerto Virtual Replication (ZVR), the industry’s leading hypervisor-based replication solution for VMware environments that:
Delivers robust business continuity and disaster recovery (BC/DR) for VMware, Hyper-V and AWS.
Meets the hardest SLAs while being easy to use.
Supports public, private or hybrid clouds.
Easily migrates production workloads across different infrastructures.
Napkins, notepads, and multiple devices – keeping notes is a mess. Research suggests that the average employee spends roughly 76 hours a year looking for misplaced notes, items or files (Brother International Organization, 2010).
Imagine what you could do if you could capture all your ideas and information in one versatile digital notebook. Join us for this webcast to learn how you can harness the power of digital notetaking. Start by collecting and organizing all kinds of information.
In this webcast, you’ll learn now you can get more hours out of the day by:
•Collecting information from multiple sources into one handy notebook. For example, grab a news clip off the web, record an inspired idea on the go and combine handwriting, spreadsheets, diagrams, even email.
•Accessing your information from nearly any device, any time. Use familiar Microsoft Office tools to access your notebook.
Microsoft OneNote makes it easier to collaborate, whether you want to share your notes with colleagues, add them to a meeting or work together on the same notebook. It’s the simple, more effective way of getting down to business. Join us for this webcast to learn how you can get started organizing your business today.
No wired connection can deliver 100% uptime. Fortunately, there are practical, convenient, and affordable ways to ensure your organization is not disrupted due to an outage.
In this webinar, our experts will discuss network failover solutions and next generation Out-of-Band Management (OOBM) through the cloud. Next generation OOBM allows the ability to extend management capability to any primary router Out-of-Band without a static IP. Equipped with Power-over-Ethernet for flexible, unobtrusive placement anywhere to optimize cellular reception, this powerful solution reduces truck rolls, consolidates infrastructure, and maximizes uptime for businesses that require always-on connectivity.
Join Cradlepoint and guest speaker Ken Silay, former director of technology for Chico’s FAS Inc., for a webinar to learn how businesses today are using Cradlepoint solutions for 99.999% network uptime.
Attendees will learn:
-How to mitigate the costs of downtime with 4G LTE
-The advantages of next generation Out-of-Band Management
-How Cradlepoint’s turnkey failover networking solutions seamlessly integrate with existing network infrastructure
Les entreprises ont besoin de travailler de manière plus flexible et cette nécessité devient source de défis. Gérer les données et les collaborateurs, où qu’ils se trouvent, avec l’émergence de nouvelles technologies, peut vous amener à penser que la protection de vos informations est un défi insurmontable.
À partir du 22 janvier 2016, nous organisons une série de webcasts consacrés à la protection des informations. Des experts spécialisés en débattront et vous guideront pour la protection de vos informations en temps réel. Nous examinerons comment utiliser les données pour prendre de meilleures décisions et comment les actions entreprises avant, pendant et après un incident peuvent réduire l’impact subi.
As Git has grown in popularity many IT organizations are wondering if migrating from Subversion to Git is inevitable. The two have different strengths architecturally and support different models of development. This webinar will describe how to ensure you provide developers with the most appropriate tool.
Is your unstructured data growing rapidly? Is your budget strained? Has managing your storage become too time consuming and complicated?
In this session, Adrian Herrera, VP of Marketing, will share Caringo’s experiences working with hundreds of customers of various sizes across a number of different industries so you can learn:
· The differences between block, file and object storage
· What benefits are achieved by implementing an object store
· What common use cases are addressed by object storage
· If object storage is right for your business
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:
- Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
- Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
- How key management systems work and how to evaluate vendor solutions.
This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
What you'll learn:
- What is encryption key management and why is it important?
- Principles of industry-standard key management
- Industry must-haves for effective key management
- Challenges of home grown key management solutions
- Important certifications for meeting compliance and evaluation vendors
The world of backup, disaster recovery, and business continuity is being disrupted by new approaches taken from the playbook of web-scale companies like Google, Amazon, and Facebook. Enterprises are adopting distributed systems-based, software-defined architectures that simplify management, streamline protection, increase uptime and reduce costs by as much as 60%.
This session will provide insight on how software-defined storage (SDS) facilitates new ways to protect, manage, replicate, and recover data. Specifically, you’ll learn:
• How a hyperscale architecture built on commodity hardware delivers better and more efficient protection for your data and applications
• How to create a single geo or metro storage cluster that offers high-availability without the management headaches and high cost of traditional approaches
• How to take advantage of a public cloud like AWS as a tier for older, colder data and as a DR site for a truly hybrid approach
Es cierto que las empresas necesitan mayor flexibilidad laboral, pero esto conlleva desafíos. Gestionar los datos y a los trabajadores estén donde estén, unido al uso de nuevas tecnologías, puede hacer que la protección de su información suponga un reto casi insuperable.
A partir de enero del 20 de enero de 2016 organizaremos una serie de webcasts relacionados con la protección de la información. En ellos, varios expertos del sector darán su punto de vista y nos guiarán a través de los fundamentos de la protección de información en tiempo real. También veremos cómo emplear los datos para tomar mejores decisiones, y cómo las acciones que tomemos antes, durante y después de un incidente pueden minimizar su impacto.
In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.
But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, they are building systems that look an awful lot like ETL.
The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?
While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.
In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
1. Monitor behavior on your internal network and detect abnormal behavior
2. Identify authentication irregularities from your users
3. Protect applications using two-factor authentication
4. Restrict access to confidential data
The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.
Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:
· Analyse the core components of the economy of malware
· Analyse how to gather intelligence to reduce the impact of malicious actors
· Show how to use the intelligence gathered to improve the security posture of the organisation
Windows 10 opens up innovative device experiences and enables your business to take advantage of new hardware enabled security features.
Every business has potential. Given the right tools, it's the people within that can take big ideas from brainstorms to results.
Buying a Windows 10 device means you'll have the tools for transforming ideas, and your business, into something greater. When you accelerate a PC refresh* from Windows 7 to Windows 10 you are getting extra hardware enabled security features giving you the most secure Windows platform yet.
Plus, newer devices and form factors light up new user experiences like Cortana, Inking, Touch and Continuum**.
With enhanced security, productivity, performance and mobility you really can’t do better than accelerating to Windows 10 today.
Watch this webcast to:
•Discover new features that are enabled in the latest devices with Windows 10
•Understand why the 6th generation Intel processor helps deliver better security and manageability
•Learn more about the latest Intel Skylake devices announced in January 2016
•Get additional resources to evaluate what device is right for you
wir möchten Unternehmen auf der ganzen Welt beim Bewältigen der Herausforderungen helfen, die sich durch eine zunehmend agile Belegschaft für die Datensicherheit ergeben.
Bei unserem zweiten Webcast geht es darum, wie man intelligente und strategische, datenbasierte Entscheidungen trifft. Er wird am 17. Februar um 12:00 Uhr MEZ gesendet. Wir helfen Ihnen, Ihre Informationsschutz-Strategie besser zu managen, und wir werden auch beleuchten, was dies für den CIO in Zukunft bedeutet.
Il nostro secondo webcast su come prendere decisioni intelligenti, strategiche e basate sui dati verrà trasmesso il 17 febbraio alle 11:00 (GMT). Ti aiuteremo a gestire meglio la strategia di protezione dei dati, e a capirne le implicazioni future per il CIO.
On this webcast you will learn how to manage your information protection strategy better and we’ll also look at what this means for the CIO in the future.
Join your fellow professionals and sign up for the second in the series - discussing threat analysis, information sharing and providing tips for how to build an intelligent and responsive data-driven security strategy.
In this 30-minute webcast, you will learn how federal, state and local government organizations are using modern productivity applications to helps drive efficiency by enabling seamless experiences for government employees and citizens – across a number of areas including procurement, human resources, and permitting and licensing.
In this webcast, you will learn how Office 365 and DocuSign for Microsoft allows government organizations to:
- Increase Efficiency – accelerate the procurement contracting process and gain complete visibility into the contract approval workflow
- Reduce Costs – eliminate printing, mailing, faxing, and filing from common human resource processes, like on-boarding paperwork and benefits enrollment
- Improve Constituent Services – shorten approval times for permitting and through digital transactions.
Engineering no longer happens in one building. Whether you are building software, hardware or widgets, Engineers and Designers in different locations need access to shared files to collaborate. Unfortunately, this data is growing at an astronomical rate making storing, protecting and providing access to it too costly and complex to sustain. Join this session to learn how Cloud NAS can change the game providing global access and collaboration while saving IT up to 65% on storage costs.
Modern teams require modern tools. And modern tools require intelligent design to get your teams to focus on the things that matter, your business goals.
In this session you get a glimpse into what Microsoft sees as the future of modern work in a mobile, cloud first world and how your teams can get the most out of it. Also, you will get ideas of how to best leverage the latest and greatest in Skype for business and how to reinvent the way your teams collaborate. You will also see how we have elegantly designed complementary tools like Groups, connected ideas in OneNote, and simplified work management in Planner as integral pieces of the modern meeting experience.
Notre deuxième webcast portera sur la manière de prendre des décisions avisées, s’inscrivant dans une stratégie et basées sur des données. Il sera diffusé le 17 février à 11 heures GMT. Nous vous aiderons à mieux gérer votre stratégie de protection des informations et nous examinerons les implications pour la DSI de demain.
Cloud was initially pitched as a way to reduce waste and boost agility, but for many, agility has been the main gain. The boost to budgets is often only felt initially by shifting the spend from CAPEX to OPEX, but without careful management those utility bills can become crippling. This session looks a number of ways that are proven to reduce costs with some real-world examples. Even if cost saving isn’t on your agenda, the same tools and processes will also help you to scale quicker and efficiently extend your service catalogue.
The 5 topics we will cover will help you to:
Reduce your spending on infrastructure and licenses
Help you to reduce your Opex cloud billing
Simplify hybrid provisioning processes
Enable new cloud use-cases to keep LOB owners happy
One of the biggest challenges you will face as you move to the cloud is keeping your users productive while protecting your agency data. Your users' identities will live in your datacenter as well as in the cloud, so how you protect that and maintain your security processes is vitally important. The way people access applications and resources is changing. This is why the user's identity is crucial to protecting your data and applications.
Our discussion of hybrid identity will cover:
1. Options for synchronizing identities to the cloud
2. Self-service capabilities for your users, including password management, group management and single sign-on
3. How to configure single sign-on to SaaS applications
4. Automating identity management across different repositories in your datacenter
How To Break “The Cycle” and Move To Hyperconvergence
In this webinar, Storage Switzerland's George Crump and SimpliVity's Adam Sekora compare and contrast the suitability of SANs vs. hyperconverged architectures; examine the benefits of consolidating and reducing the number of discrete IT devices in lieu of hyperconverged infrastructure; and discuss the merits of simplified IT and its impact on technology refresh initiatives.
Accelerate applications both in the cloud and on-premises and learn how Mellanox’s iSER technology works with Zadara™ Storage. Zadara’s Virtual Private Storage Array™ (VPSA™) service represents two major breakthroughs. VPSA is enterprise storage as a service and uses iSER technology to accelerate application access without requiring new fabric infrastructure.
Secure media content delivery and consumption is rapidly changing. Today's producers need a platform to securely deliver their media and understand how their customers consume it. Join me, Michael McCracken, Director of Professional Services at HOSTING, Bradley Brown, Founder and President at Intelivideo, and William Krasner, Sales & Business Development at Intelivideo Thursday, February 18th at 3:00pm ET for Content Delivery in an On-Demand Age -- an interactive, one-hour live discussion where we will answer questions like:
•How are your customers consuming media?
•What devices do they watch it on?
•How long do they stick around?
•Are they streaming the content or downloading and watching it later?
•How is the content protected?
The webinar will be followed by a Q&A, so come prepared with your questions for our strategy and security experts.
Nuestro segundo webcast trató sobre cómo tomar decisiones estratégicas inteligentes basadas en datos, y se emitirá el 17 de febrero a las 11 AM (GMT). Le ayudaremos a gestionar mejor su estrategia de protección de la información, y también analizaremos las implicaciones para los CIOs en el futuro.
As the cyber threats in the business world evolve, so do the demands on your IT security specialists and their expertise. However it is widely acknowledged that finding, attracting and retaining the skilled talent needed to build and maintain a solid cyber security team presents its own challenges.
Skilled professionals are in high demand, so attrition is rife, but there is also a fundamental shortage of the number of cyber security experts available to respond to the evolving threat landscape and protect our businesses.
In this webinar, Peter Sparkes will explore the skills gap in the different stages of a security programme and provide recommendations on:
• How to create and operationalise a robust cyber security team
• How to build and upskill existing talent
• Approaches to address the skills gap in different stages of your security programme
• Different methods of sourcing skilled security professionals
(This webinar is sponsored and brought to you by Symantec.)
Your organization's IT infrastructure is complex, so you need a backup solution you can trust to deliver confidence and exceptional performance.
This powerful solution lets you choose which platforms to backup, where to save the backups, and exactly what to restore.
PowerShell is like nuclear fission—it’s powerful, and it can be used for good and evil. The bad guys love to exploit PowerShell for at least three reasons:
1. It’s already installed on most versions of Windows.
2. It’s powerful. You really can do just about anything in PowerShell—even call into the Win32 API if enabled.
3.There are no EXEs or DLLs to upload.
Lee Holmes (Microsoft’s PowerShell extraordinaire) will be joining me to show you how to catch intruders exploiting PowerShell to their own ends.
First, we will provide a brief overview of PowerShell security capabilities especially enhancements in PowerShell 5.0t. There are some really good preventive steps you can take to limit your exposure to PowerShell-related risks. And PowerShell 5.0 is available on Windows 2008 R2 SP1 and Windows 7 SP1 and up, so this isn’t vaporware.
Then we will zero in on the auditing capabilities in PowerShell. We’ll show you how to enable PowerShell logging so that you get events for every script block executed. We’ll show you sample events and discuss how to interpret them, how to filter the noise and more.
I’ll also briefly point out some less powerful, but easy-to-implement techniques for just detecting the use of PowerShell itself using Process Tracking events. This can be useful for highly controlled endpoints where use of PowerShell at all is very limited and easy to recognize if PowerShell is being used in an unusual way.
Of course producing valuable audit data is one thing. Collecting, analyzing and alerting on it is another. And that’s where our sponsor, LogRhythm, comes in. The security experts at LogRhythm have been following the increased exploitation of PowerShell by the bad guys and been publishing their own tips on how to combat. Greg Foss will briefly demonstrate LogRhythm’s built-in knowledge of PowerShell and its ability to correlate PowerShell events with all the other security intelligence LogRhythm collects from your enterprise.