Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Recorded: Feb 24 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Cómo recuperar el control de sus datos móviles Cómo recuperar el control de sus datos móviles David Sanz - EMEA Endpoint & Mobile Competency Lead Recorded: Feb 24 2017 54 mins
    Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.

    La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.

    Acompáñenos en este webinar, donde analizaremos:
    - Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
    - Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
    - Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
  • Making your Data Come Together with IoT Intelligence Making your Data Come Together with IoT Intelligence Joshua Davis, MTC Cloud Solutions Architect Recorded: Feb 23 2017 51 mins
    The Internet of Things (IoT) starts with your things—the things that matter most to your business. IoT is about making your data come together in new ways. Tap into how data works for your business with IoT dashboards. Uncover actionable intelligence and modernize how you do business. See how IoT is revolutionizing businesses with field service organizations and driving business and digital transformation.

    Join this webcast to:
    - Learn why your business needs an IoT strategy
    - Understand how to connect and scale your IoT with efficiency
    - Analyze and act on untapped data
    - Integrate IoT with your business processes
    - Drive efficiency and scale in field services using IoT
  • Solving Issues with Microsoft Windows File Server Bloat Solving Issues with Microsoft Windows File Server Bloat Tony Barbagallo, VP of Product Recorded: Feb 23 2017 36 mins
    Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Recorded: Feb 23 2017 62 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • How to Leverage Dell EMC Storage to Transform your IT How to Leverage Dell EMC Storage to Transform your IT Stefan Voss Recorded: Feb 23 2017 60 mins
    Flash is a key enabler for IT Transformation. Learn how it can help you improve your business outcomes and achieve more agility while lowering your operating costs. The webcast will highlight different architectures designed and optimized for specific workload groups and the tradeoffs between them. We will also provide a review of the products within the performance optimized segment of the storage market.
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Recorded: Feb 23 2017 64 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • [VIDEO Interview] The Influence of The Russian Election Hack on Cyber Warfare [VIDEO Interview] The Influence of The Russian Election Hack on Cyber Warfare Josh Downs, Community Manager, BrightTALK & Raj Samani, EMEA CTO, Intel Security Recorded: Feb 23 2017 13 mins
    BrightTALK will be broadcasting an in-depth interview with Raj Samani, CTO EMEA, Intel Security and Josh Downs, Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Feb 23 2017 49 mins
    Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.

    In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 55 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • How far can you trust AI How far can you trust AI Greg Pollock, VP of Product at UpGuard Recorded: Feb 22 2017 44 mins
    Machine learning is both cool and valuable, but to apply it effectively requires that we disregard the former in order to be rigorous about the latter. In this session we take a hard look at the qualities that make machine learning fit for purpose for problems in cyber security in order to lay out a global roadmap for how machine learning can solve security problems today. Even more importantly, our bottom-up analysis of machine learning will chart the areas where an excessive faith in automation can become harmful to a business' security posture.

    About the presenter:

    Greg has previously managed products and product teams for gaming and education startups with a focus on meaningful, measurable engagement loops. His games have been ranked in the top ten by traffic on Facebook, the top ten by revenue on the App Store, and as the Editor's Choice in the App Stores of over 70 countries.
  • Why Built-In Data Protection & Network Security are Key to Threat Intelligence Why Built-In Data Protection & Network Security are Key to Threat Intelligence Stephen Jeffries, Technical Architect, Microsoft Recorded: Feb 22 2017 36 mins
    With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

    Join this webcast to learn more about the two major new security features that launched with the Anniversary update:

    - Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
    - Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Recorded: Feb 22 2017 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Panel Discussion - AI & Machine Learning in Cyber Security Panel Discussion - AI & Machine Learning in Cyber Security Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate Recorded: Feb 22 2017 60 mins
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Recorded: Feb 21 2017 64 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Recorded: Feb 21 2017 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Recorded: Feb 21 2017 52 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Podcast - Scale-out NAS vs. Distributed Storage Podcast - Scale-out NAS vs. Distributed Storage Charlie Hodges, Storage Switzerland Recorded: Feb 20 2017 13 mins
    They seem to solve the same problem – meeting the constantly growing performance and capacity demands of the enterprise. But Scale-out NAS and Distributed Storage are different. Join our next LIVE podcast to learn what Scale-out NAS and Distributed Storage are, how they are different and which one is right for you. Attendees to the live podcast will be able to ask questions and get answers in real-time. NO REGISTRATION REQUIRED!
  • Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Todd Furst and Rich Ross, Technical Solutions Professionals, Microsoft Recorded: Feb 17 2017 44 mins
    Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.

    Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.

    Join this webcast to learn how to:
    - Implement disaster recovery for all your major IT systems
    - Unify data management, security, and protection
    - Provide protection for your data and applications, no matter where they reside
    - Extend on-premises backups storage and data archiving solutions to the cloud
  • New York's Game-Changing Cybersecurity Rules New York's Game-Changing Cybersecurity Rules Elias Okwara Recorded: Feb 16 2017 32 mins
    New York Governor Andrew Cuomo recently announced the "first-in-the-nation" cybersecurity compliance requirements for banks, insurance companies, other financial institutions, and third party service providers.
  • Think beyond GDPR – Integrate your cyber defences Think beyond GDPR – Integrate your cyber defences Sunil Choudrie & Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?

    As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.

    Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
  • SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant Symantec Recorded: Feb 16 2017 5 mins
    Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage Charlie Hodges, Storage Switzerland Recorded: Feb 15 2017 46 mins
    Join us for our next live podcast. We will provide analysis on the latest news like:
    * Carbonite buying DoubleTake
    * Violin Memory being bought at auction
    * StorageCraft buying Exablox
    * Datto buying OpenMesh

    Will also review our recent briefings including:
    * Talon
    * Vembu
    * Actifio
    * Zoolz
    * Bluelock
    * HubStor

    In this episode’s deep dive our analyst team will discuss the pros and cons of Amazon and Google cloud storage. NO REGISTRATION REQUIRED!
  • Best Options for Failover in Retail Best Options for Failover in Retail Landon Reese, Cradlepoint Recorded: Feb 15 2017 46 mins
    In retail, the rapid adoption of omnichannel services, automation, digitization, IoT and mobile devices, and cloud-based applications has rendered Internet and downtime unacceptable. From helping customers to handling back-office duties, retail staff need 24/7 connectivity to do their jobs effectively.
     
    Retail IT professionals need flexibility and numerous options for providing Internet failover, router redundancy, and business continuity in a variety of locations and circumstances.
      
    At 9 a.m. PT / 12 p.m. ET on Feb. 15, 2017, join Cradlepoint’s Landon Reese to explore the best options for failover in retail, as enterprises look to improve the customer experience and save time, money, and man-hours.