Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The Cost of Ransomware on Business
    The Cost of Ransomware on Business
    Eric O’Neill, Cybersecurity expert Recorded: Nov 16 2018 65 mins
    The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, ransomware gangsters raked in $5 billion in extortion fees in 2017, and are predicted to loot nearly $12 billion from businesses and consumers by 2019.

    Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.

    Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:

    •How the most virulent ransomware strains operate
    •The most popular attack vectors used by ransomware
    •How ransomware became such a fast-growing threat
    •What steps you can take to defend against and recover from ransomware attacks
    •Why security and law enforcement experts advise against paying the ransom

    With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Jessica Gulick, MBA | PMP | CISSP Recorded: Nov 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Nov 15 2018 55 mins
    Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.

    External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.

    Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
  • Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Storage Switzerland, Micro Focus Recorded: Nov 15 2018 57 mins
    The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.

    Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.

    By attending this webinar you’ll learn how to:
    * Implement service levels like RPO and RTO throughout the data center
    * Establish NEW service levels for copy management and recovered performance
    * Fix the disconnect between service levels and data protection applications
  • Detection and Response, Why Limit Yourself to the Endpoint?
    Detection and Response, Why Limit Yourself to the Endpoint?
    Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto Networks Recorded: Nov 15 2018 63 mins
    Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”

    Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
    •The state of EDR technology and the challenges it faces in today’s threat landscape
    •The need for visibility beyond the endpoint
    •The future of detection and response with XDR
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS Recorded: Nov 15 2018 59 mins
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    • Learn why automatic mitigation is crucial to keeping your business up and running
    • Understand the power and importance of the Incapsula 10-second DDoS SLA
    • Participate in a live Q&A with DDoS experts
  • Webinar: Netzwerksegmentierung – Methoden und Vorteile
    Webinar: Netzwerksegmentierung – Methoden und Vorteile
    Christian Giebner, Presales Engineer, Tufin & Christian Giebner, Presales Engineer, Tufin Recorded: Nov 15 2018 33 mins
    ist Ihre Netzwerktopologie flacher als die Schleswig-Holsteinische-Gebirgslandschaft?

    Wir können Sie dabei unterstützen Ihr Netzwerk in effektive Sicherheitszonen aufzuteilen und haben eine Lösung, welche die Einschränkungen der Kommunikation zwischen den Zonen, Hersteller- und Plattformunabhängig, sicherstellt.

    Besuchen Sie das Webinar am 15. November um 9:00 Uhr, vom Presales Engineer Christian Giebner, erfahren Sie die Methoden und Vorteile einer praktikablen Netzwerksegmentierung und lernen Sie:
    •Warum eine einheitliche Segmentierungsrichtlinie essentiell für die Sicherheitsrichtlinienverwaltung ist
    •Wie Sie Sicherheitszonen definieren und die Interzonenkommunikation gestalten
    •Wie Sie effektiv Ihre Segmentierungsrichtlinie pflegen und durchsetzen

    Registrieren Sie sich jetzt!
  • Managing High-Severity Issues in Support
    Managing High-Severity Issues in Support
    Luke Kanter, Senior Product Manager, Business Operations, FanDuel; Lauren Wang, Director of Solutions Marketing, PagerDuty Recorded: Nov 14 2018 32 mins
    Availability is a must for leading daily fantasy sports site FanDuel, so its millions of users can play games during live sporting events. But the majority of these happen after working hours, so what happens if there’s a high-severity issue and you’re in Support? With FanDuel’s technical teams five time zones away, how do you mobilize the right resources, especially during peak traffic and usage times? In this session, learn how FanDuel addresses these challenges using PagerDuty for SupportOps.
  • 3 Ways to Make Better Decisions When Managing Cyber Risk
    3 Ways to Make Better Decisions When Managing Cyber Risk
    Jerry Gamblin, Principal Security Engineer, Kenna Security; Jeff Aboud, Director of Product Marketing, Kenna Security Recorded: Nov 14 2018 44 mins
    Security teams need to make better, faster, data-driven decisions. They are in a constant struggle to outpace their adversaries who are sophisticated and often well-funded.

    Jerry Gamblin has spent almost 20 years fighting cyberthreats at corporations and government agencies, and he’ll be joining us to discuss how to make the best possible decisions in managing cyber risk.

    Join our next webinar: 3 Ways to Make Better Decisions When Managing Cyber Risk on Wednesday, November 14th at 10am PT. Jerry Gamblin, Principal Security Engineer at Kenna Security, and Jeff Aboud, Director of Product Marketing at Kenna Security, will have an informal discussion on:

    · Peer Benchmarking and how security leaders can use industry benchmarks to make more informed, data-driven decisions
    · Application Risk Scoring and its role in delivering more precise application risk metrics throughout the development lifecycle
    · At-a-Glance Visibility and how a centralized dashboard can enable security teams to quickly assess, prioritize, and close vulnerabilities
  • Say “No” to Ransomware Demands with End-to-End Data Protection
    Say “No” to Ransomware Demands with End-to-End Data Protection
    Joe Leung, Ken Lamb and Ed Gavin, Micro Focus Recorded: Nov 14 2018 27 mins
    Hardly a day goes by without some news of ransomware attacks. Ransomware is a lucrative business. According to a recent report by security firm Sophos, one ransomware attack called SamSam, which attacks mainly healthcare organizations, has generated the attacker $6 million so far. With the wave of this epidemic continuing unabated, organizations face a tremendous risk of financial loss and business disruptions. Data, regardless of where it resides within your organization, must be protected to counter such a threat.

    Join us for this webinar to learn about how a holistic data protection approach, enabled by Micro Focus Data Protector and Micro Focus Connected MX, can be applied to:

    • Holistically protect your organization from ransomware
    • Securely back up data from servers and end-user devices
    • Enable simple data recovery in the event of a ransomware attack
  • Trust and responsibility throughout your software distribution chain
    Trust and responsibility throughout your software distribution chain
    Juan Asenjo, Senior Manager for Solutions Marketing, Thales eSecurity & Tomas Gustavsson CTO, PrimeKey Recorded: Nov 14 2018 56 mins
    Harmful code is today a real threat to users and organizations alike. Criminal groups and even governments increasingly use malicious software to steal, manipulate, and monitor data, to export money, or empty bank accounts. An efficient way to prevent this, to protect your intellectual property, and brand equity is through code signing. That is why the solution today has the attention of the business owner and developer community worldwide. However, code signing requires not only signing keys to be robust, but also to be stored securely. With the use of a hardware security module (HSM), you can manage the risk of having critical code signing keys stolen and your security compromised. In this webinar, PrimeKey a leading provider of PKI and signing solutions, together with Thales eSecurity, a leader in HSM technology, will take you through the world of safe code through proper code signing.

    Join this webinar to learn how to:

    • Achieve trusted and secure software distribution using PKI and HSMs
    • Take advantages of server-side signing with central key management
    • Support multiple code signing needs, drivers, firmware, and formats
    (Microsoft, JAR, P#1, P#7, CMS etc.), in one single installation
    • Integrate with existing build and distribution processes for automation
    • Deploy best practices for code signing solutions and improve security
  • La continuité d'activité : mise en pratique simple et concrète
    La continuité d'activité : mise en pratique simple et concrète
    David Lorin - Channel Systems Engineer - Pure Storage;Samuel BERTHOLLIER - CTO & Business Line Manager Infrastructure - Antem Recorded: Nov 14 2018 52 mins
    La reprise après incident - en particulier la récupération des données en cas d’urgence, ainsi que les coûts et la complexité associés - sont une des préoccupations principales de nombreuses directions informatiques.

    Aujourd’hui, les organisations peuvent bénéficier d’un accompagnement de proximité et de solutions de continuité natives et sans surcoût privilégiant une approche synchrone active / active. En cas de panne sur un site, l'activité continue de façon transparente sur le 2nd site.

    La panne de votre SI est une véritable hantise et vous souhaitez rompre avec la complexité et les coûts des reprises après incidents ? Vous souhaitez garantir une expérience utilisateur continue, même en cas de défaillance de l’un de vos systèmes ?

    Rejoignez la discussion lors de notre webinar et posez vos questions à nos experts Pure Storage et AntemetA.
  • Ransomware in 2018 – Brace yourself
    Ransomware in 2018 – Brace yourself
    Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender Recorded: Nov 13 2018 61 mins
    Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.

    You’ll learn the basics of data protection that Citrix customers are using today, including:
    • Publish virtualized, sandboxed and hardened browsers and email clients
    • Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
    • Protect mobile devices against attacks with containerization
    • Provide a secure and robust enterprise data sync and sharing service
  • The Software Matters in Open Networking
    The Software Matters in Open Networking
    Storage Switzerland and Pluribus Networks Recorded: Nov 13 2018 61 mins
    Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can be confusing, and migrating away from legacy infrastructure can seem fraught with peril. Is the journey worth it?

    Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
    • What are the benefits of open networking and SDN in the data center?
    • How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
    • How do I deploy SDN in my data center and do I need a full hardware refresh to do it?

    Register before November 9th and receive an exclusive copy of Storage Switzerland's newest eBook "Virtualizing and Automating the Network - A Guide to White Box Switches, Network Operating Systems and Software-Defined Networking."
  • Ageas: Change without fear drives Digital Workforce success
    Ageas: Change without fear drives Digital Workforce success
    Emma Kirby-Kidd, Process Automation Lead - Katie Payne, Automation Aftercare Manager, Ageas Recorded: Nov 13 2018 60 mins
    Ageas is one of the largest providers of personal and commercial insurance in the U.K., and was no stranger to automation when it began using Blue Prism’s Digital Workforce in 2014. But from the very start, it knew it couldn’t achieve its process efficiency, waste reduction, and risk mitigation goals unless it built an internal culture in which everyone in the organization fully understood the benefits of Robotic Process Automation (RPA), and embraced all it could do for them, the company, and its customers.

    In this episode of our Blue Prism Café, join the team behind Ageas’ leading change management practices, where their goals were to eliminate worries about the impact on employment,actively encourage their employees to welcome process automation, and create a culture in which the employees think of the robots as additional team mates that are responsible for doing mundane, repetitive back office tasks 24/7/365.

    Key takeaways will include:
    • Selling the benefits, and managing the message of RPA within the business
    • Real-life examples on how to humanize the Digital Workforce
    • Ensuring effective aftercare for implemented processes
    • Delivering maximum automation benefits back to the business
  • Driving Analytics Insights in the world of Formula One™
    Driving Analytics Insights in the world of Formula One™
    Matt Harris, Mercedes AMG Petronas Motorsport | Alex McMullan, Pure Storage | Michael O'Connell, TIBCO Recorded: Nov 13 2018 40 mins
    Join this exclusive panel session live from Big Data LDN to find out about the crucial role data plays in the highly competitive world of Formula One™. Executives from Mercedes AMG Petronas Motorsport, Pure Storage and TIBCO will discuss how its collection, storage and analysis can make the difference between victory and defeat.

    In this panel session you’ll find out about the crucial role data plays in the highly competitive world of Formula One™ and how its collection, storage and analysis can make the difference between victory and defeat.

    Matt Harris, Head of IT, Mercedes AMG Petronas Motorsport
    Alex McMullan, VP & CTO, International, Pure Storage
    Michael O'Connell, Chief Analytics Officer, TIBCO

    Panel moderated by: Richard Corderoy, Chief Data Officer, Oakland Data and Analytics
  • Is Software Asset Management the Tonic to your Cloud Headache?
    Is Software Asset Management the Tonic to your Cloud Headache?
    Antony Attfield, Rhys Williams and Mark Lillywhite Recorded: Nov 13 2018 46 mins
    According to Gartner’s latest research (cited in August 2018*) 20% of the IT budget is now being spent on cloud-based services. An upward trend that is being driven by more organisations moving workloads to the cloud and increasing adoption of SaaS applications.

    Many of these organisations, however, are experiencing significant cloud overspend due to a lack of visibility and effective monitoring across single and multiple cloud providers. And cloud sprawl and overspend is exacerbated by shadow IT with undetected or unauthorised purchases from cloud vendors.

    So how big is this problem of cloud overspend and how do you address it? Join experienced consultants from SoftwareONE, Antony Attfield and Rhys Williams and Mark Lillywhite from Snow to understand how to gain control reduce your cloud spend.


    -The challenges of monitoring usage and spend of IaaS, PaaS and SaaS
    -The disconnect between IT and Lines of Business and C-Level
    -Gaining visibility and control of your cloud estate
    -A demonstration of Snow’s SaaS detection and management capabilities
    -A demonstration of SoftwareONE’s PyraCloud for IaaS and PaaS cloud spend management
    -Best practice governance for budget management and chargeback

    *Source: http://www.cloudpro.co.uk/iaas/7603/cloud-spending-now-swallows-20-of-it-budgets
  • Live panel debate: The risks and rewards of transparency in cybersecurity
    Live panel debate: The risks and rewards of transparency in cybersecurity
    Anton Shingarev, Jan-Peter Kleinhans, Kevin Limonier, Melinda Crane, Recorded: Nov 13 2018 55 mins
    An international panel of leaders and influencers from across the security landscape will explore how the global ICT industry can best build trust and assurance for their products in the current cybersecurity landscape. Among other things, the panel will discuss the need to prove trustworthiness and the risks and benefits of transparency actions such as code reviews.

    Panellists are:
    • Kevin Limonier, Associate Researcher, Castex Chair of Cyberstrategy;
    • Jan-Peter Kleinhans, Project Director, Stiftung Neue Verantwortung;
    • Anton Shingarev, Vice President of Public Affairs, Kaspersky Lab.

    Moderator: Melinda Crane, Chief Political Correspondent, Deutsche Welle
  • Veeam + Pure
    Veeam + Pure
    Jörg Schneider Systems Engineer bei Pure Storage Recorded: Nov 9 2018 35 mins
    Veeam & Pure Storage - Damit Backup und Restore Spindeln von gestern sind.
  • Holistic Disaster Recovery; from Data Center to Endpoint
    Holistic Disaster Recovery; from Data Center to Endpoint
    Storage Switzerland, KeepItSafe, Veeam Recorded: Nov 8 2018 62 mins
    Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as well as endpoint need inclusion into the organization’s disaster recovery plan.

    Today disasters like ransomware and other cyber-threats can impact both data center servers and user endpoint. And, both endpoints and data center servers are susceptible to “minor” disasters like hardware failure and software bugs, which at the time seem major to those impacted. Endpoints, unlike servers also face another type of disaster loss or theft.

    Register now for our upcoming webinar where experts from Storage Switzerland, Veeam and KeepItSafe discuss how to create a disaster recovery plan that covers all of the organizations digital assets.
  • Security Analytics: How to Identify True Risks to Your Data
    Security Analytics: How to Identify True Risks to Your Data
    Sara Pan, Product Marketing, Imperva, and Shelly Hershkovitz, Product Management, Imperva Recorded: Nov 8 2018 38 mins
    The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies.

    Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.

    Join this webinar to learn how security analytics can help:

    • Pinpoint real threats to your apps and data
    • Prioritize the most critical incidents
    • Interpret risk in plain language
    • Provide actionable insights to contain a potential breach
  • Understanding How Gigabit LTE Complements & Leads to 5G
    Understanding How Gigabit LTE Complements & Leads to 5G
    Lindsay Notwell, Senior VP of 5G Strategy and Global Carrier Operations; James Weaver, Senior Product Marketing Manager Recorded: Nov 8 2018 55 mins
    As operators enhance existing networks with LAA, CBRS, and other current-day technologies, Gigabit LTE stands out as a key component in the monumental transition toward 5G. While there’s significant buzz about the ways in which 5G will transform business operations, the benefits of Gigabit LTE and enhancements to existing networks are being overlooked. It’s important for organizations to understand how Gigabit LTE and private LTE can help transform their operations now and help prepare them for 5G.

    Join Cradlepoint’s Lindsay Notwell, senior VP of 5G strategy and global carrier operations, and James Weaver, senior product marketing manager, for a live webinar to explore how Gigabit LTE’s speed and reliability are enhancing wireless networking use cases — and continuing the pathway to 5G.
  • GDPR is Here: Get the Need-to-Know Info from Security Experts
    GDPR is Here: Get the Need-to-Know Info from Security Experts
    Tom Reynolds,Director of Technology Solutions at Razor Technology & Kevin Hyde, Managing Director at Layer 8 Security Recorded: Nov 8 2018 49 mins
    The General Data Protection Regulation (GDPR) has been in effect for several months now, but the impact it has on businesses and the specifics on ensuring compliance still remain foggy to business leaders and their teams, especially small to medium sized businesses. Discover how GDPR applies to you and what steps you should take now to address GDPR concerns.

    According to SAS, a leader in business analytics and intelligence, less than half of organizations fully understand the impact of GDPR and how their business can effectively address this new regulation.

    Join security experts from Razor Technology and Layer 8 Security on Thursday, November 8th at 11am EST for a live webinar to discover how GDPR applies to you and what steps you should take now to address GDPR concerns. We’ll discuss:
    -The big impact GDPR has on IT teams and their businesses
    -The company practices that may trigger GDPR enforcement
    -The five post-GDPR actions you need to take to build better infrastructure
  • Commvault SPLA
    Commvault SPLA
    Дмитрий Ильин, эксперт по программам лицензирования для SP Recorded: Nov 7 2018 55 mins
    Рады пригласить вас принять участие в вебинаре, посвященном обзору программы Partner Advantage Service Provider Program (SPLA).

    Курс предназначен для BDM, менеджеров по продажам, руководителей проектов, руководителей продаж.

    Основные темы:
    •Сервис как бизнес-модель
    •Программа Partner Advantage Service Provider Program (SPLA)
    •Как стать SP партнером
    •Лицензирование и цены
  • Are EMEA organisations ready for SDWAN?
    Are EMEA organisations ready for SDWAN?
    Darius Goodall, Sn. Director, Product Marketing, Barracuda Networks; Kelsey Parish, Research Manager, Vanson Bourne Recorded: Nov 6 2018 58 mins
    Cut through the noise around SD-WAN. Join us for this all-new webinar, where we’ll dive into the eye-opening results of our recent global survey of IT administrators.

    Find out what 910 of your peers around the globe are thinking, saying, and doing about the move to SD-WAN—and understand how attitudes and trends in the EMEA region differ in some respects from those in other regions.

    Don’t miss this opportunity to gain a firm, practical understanding of the main SD-WAN concerns and challenges that your peers are dealing with, and how they’re achieving the right balance of WAN performance and security.

    Attend this important live webinar and get the insights you need to make the best SD-WAN choices for your organization.
  • Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Lionel Meoni, Systems Enginee Manager, Rubrik France Nov 20 2018 9:00 am UTC 33 mins
    Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise

    Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
  • Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Nov 20 2018 2:00 pm UTC 60 mins
    Kaspersky Lab will share its predictions for what the world’s major threat actors could have planned for the coming year. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace.

    The aim of the webinar is to stimulate debate among IT security professionals in all industries and to increase awareness and understanding that will help them to defend their organization against these threats.
  • VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMC Nov 20 2018 5:00 pm UTC 30 mins
    With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
  • Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Jacquie Touma, Chaitra Vedullapalli, Terri Stephan Nov 20 2018 8:00 pm UTC 60 mins
    We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.

    The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.

    Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!

    In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.

    Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
  • A CTO’s Perspective: Network Security for the Cloud Generation
    A CTO’s Perspective: Network Security for the Cloud Generation
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec Nov 21 2018 3:00 am UTC 31 mins
    Data, devices and employees are mobilised and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappears.

    In this webinar, we'll look at today's new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Dr. Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec, as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session, they'll discuss:
    • A security insider's view of market trends and the 24/7/365 demands of a distributed workforce.
    • The increased complexity of managing full security stack with limited resources.
    • The technical challenges of securing cloud applications.
    • Cloud solutions that solve cloud problems.

    It promises to be an insightful event for all security, network and IT professionals. After their presentation, the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • DNS for a DevOps Future
    DNS for a DevOps Future
    Jonathan Lewis, VP of Product Marketing Nov 21 2018 5:00 pm UTC 30 mins
    Advancements in DNS (Domain Name Systems), including the ability to communicate via APIs and the power to couple real-time telemetry with automation capabilities, give this often overlooked but foundational component of the application delivery stack a critical role in a DevOps-driven world.

    Leading-edge enterprises have stopped viewing DNS as just a "phone book" and are now leveraging next-generation DNS to better manage their infrastructure, improve application performance and lower costs.

    In this webinar we'll focus on 3 case study examples of next-generation DNS in action:

    - How a gaming company integrated and automated multiple CDNs to cut content delivery costs in half
    - How an ad delivery platform delivers impressions 70% faster using a multi-cloud strategy managed by DNS
    - How a security SaaS organization used DNS to improve performance and reduce help desk calls
  • Commvault Appliance, simplifiez votre sauvegarde!
    Commvault Appliance, simplifiez votre sauvegarde!
    Christophe Multeau Nov 22 2018 8:30 am UTC 45 mins
    Aujourd’hui, les architectures hyperconvergées ont révolutionné vos infrastructures informatiques.
    En parallèle, l’infrastucture de sauvegarde a peu évolué, à l’exception de Commvault qui est toujours restée à la pointe de l’innovation en ce domaine avec l’intégration de la déduplication, l’intégration des snapshots hardware, puis l’adoption du cloud.
    Venez assister à ce webinaire pour découvrir comment Commvault a mis en place une architecture hyperconvergée sous forme d’appliance ou logicielle pour simplifier, gagner en évolutivité, performance, flexibilité et robustesse vos services de sauvegarde/ restauration à moindre coût.
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity Nov 22 2018 10:00 am UTC 45 mins
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Kaspersky Technical Talks Series - KATA / EDR Part 3
    Kaspersky Technical Talks Series - KATA / EDR Part 3
    Jibril Hassan, Kaspersky Lab Nov 22 2018 11:00 am UTC 75 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • Pure Storage "Active Cluster" Vorteile im Hersteller-Architekturvergleich
    Pure Storage "Active Cluster" Vorteile im Hersteller-Architekturvergleich
    Tom Gempe und Terence Canaday, Systems Engineers bei Pure Storage Nov 23 2018 9:00 am UTC 60 mins
    "Im ersten Teils dieses Webinars werden wir einen Architekturvergleich zum „standortübergreifenden synchronen Spiegel“ mit Blick auf die Verwendung von VMware vSphere beleuchten. Dabei gehen wir abgrenzend zu anderen Herstellern und Lösungen auf die Vorteile des Pure Storage ActiveCluster detailliert ein, um den automatischen transparenten Failover der ESXi Server in den einzelnen Szenarien zu würdigen.
    Im zweiten Teil des Webinars geht es um VVOLs mit Pure. Was sind VVOLs, was machen VVOLs eigentlich und wie gehen wir mit VVOLs um. Eine kurze Darstellung, was sich VMware bei VVOLs gedacht hat, und warum wir die besten dafür sind."
  • DFLabs IncMan SOAR Platform V4.5: Open Integration Framework and More
    DFLabs IncMan SOAR Platform V4.5: Open Integration Framework and More
    Mike Fowler, VP of Professional Services, DFLabs and John Moran, Senior Product Manager, DFLabs Nov 27 2018 3:00 pm UTC 60 mins
    The latest release of DFLabs IncMan SOAR platform v4.5 includes a range of additional and enhanced features and capabilities highly focused around delivering a more open, extensible and community-oriented solution to some of the most challenging problems facing SOCs, CSIRTs and MSSPs today.

    Key New Features include:

    - Open Integration Framework
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...

    Join this webinar to see first hand how DFLabs’ Open Integration Framework enables security teams to easily add and orchestrate new functions between IncMan SOAR and third party products even without coding experience.

    In addition, learn about additional new features including how IncMan SOAR’s enhanced REST API allows users to extend and integrate security automation and orchestration with other processes in new and exciting ways, as well as how its START Triage module now enables granular control over which events are automatically enriched to validate which should be converted directly into a security incident.
  • Tech Tuesday: Using the Swarm Object Storage User Interface
    Tech Tuesday: Using the Swarm Object Storage User Interface
    John Bell, Sr. Consultant and Brian Guetzlaff, UI Engineer Nov 27 2018 7:00 pm UTC 60 mins
    Join Sr. Consultant John Bell and UI Engineer Brian Guetzlaff for a tour and demo using the Swarm Object Storage user interface (UI) to manage a storage cluster. They will also provide insight into the management API that underpins the user interface and discuss the capabilities of the platform.
  • The IoT Enterprise: Why Your Organisation Is Already IoT'd
    The IoT Enterprise: Why Your Organisation Is Already IoT'd
    Nick Savvides, Chief Technology Officer APAC, Symantec Nov 28 2018 3:00 am UTC 61 mins
    With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.

    With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.

    Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
  • Remote Administration Tools in attacks on industrial enterprises
    Remote Administration Tools in attacks on industrial enterprises
    Kirill Kruglov, Vyacheslav Kopeytsev Nov 28 2018 11:00 am UTC 60 mins
    Description: In this webinar we will show you how legitimate remote administration tools become weapons in the hands of threat actors and are used to penetrate industrial facilities. We include several case studies of some of our investigations, as well as statistics of how RATs have already been used in real world attacks on ICS. Remote administration tools do help remote staff resolve issues quickly from any place in the world. RATs also enable system administrators to assist their users from anywhere and anytime. However, using these tools can lead to cyber security incidents.

    Kirill Kruglov, Senior Research Developer, Kaspersky Lab ICS CERT
    Vyacheslav Kopeytsev, Security Researcher, Kaspersky Lab ICS CERT
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Nov 28 2018 4:00 pm UTC 75 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • Uptime Institute Research: The Critical Update - 4Q 2018
    Uptime Institute Research: The Critical Update - 4Q 2018
    Andy Lawrence, Executive Director of Research & Chris Brown, Chief Technical Officer Nov 28 2018 5:00 pm UTC 60 mins
    Join the Uptime Institute Research team on November 28th as they discuss recent developments and research findings spanning outages, innovation, new services, and industry news. This is the first of a quarterly series.
  • Ask the Expert: How DevOps Improves Business Agility
    Ask the Expert: How DevOps Improves Business Agility
    Reuven Harrison, CTO & Co-Founder, Tufin and Jeff Valentine, Chief Product Officer, CloudCheckr Nov 28 2018 5:30 pm UTC 30 mins
    Join this one-on-one interview with Reuven Harrison, CTO and Co-Founder of Tufin, for an in-depth discussion on DevOps and DevSecOps in 2019.

    Reuven will be answering questions live and discussing the following:

    - What is your definition of DevOps and why is it different for different organizations?
    - What is the rate at which DevOps is being adopted?
    - Is DevSecOps just DevOps with Security sprinkled in, or is there more to it than that?
    - How can your organization respond to DevSecOps needs?
    - What are some of the most common issues when shifting to DevSecOps?

    This on-camera interview will be recorded directly from AWS re:Invent in Las Vegas! Tune in from the comfort of your desk and get all of your DevOps questions answered.
  • 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
    2019 Storage Strategies Series - What’s Your Plan for Object Storage?
    Storage Switzerland, Caringo, Cloudian, Scality Nov 28 2018 6:00 pm UTC 60 mins
    Join Storage Switzerland, Caringo, Cloudian and Scality, for a live roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts will discuss what object storage is, what is better/different about object storage than other types of storage and what are the use cases enterprises should consider.

    Our Object Storage Panel will provide specific details on how to get started with object storage, what use cases pay the most immediate return on the investment and where object storage fits in an organization's overall storage strategy. The panel will also discuss what is coming next in object storage. Each expert will also give a brief overview of their company's object storage solution. We will close out the roundtable by taking questions from our live audience.

    By attending one webinar, you’ll learn everything you need to know about object storage, provide actionable information in developing an object storage strategy and hear from three top vendors about how their products will fit into those plans.
  • From DevOps to DevSecOps: Cloud and Security in 2019 and Beyond
    From DevOps to DevSecOps: Cloud and Security in 2019 and Beyond
    Tim Sandage (AWS), Reuven Harrison (Tufin) Brian Johnson (DivvyCloud) and Constancio Fernandes (Symantec) Nov 28 2018 6:30 pm UTC 60 mins
    Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.

    Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:

    - The challenges organizations are facing on how they can culturally come together
    - How security can be an integral part of the DevOps practice to solve these challenges
    - DevOps growth in the enterprise
    - Challenges with using traditional security tools/processes and collaboration through automation
    - Fostering shared responsibility among Security and DevOps

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Tim Sandage, Sr. Security Partner Strategist, AWS
    Reuven Harrison, CTO & Co-Founder, Tufin
    Brian Johnson, CEO, DivvyCloud
    Constancio Fernandes, Senior Director Development, Symantec
  • Backup Complete
    Backup Complete
    Mirek Dvorak Nov 28 2018 11:00 pm UTC 75 mins
    Dear colleagues,
    Please join our webinar.
  • 2018: State of Virtualization in the Cloud
    2018: State of Virtualization in the Cloud
    W. Curtis Preston, Chief Technical Architect, Druva Nov 29 2018 3:00 pm UTC 44 mins
    Momentum of cloud adoption for virtual workloads continues to grow, but it’s not without challenges. While there are a variety of motivations driving this transition, one thing is clear: organizations are still figuring out what the best approaches are. No matter where you are on your journey to the cloud, understanding the role the cloud plays with your virtual environment has become an integral part of your IT initiatives.

    Join us for this presentation by W. Curtis Preston where he will discuss the recent findings from Druva’s “2018 State of Virtualization and the Cloud Survey,” such as:
    - Cloud adoption trends for virtual workloads
    - The challenges organizations face on their journey to the cloud
    - The motivations - and risks - associated with these IT initiatives
    - How organizations globally are approaching moving virtual workloads to the cloud
  • Designing Storage Architectures for Data Privacy, Compliance and Governance
    Designing Storage Architectures for Data Privacy, Compliance and Governance
    Storage Switzerland and Hitachi Nov 29 2018 6:00 pm UTC 60 mins
    Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them to not only protect data but also organize it so it can be found and deleted on request. Traditional backup and archive are ill-equipped to help organization adhere to these new regulations.

    In this live webinar join Storage Switzerland and Hitachi Vantara for a roundtable discussion on the meaning of these various regulations, the impact of them on traditional storage infrastructures and how to design a storage architecture that can meet today’s regulations as well as tomorrows.
  • Solving the Biggest Headache in Data Center Consolidation
    Solving the Biggest Headache in Data Center Consolidation
    Coan Dillahunty, Nasuni Senior Product Manager and former Data Center Manager for TBWA Nov 29 2018 6:00 pm UTC 60 mins
    Shifting file services to the cloud as part of a data center consolidation can reduce cost, footprint, and increase your future flexibility. But getting it right so that you don’t compromise end user satisfaction or application performance is a real challenge, especially across multiple data centers and apps.

    Join this live webinar to learn how to approach it with the least amount of pain and without sacrificing application performance and end-user satisfaction.
  • [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4 Nov 29 2018 6:00 pm UTC 75 mins
    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Is Your Old-Fashioned Information Management Strategy Holding You Back?
    Is Your Old-Fashioned Information Management Strategy Holding You Back?
    Mark Diamond, Founder, President & CEO of Contoural, Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast Nov 29 2018 7:00 pm UTC 60 mins
    Compliance regulations are evolving. E-Discovery is getting harder. Your old-fashioned, legacy archive strategy is not enough. Join Mark Diamond from Contoural and Garth Landers from Mimecast as they discuss the changing enterprise archiving landscape and how to rethink information management for a more modern and effective approach.
    Speaker Info:
    Mark Diamond, Founder, President & CEO of Contoural
    Mark Diamond is recognized as an industry thought leader in proactive records and information management, litigation readiness and risk & compliance strategies.  Under his leadership, Contoural has grown to be the largest independent provider of legal and regulatory, litigation readiness, and risk & compliance consulting services. As trusted advisors, he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
    Previously, he was co-founder of Symantec's (Open Vision) Professional Services group; founder and General Manager, Worldwide Professional Services for Legato Systems and Vice President of Worldwide Professional Services at Right Works, a provider of business application software to the B2B marketplace.
    Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast
    Garth Landers is the Director of Product Marketing for the Mimecast Cloud Archive. Prior to joining Mimecast, he was a Research Director/Analyst at Gartner with primary coverage responsibilities for advising clients on archiving management software and related topics such as e-discovery and information governance policies and procedures. In addition, he provided research and advisory services in other areas related to storage, software and services associated with archive and backup/recovery. 
    Previously, Garth held positions at EMC and Mobius Management Systems in product marketing and management in addition to an earlier stint at Gartner as a Research Analyst covering enterprise content management.