Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Arcserve's Battle Royale Arcserve's Battle Royale Gary Sussman, Kervin Myrtil, Chris Rockholt Sep 1 2016 6:00 pm UTC 60 mins
    There is a lot of talk about who's the best in the business. But what do the numbers say? Join us as we take a look in the world of data back up and disaster recovery to see how Arcserve stands up against the competition.
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

    - Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

    - Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

    - Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • Exercising your continuity plan Exercising your continuity plan Barbro Thöyrä MBCI Sep 5 2016 2:00 pm UTC 60 mins
    Exercising is vital in order to keep your continuity plan and staff up-to date.
    We will talk more about why it is important to exercise and what the useful prerequisite are to exercise.
    There are several types of exercises and I will high light some of them and how to conduct an exercise.
  • Best Practices for Running Virtualized Workloads in All-Flash Data Centers Best Practices for Running Virtualized Workloads in All-Flash Data Centers Mike Cooney Sep 6 2016 4:00 pm UTC 60 mins
    This session explores the reasons for one of the quickest revolutions that the storage industry has seen in the last 20 years, and how XtremIO can enable breakthrough capabilities for your server virtualization and private cloud deployments. We through specific use case issues and how to overcome them. With lots of real-world tips and tricks, you can consolidate your most demanding virtualization workloads successfully and gracefully.
  • Microsoft Government Cloud: From Mobile to Big Data & More Microsoft Government Cloud: From Mobile to Big Data & More Alex Starykh & Chris Niehaus, Microsoft Sep 6 2016 6:00 pm UTC 60 mins
    Government organizations are undergoing a digital transformation. Across the U.S., government agencies are embracing the cloud, mobile computing, big data, and other advanced technologies to radically reduce operational costs and improve delivery of government services to citizens.

    Microsoft and its ecosystem of cloud solution providers are uniquely positioned to help federal, state, and local government organizations make this transformation. The Microsoft Government Cloud is among the most complete and secure clouds designed to meet the demands of U.S. government organizations.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Mike Fazio, Product Marketing Manager, DataCore Software Sep 6 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Data Protection 101: Follow and protect your critical data, wherever it lives Data Protection 101: Follow and protect your critical data, wherever it lives Sunil Choudrie, Global Solutions Marketing Manager Sep 7 2016 10:00 am UTC 60 mins
    When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

    Organizations today face the following challenges:
    •Identifying the type of data that needs to be protected
    •Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
    •Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

    Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

    Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
  • Network security, seriously? 2016 Network Penetration Tests Network security, seriously? 2016 Network Penetration Tests Peter Wood Sep 7 2016 10:00 am UTC 45 mins
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Exploring Russia’s Cyber Operations Exploring Russia’s Cyber Operations Dan McWhorter, Chief Intelligence Strategist at FireEye Sep 7 2016 1:00 pm UTC 45 mins
    Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
  • Protection des données:comment gérer & protéger les données,où qu’elles résident Protection des données:comment gérer & protéger les données,où qu’elles résident Hervé Doreau, Directeur Technique – Symantec France Sep 7 2016 1:00 pm UTC 45 mins
    Lorsqu’il s’agit de vos données sensibles, comment pouvez-vous être certain qu’elles sont protégées et qu’aucune ne quitte votre environnement ?

    Les entreprises sont aujourd’hui confrontées aux difficultés suivantes :

    - Identifier le type de données à protéger
    - Contrôler l’accès aux données et garantir la confidentialité des identités, en particulier face aux fortes amendes prévues par la réglementation
    - Empêcher les fuites de données en dehors de l’organisation, les mégafuites et pertes de données s’accroissant d’année en année. 

    En 2015, plus d’un demi-milliard d’enregistrements personnels ont été dérobés ou perdus, et les campagnes de spear-phishing à l’encontre des salariés d’entreprise ont augmenté de 55 %.

    Dans un premier temps, il convient de permettre aux bonnes personnes d’accéder aux données pertinentes, où qu’elles se trouvent, en contrôlant l’accès, en surveillant les flux et en évitant qu’elles tombent entre de mauvaises mains. Vous pouvez alors facilement passer à la seconde étape : appliquer des politiques qui contrôlent l’accès aux données et leur utilisation, que ce soit sur le cloud, les appareils mobiles ou le réseau.

    Assistez à un webinaire Symantec sur les derniers enseignements tirés en matière de protection des données pour l’ensemble des applications qui composent votre environnement.
  • Deep-dive into Linux Based Applications on Microsoft Azure Deep-dive into Linux Based Applications on Microsoft Azure Jose Miguel Parrella, Open Source Product Manager, Microsoft Corporation Sep 7 2016 6:00 pm UTC 60 mins
    As a follow-up to the previous highly rated session, this session will deep dive into all the relevant features of enterprise development pertinent to an open source developer. It’s no surprise that one in three Virtual Machines in Azure run Linux. In fact, over 60% of the images provided by our application partners in Azure Marketplace are Linux-based and chances are you are running applications on top of Linux as well.

    Which applications are a better fit for the cloud, and what are common use cases and patterns for them? How can Azure provide a first-class experience for your Linux-based applications?

    Attend this webcast to discover:

     How Docker, LAMP, Gluster, JBoss, Hadoop and MySQL enterprise-grade applications running on top of Linux can benefit from Azure.

     How Azure offers you a hyper-scale, open and flexible cloud platform that adds value to your existing investments.

     The powerful architectures made possible with Azure Resource Manager and more.
  • Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Sep 8 2016 8:00 am UTC 45 mins
    Quando le comunicazioni condividono dati sensibili, come puoi assicurarti che siano protetti e non filtrino fuori dal tuo ambiente?

    Le aziende oggi devono affrontare le seguenti sfide:

    - Identificare il tipo di dati da proteggere
    - Controllare l’accesso ai dati e garantire la riservatezza delle identità, soprattutto per non esporsi a pesanti sanzioni normative
    - Prevenire le fughe di dati sensibili, considerato che il numero di grandi violazioni e perdite di dati aumenta di anno in anno. 

    Nel 2015, infatti, oltre mezzo miliardo di dati personali sono stati rubati o persi e, nello stesso anno, le campagne di spear phishing contro i dipendenti aziendali sono aumentate del 55%

    Qual è il primo passo? Consentire a specifici utenti di accedere a specifici dati, ovunque siano, monitorando il flusso dei dati per evitare che cadano nelle mani sbagliate. Il secondo: la semplice applicazione di policy per controllare accessi e uso dei dati su cloud, sui dispositivi mobili e/o sulla rete.

    Partecipa al webinar Symantec per sapere come proteggere i dati in molte applicazioni del tuo ambiente.
  • Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Ramsés Gallego - Symantec Strategist Sep 8 2016 9:00 am UTC 45 mins
    Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

    En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

    - Identificar los tipos de datos que se deben proteger.
    - Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
    - Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

    En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

    El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

    Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.
  • Ein Tag im Leben eines Analysten eines Security Operation Centers (SOC) Ein Tag im Leben eines Analysten eines Security Operation Centers (SOC) Sven Schriewer, Director, FireEye as a Service, FireEye Sep 8 2016 12:00 pm UTC 45 mins
    Was macht überhaupt ein Analyst? Welche Abläufe finden wie statt? Welche Unterstützung benötigt ein Analyst, um effektiv zu sein. Und und und … .

    Möchte man ein SOC auf- oder ausbauen oder eine entsprechende SOC Aktivität extern unterstützen lassen, stellen sich solche und viele andere praktische Fragen. Wir geben einen Einblick, wie FireEye Analysten aus unserem SOC tagtäglich arbeiten. Ein Security Analyst berichtet von seiner täglichen Arbeit, wie er Angreifer im Zusammenspiel mit Spezialisten, Technologie und Intelligence identifiziert und Empfehlungen zur Abwehr gibt. Der SOC Direktor erläutert, wie die Analysten unterstützt und koordiniert werden.
  • Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Alexander Peters, Senior Manager Office of the CTO - Symantec Germany Sep 8 2016 12:00 pm UTC 45 mins
    Wie können Sie sicher sein, dass wichtige Daten geschützt sind und Ihre Umgebung nicht verlassen?

    Unternehmen stehen vor verschiedenen Herausforderungen. Sie müssen:

    - Die Art von Daten identifizieren, die geschützt werden sollen.
    - Den Zugriff auf Daten kontrollieren und sicherstellen, dass Identitätsdaten nicht offengelegt werden, insbesondere angesichts empfindlicher Bußgelder.
    - Verhindern, dass vertrauliche Daten das Unternehmen verlassen – Mega-Datenpannen und Datenverlust nehmen Jahr für Jahr zu. 

    2015 wurden mehr als eine halbe Milliarde Datensätze mit persönlichen Informationen gestohlen oder gingen verloren und die Anzahl von Spear-Phishing-Kampagnen, die auf Mitarbeiter in Unternehmen abzielten, stieg um 55 %.  

    Der erste Schritt besteht darin, den richtigen Personen von überall aus Zugang zu den entsprechenden Daten zu ermöglichen, indem Sie den Zugriff steuern, den Fluss der Daten überwachen und dafür sorgen, dass sie nicht in falsche Hände geraten.  Anschließend setzen Sie dann Richtlinien durch, um Zugriff und Nutzung zu kontrollieren – in der Cloud, auf Mobilgeräten oder im Netzwerk.

    Nehmen Sie an einem Webinar von Symantec teil, in dem es um gewonnene Erkenntnisse in Bezug auf den Schutz von Daten für die zahlreichen Anwendungen in Ihrer Umgebung geht.
  • How hyper converged infrastructures transform databases How hyper converged infrastructures transform databases Augie Gonzalez, Storage Virtualisation Specialist Sep 8 2016 1:00 pm UTC 45 mins
    HyperConverge like a Pro - part 2

    Regardless of your industry, databases form the core of your profitability. Whether online transaction processing systems, Big Data analytics systems, or reporting systems, databases manage your most important information – the kind of data that directly supports decisions and provides immediate feedback on business actions and results. The performance of databases has a direct bearing on the profitability of your organization, so smart IT planners are always looking for ways to improve the performance of databases and the apps that use them.

    Join Augie Gonzalez, Subject Matter Expert, DataCore to see if hyper covergence holds an answer to reducing latency and driving performance in database operations. But be careful, not all hyper converged solutions show dramatic improvements across the I/O path.
  • VoIP on an LTE Network VoIP on an LTE Network Ken Tucker, Senior Solutions Architect for Cradlepoint Sep 8 2016 4:00 pm UTC 60 mins
    Voice Over Internet Protocol (VoIP) is deployed one of two ways: on-premises or cloud. Each deployment strategy has its pluses and minuses — with variables including features, upfront costs and total cost of ownership, existing infrastructure, and scalability.

    VoIP services traverse the WAN and are subject to overall WAN bandwidth. If adequate WAN resources are not available, call quality degradation can result. That’s why more and more IT professionals are asking this question: “How would using an LTE WAN for failover or primary connectivity impact VoIP services in our network?”

    Join our webinar at 9 a.m. PDT/12 p.m. EDT on Sept. 8, 2016, to learn the best practices and considerations for deploying VoIP on an LTE network.

    We also will discuss:

    — VoIP on an LTE network vs. VoLTE
    — VoIP on LTE for failover or primary connectivity
    — VoIP network conditions
    — LTE vs. 3G/2G
    — Best practices
    — Quality of Service (QoS)
    — Cradlepoint field testing
  • Migrating Your Big Data Infrastructure to Cloud Migrating Your Big Data Infrastructure to Cloud GigaOM analyst William McKnight with experts from Qubole and WANdisco Sep 8 2016 5:00 pm UTC 60 mins
    GigaOM analyst William McKnight will be joined by experts from Qubole and WANdisco, who will explain the benefits of moving to the cloud and review the tools available for cloud migration and hybrid cloud deployments.

    Learn what's required to avoid the downtime and business disruption that often accompany cloud migration projects.
  • Key to Productivity & Collaboration: The Right Project Management Tools Key to Productivity & Collaboration: The Right Project Management Tools Prasanna Adavi Partner, EPMA, Inc. Microsoft Project MVP Sep 8 2016 6:00 pm UTC 60 mins
    Project Management can mean different things to different people, depending upon the kind of work they do. In that context, it becomes very important to select the right tool for the job at hand.

    Microsoft Office 365 suite has many products that enable project management and collaboration at various levels of maturity of organizations. Project Online, Office 365, SharePoint Online, and Planner each give a different set of capabilities to the users. It is extremely important to select the right tool for the right work, to help maximum productivity and efficiency.

    This session will cover each of these products and discuss when these tools are appropriate and what can and cannot be achieved with them.
  • Creating Business Value in Manufacturing with IoT Creating Business Value in Manufacturing with IoT Kevin Orbaker, Technical Solution Professional (TSP), Microsoft Sep 8 2016 8:00 pm UTC 60 mins
    Tune in for the first webinar in our Hybrid Data Platform Series!

    IoT is a quantum leap for the manufacturing industry—the market potential by 2018 is projected to be $913B, according to IDC. It’s an exciting time as we see the powerful possibilities for manufacturers to use this technology to work smarter, generate new revenue models, transform traditional business models—and even disrupt entire industries.

    In this session, we will discuss how to look beyond the hype and create a strategy that will unlock the potential of the Internet of Your Things in Manufacturing.
  • HackerCraft - Avoid the Breach HackerCraft - Avoid the Breach Rob Krug, Systems Engineer Sep 12 2016 5:30 pm UTC 60 mins
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.

    Rob will discuss the following:
    • Threat landscape 2016 recap
    • Fortifying the network
    • Security craftsmanship
    • Implementing the solution
  • Enterprise Incident Response Through a Lens Enterprise Incident Response Through a Lens Stuart Davis, Director, Mandiant Sep 13 2016 11:00 am UTC 45 mins
    Join Stuart Davis – Director, Mandiant Consulting a FireEye company in this webinar to see how a real life organisation responded to a recent cyber breach involving an advanced cyber threat group (APT). Stuart will explain what happens when an organisation does not have the resources or skills to respond to cyber threat activity and will address how a third party incident response team can extend the internal CSIRT capabilities. He will walk through the stages of Mandiant Consultings enterprise incident response, show how cyber threat intelligence can enrich the information at hand to help these cyber investigators and finally discuss how remediation plans can be put in place to help contain an incident and bring the organisation back to normal business operations.
  • DDoS Fossils to Future: A Brief History and What to Expect DDoS Fossils to Future: A Brief History and What to Expect Darren Anstee, Chief Security Technologist, Arbor Networks Sep 13 2016 4:00 pm UTC 45 mins
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective