The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Eric O’Neill, Cybersecurity expertRecorded: Nov 16 201865 mins
The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, ransomware gangsters raked in $5 billion in extortion fees in 2017, and are predicted to loot nearly $12 billion from businesses and consumers by 2019.
Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.
Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:
•How the most virulent ransomware strains operate
•The most popular attack vectors used by ransomware
•How ransomware became such a fast-growing threat
•What steps you can take to defend against and recover from ransomware attacks
•Why security and law enforcement experts advise against paying the ransom
With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
Jessica Gulick, MBA | PMP | CISSPRecorded: Nov 16 201860 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Nov 15 201855 mins
Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.
External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.
Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
Storage Switzerland, Micro FocusRecorded: Nov 15 201857 mins
The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.
Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.
By attending this webinar you’ll learn how to:
* Implement service levels like RPO and RTO throughout the data center
* Establish NEW service levels for copy management and recovered performance
* Fix the disconnect between service levels and data protection applications
Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto NetworksRecorded: Nov 15 201863 mins
Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”
Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
•The state of EDR technology and the challenges it faces in today’s threat landscape
•The need for visibility beyond the endpoint
•The future of detection and response with XDR
Andy Shoemaker, founder of DDoS testing company NimbusDDOSRecorded: Nov 15 201859 mins
Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.
In this webinar you will:
• Learn why automatic mitigation is crucial to keeping your business up and running
• Understand the power and importance of the Incapsula 10-second DDoS SLA
• Participate in a live Q&A with DDoS experts
Christian Giebner, Presales Engineer, Tufin & Christian Giebner, Presales Engineer, TufinRecorded: Nov 15 201833 mins
ist Ihre Netzwerktopologie flacher als die Schleswig-Holsteinische-Gebirgslandschaft?
Wir können Sie dabei unterstützen Ihr Netzwerk in effektive Sicherheitszonen aufzuteilen und haben eine Lösung, welche die Einschränkungen der Kommunikation zwischen den Zonen, Hersteller- und Plattformunabhängig, sicherstellt.
Besuchen Sie das Webinar am 15. November um 9:00 Uhr, vom Presales Engineer Christian Giebner, erfahren Sie die Methoden und Vorteile einer praktikablen Netzwerksegmentierung und lernen Sie:
•Warum eine einheitliche Segmentierungsrichtlinie essentiell für die Sicherheitsrichtlinienverwaltung ist
•Wie Sie Sicherheitszonen definieren und die Interzonenkommunikation gestalten
•Wie Sie effektiv Ihre Segmentierungsrichtlinie pflegen und durchsetzen
Luke Kanter, Senior Product Manager, Business Operations, FanDuel; Lauren Wang, Director of Solutions Marketing, PagerDutyRecorded: Nov 14 201832 mins
Availability is a must for leading daily fantasy sports site FanDuel, so its millions of users can play games during live sporting events. But the majority of these happen after working hours, so what happens if there’s a high-severity issue and you’re in Support? With FanDuel’s technical teams five time zones away, how do you mobilize the right resources, especially during peak traffic and usage times? In this session, learn how FanDuel addresses these challenges using PagerDuty for SupportOps.
Jerry Gamblin, Principal Security Engineer, Kenna Security; Jeff Aboud, Director of Product Marketing, Kenna SecurityRecorded: Nov 14 201844 mins
Security teams need to make better, faster, data-driven decisions. They are in a constant struggle to outpace their adversaries who are sophisticated and often well-funded.
Jerry Gamblin has spent almost 20 years fighting cyberthreats at corporations and government agencies, and he’ll be joining us to discuss how to make the best possible decisions in managing cyber risk.
Join our next webinar: 3 Ways to Make Better Decisions When Managing Cyber Risk on Wednesday, November 14th at 10am PT. Jerry Gamblin, Principal Security Engineer at Kenna Security, and Jeff Aboud, Director of Product Marketing at Kenna Security, will have an informal discussion on:
· Peer Benchmarking and how security leaders can use industry benchmarks to make more informed, data-driven decisions
· Application Risk Scoring and its role in delivering more precise application risk metrics throughout the development lifecycle
· At-a-Glance Visibility and how a centralized dashboard can enable security teams to quickly assess, prioritize, and close vulnerabilities
Joe Leung, Ken Lamb and Ed Gavin, Micro FocusRecorded: Nov 14 201827 mins
Hardly a day goes by without some news of ransomware attacks. Ransomware is a lucrative business. According to a recent report by security firm Sophos, one ransomware attack called SamSam, which attacks mainly healthcare organizations, has generated the attacker $6 million so far. With the wave of this epidemic continuing unabated, organizations face a tremendous risk of financial loss and business disruptions. Data, regardless of where it resides within your organization, must be protected to counter such a threat.
Join us for this webinar to learn about how a holistic data protection approach, enabled by Micro Focus Data Protector and Micro Focus Connected MX, can be applied to:
• Holistically protect your organization from ransomware
• Securely back up data from servers and end-user devices
• Enable simple data recovery in the event of a ransomware attack
Juan Asenjo, Senior Manager for Solutions Marketing, Thales eSecurity & Tomas Gustavsson CTO, PrimeKeyRecorded: Nov 14 201856 mins
Harmful code is today a real threat to users and organizations alike. Criminal groups and even governments increasingly use malicious software to steal, manipulate, and monitor data, to export money, or empty bank accounts. An efficient way to prevent this, to protect your intellectual property, and brand equity is through code signing. That is why the solution today has the attention of the business owner and developer community worldwide. However, code signing requires not only signing keys to be robust, but also to be stored securely. With the use of a hardware security module (HSM), you can manage the risk of having critical code signing keys stolen and your security compromised. In this webinar, PrimeKey a leading provider of PKI and signing solutions, together with Thales eSecurity, a leader in HSM technology, will take you through the world of safe code through proper code signing.
Join this webinar to learn how to:
• Achieve trusted and secure software distribution using PKI and HSMs
• Take advantages of server-side signing with central key management
• Support multiple code signing needs, drivers, firmware, and formats
(Microsoft, JAR, P#1, P#7, CMS etc.), in one single installation
• Integrate with existing build and distribution processes for automation
• Deploy best practices for code signing solutions and improve security
David Lorin - Channel Systems Engineer - Pure Storage;Samuel BERTHOLLIER - CTO & Business Line Manager Infrastructure - AntemRecorded: Nov 14 201852 mins
La reprise après incident - en particulier la récupération des données en cas d’urgence, ainsi que les coûts et la complexité associés - sont une des préoccupations principales de nombreuses directions informatiques.
Aujourd’hui, les organisations peuvent bénéficier d’un accompagnement de proximité et de solutions de continuité natives et sans surcoût privilégiant une approche synchrone active / active. En cas de panne sur un site, l'activité continue de façon transparente sur le 2nd site.
La panne de votre SI est une véritable hantise et vous souhaitez rompre avec la complexité et les coûts des reprises après incidents ? Vous souhaitez garantir une expérience utilisateur continue, même en cas de défaillance de l’un de vos systèmes ?
Rejoignez la discussion lors de notre webinar et posez vos questions à nos experts Pure Storage et AntemetA.
Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, BitdefenderRecorded: Nov 13 201861 mins
Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.
You’ll learn the basics of data protection that Citrix customers are using today, including:
• Publish virtualized, sandboxed and hardened browsers and email clients
• Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
• Protect mobile devices against attacks with containerization
• Provide a secure and robust enterprise data sync and sharing service
Storage Switzerland and Pluribus NetworksRecorded: Nov 13 201861 mins
Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can be confusing, and migrating away from legacy infrastructure can seem fraught with peril. Is the journey worth it?
Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
• What are the benefits of open networking and SDN in the data center?
• How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
• How do I deploy SDN in my data center and do I need a full hardware refresh to do it?
Register before November 9th and receive an exclusive copy of Storage Switzerland's newest eBook "Virtualizing and Automating the Network - A Guide to White Box Switches, Network Operating Systems and Software-Defined Networking."
Emma Kirby-Kidd, Process Automation Lead - Katie Payne, Automation Aftercare Manager, AgeasRecorded: Nov 13 201860 mins
Ageas is one of the largest providers of personal and commercial insurance in the U.K., and was no stranger to automation when it began using Blue Prism’s Digital Workforce in 2014. But from the very start, it knew it couldn’t achieve its process efficiency, waste reduction, and risk mitigation goals unless it built an internal culture in which everyone in the organization fully understood the benefits of Robotic Process Automation (RPA), and embraced all it could do for them, the company, and its customers.
In this episode of our Blue Prism Café, join the team behind Ageas’ leading change management practices, where their goals were to eliminate worries about the impact on employment,actively encourage their employees to welcome process automation, and create a culture in which the employees think of the robots as additional team mates that are responsible for doing mundane, repetitive back office tasks 24/7/365.
Key takeaways will include:
• Selling the benefits, and managing the message of RPA within the business
• Real-life examples on how to humanize the Digital Workforce
• Ensuring effective aftercare for implemented processes
• Delivering maximum automation benefits back to the business
Matt Harris, Mercedes AMG Petronas Motorsport | Alex McMullan, Pure Storage | Michael O'Connell, TIBCORecorded: Nov 13 201840 mins
Join this exclusive panel session live from Big Data LDN to find out about the crucial role data plays in the highly competitive world of Formula One™. Executives from Mercedes AMG Petronas Motorsport, Pure Storage and TIBCO will discuss how its collection, storage and analysis can make the difference between victory and defeat.
In this panel session you’ll find out about the crucial role data plays in the highly competitive world of Formula One™ and how its collection, storage and analysis can make the difference between victory and defeat.
Matt Harris, Head of IT, Mercedes AMG Petronas Motorsport
Alex McMullan, VP & CTO, International, Pure Storage
Michael O'Connell, Chief Analytics Officer, TIBCO
Panel moderated by: Richard Corderoy, Chief Data Officer, Oakland Data and Analytics
Antony Attfield, Rhys Williams and Mark LillywhiteRecorded: Nov 13 201846 mins
According to Gartner’s latest research (cited in August 2018*) 20% of the IT budget is now being spent on cloud-based services. An upward trend that is being driven by more organisations moving workloads to the cloud and increasing adoption of SaaS applications.
Many of these organisations, however, are experiencing significant cloud overspend due to a lack of visibility and effective monitoring across single and multiple cloud providers. And cloud sprawl and overspend is exacerbated by shadow IT with undetected or unauthorised purchases from cloud vendors.
So how big is this problem of cloud overspend and how do you address it? Join experienced consultants from SoftwareONE, Antony Attfield and Rhys Williams and Mark Lillywhite from Snow to understand how to gain control reduce your cloud spend.
-The challenges of monitoring usage and spend of IaaS, PaaS and SaaS
-The disconnect between IT and Lines of Business and C-Level
-Gaining visibility and control of your cloud estate
-A demonstration of Snow’s SaaS detection and management capabilities
-A demonstration of SoftwareONE’s PyraCloud for IaaS and PaaS cloud spend management
-Best practice governance for budget management and chargeback
Anton Shingarev, Jan-Peter Kleinhans, Kevin Limonier, Melinda Crane,Recorded: Nov 13 201855 mins
An international panel of leaders and influencers from across the security landscape will explore how the global ICT industry can best build trust and assurance for their products in the current cybersecurity landscape. Among other things, the panel will discuss the need to prove trustworthiness and the risks and benefits of transparency actions such as code reviews.
• Kevin Limonier, Associate Researcher, Castex Chair of Cyberstrategy;
• Jan-Peter Kleinhans, Project Director, Stiftung Neue Verantwortung;
• Anton Shingarev, Vice President of Public Affairs, Kaspersky Lab.
Moderator: Melinda Crane, Chief Political Correspondent, Deutsche Welle
Storage Switzerland, KeepItSafe, VeeamRecorded: Nov 8 201862 mins
Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as well as endpoint need inclusion into the organization’s disaster recovery plan.
Today disasters like ransomware and other cyber-threats can impact both data center servers and user endpoint. And, both endpoints and data center servers are susceptible to “minor” disasters like hardware failure and software bugs, which at the time seem major to those impacted. Endpoints, unlike servers also face another type of disaster loss or theft.
Register now for our upcoming webinar where experts from Storage Switzerland, Veeam and KeepItSafe discuss how to create a disaster recovery plan that covers all of the organizations digital assets.
Sara Pan, Product Marketing, Imperva, and Shelly Hershkovitz, Product Management, ImpervaRecorded: Nov 8 201838 mins
The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies.
Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.
Join this webinar to learn how security analytics can help:
• Pinpoint real threats to your apps and data
• Prioritize the most critical incidents
• Interpret risk in plain language
• Provide actionable insights to contain a potential breach
Lindsay Notwell, Senior VP of 5G Strategy and Global Carrier Operations; James Weaver, Senior Product Marketing ManagerRecorded: Nov 8 201855 mins
As operators enhance existing networks with LAA, CBRS, and other current-day technologies, Gigabit LTE stands out as a key component in the monumental transition toward 5G. While there’s significant buzz about the ways in which 5G will transform business operations, the benefits of Gigabit LTE and enhancements to existing networks are being overlooked. It’s important for organizations to understand how Gigabit LTE and private LTE can help transform their operations now and help prepare them for 5G.
Join Cradlepoint’s Lindsay Notwell, senior VP of 5G strategy and global carrier operations, and James Weaver, senior product marketing manager, for a live webinar to explore how Gigabit LTE’s speed and reliability are enhancing wireless networking use cases — and continuing the pathway to 5G.
Tom Reynolds,Director of Technology Solutions at Razor Technology & Kevin Hyde, Managing Director at Layer 8 SecurityRecorded: Nov 8 201849 mins
The General Data Protection Regulation (GDPR) has been in effect for several months now, but the impact it has on businesses and the specifics on ensuring compliance still remain foggy to business leaders and their teams, especially small to medium sized businesses. Discover how GDPR applies to you and what steps you should take now to address GDPR concerns.
According to SAS, a leader in business analytics and intelligence, less than half of organizations fully understand the impact of GDPR and how their business can effectively address this new regulation.
Join security experts from Razor Technology and Layer 8 Security on Thursday, November 8th at 11am EST for a live webinar to discover how GDPR applies to you and what steps you should take now to address GDPR concerns. We’ll discuss:
-The big impact GDPR has on IT teams and their businesses
-The company practices that may trigger GDPR enforcement
-The five post-GDPR actions you need to take to build better infrastructure
Darius Goodall, Sn. Director, Product Marketing, Barracuda Networks; Kelsey Parish, Research Manager, Vanson BourneRecorded: Nov 6 201858 mins
Cut through the noise around SD-WAN. Join us for this all-new webinar, where we’ll dive into the eye-opening results of our recent global survey of IT administrators.
Find out what 910 of your peers around the globe are thinking, saying, and doing about the move to SD-WAN—and understand how attitudes and trends in the EMEA region differ in some respects from those in other regions.
Don’t miss this opportunity to gain a firm, practical understanding of the main SD-WAN concerns and challenges that your peers are dealing with, and how they’re achieving the right balance of WAN performance and security.
Attend this important live webinar and get the insights you need to make the best SD-WAN choices for your organization.
Lionel Meoni, Systems Enginee Manager, Rubrik FranceNov 20 20189:00 amUTC33 mins
Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise
Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis TeamNov 20 20182:00 pmUTC60 mins
Kaspersky Lab will share its predictions for what the world’s major threat actors could have planned for the coming year. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace.
The aim of the webinar is to stimulate debate among IT security professionals in all industries and to increase awareness and understanding that will help them to defend their organization against these threats.
Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMCNov 20 20185:00 pmUTC30 mins
With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
Jacquie Touma, Chaitra Vedullapalli, Terri StephanNov 20 20188:00 pmUTC60 mins
We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.
The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.
Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!
In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.
Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, SymantecNov 21 20183:00 amUTC31 mins
Data, devices and employees are mobilised and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappears.
In this webinar, we'll look at today's new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.
Join Dr. Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec, as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.
In this session, they'll discuss:
• A security insider's view of market trends and the 24/7/365 demands of a distributed workforce.
• The increased complexity of managing full security stack with limited resources.
• The technical challenges of securing cloud applications.
• Cloud solutions that solve cloud problems.
It promises to be an insightful event for all security, network and IT professionals. After their presentation, the speakers will also take questions from the audience.
We highly encourage you to register and reserve your spot today.
Jonathan Lewis, VP of Product MarketingNov 21 20185:00 pmUTC30 mins
Advancements in DNS (Domain Name Systems), including the ability to communicate via APIs and the power to couple real-time telemetry with automation capabilities, give this often overlooked but foundational component of the application delivery stack a critical role in a DevOps-driven world.
Leading-edge enterprises have stopped viewing DNS as just a "phone book" and are now leveraging next-generation DNS to better manage their infrastructure, improve application performance and lower costs.
In this webinar we'll focus on 3 case study examples of next-generation DNS in action:
- How a gaming company integrated and automated multiple CDNs to cut content delivery costs in half
- How an ad delivery platform delivers impressions 70% faster using a multi-cloud strategy managed by DNS
- How a security SaaS organization used DNS to improve performance and reduce help desk calls
Aujourd’hui, les architectures hyperconvergées ont révolutionné vos infrastructures informatiques.
En parallèle, l’infrastucture de sauvegarde a peu évolué, à l’exception de Commvault qui est toujours restée à la pointe de l’innovation en ce domaine avec l’intégration de la déduplication, l’intégration des snapshots hardware, puis l’adoption du cloud.
Venez assister à ce webinaire pour découvrir comment Commvault a mis en place une architecture hyperconvergée sous forme d’appliance ou logicielle pour simplifier, gagner en évolutivité, performance, flexibilité et robustesse vos services de sauvegarde/ restauration à moindre coût.
In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.
Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.
The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.
Join Chris and Brett for the third “coffee break” webcast when they will discuss:
a) Key security considerations for a digital transformation strategy
b) Why a proactive data defence strategy is crucial
c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
d) How can enterprises regain control of their data security?
Jibril Hassan, Kaspersky LabNov 22 201811:00 amUTC75 mins
A unified security solution for a new era of digital transformation.
Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.
- it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
- multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
- automated prevention of and response to advanced threats
Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.
This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
Tom Gempe und Terence Canaday, Systems Engineers bei Pure StorageNov 23 20189:00 amUTC60 mins
"Im ersten Teils dieses Webinars werden wir einen Architekturvergleich zum „standortübergreifenden synchronen Spiegel“ mit Blick auf die Verwendung von VMware vSphere beleuchten. Dabei gehen wir abgrenzend zu anderen Herstellern und Lösungen auf die Vorteile des Pure Storage ActiveCluster detailliert ein, um den automatischen transparenten Failover der ESXi Server in den einzelnen Szenarien zu würdigen.
Im zweiten Teil des Webinars geht es um VVOLs mit Pure. Was sind VVOLs, was machen VVOLs eigentlich und wie gehen wir mit VVOLs um. Eine kurze Darstellung, was sich VMware bei VVOLs gedacht hat, und warum wir die besten dafür sind."
Mike Fowler, VP of Professional Services, DFLabs and John Moran, Senior Product Manager, DFLabsNov 27 20183:00 pmUTC60 mins
The latest release of DFLabs IncMan SOAR platform v4.5 includes a range of additional and enhanced features and capabilities highly focused around delivering a more open, extensible and community-oriented solution to some of the most challenging problems facing SOCs, CSIRTs and MSSPs today.
Key New Features include:
- Open Integration Framework
- Enhanced REST API
- Automated event triage (START Triage)
- New bidirectional integrations
- Improvements to existing integrations
- And more...
Join this webinar to see first hand how DFLabs’ Open Integration Framework enables security teams to easily add and orchestrate new functions between IncMan SOAR and third party products even without coding experience.
In addition, learn about additional new features including how IncMan SOAR’s enhanced REST API allows users to extend and integrate security automation and orchestration with other processes in new and exciting ways, as well as how its START Triage module now enables granular control over which events are automatically enriched to validate which should be converted directly into a security incident.
John Bell, Sr. Consultant and Brian Guetzlaff, UI EngineerNov 27 20187:00 pmUTC60 mins
Join Sr. Consultant John Bell and UI Engineer Brian Guetzlaff for a tour and demo using the Swarm Object Storage user interface (UI) to manage a storage cluster. They will also provide insight into the management API that underpins the user interface and discuss the capabilities of the platform.
Nick Savvides, Chief Technology Officer APAC, SymantecNov 28 20183:00 amUTC61 mins
With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.
With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.
Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
Kirill Kruglov, Vyacheslav KopeytsevNov 28 201811:00 amUTC60 mins
Description: In this webinar we will show you how legitimate remote administration tools become weapons in the hands of threat actors and are used to penetrate industrial facilities. We include several case studies of some of our investigations, as well as statistics of how RATs have already been used in real world attacks on ICS. Remote administration tools do help remote staff resolve issues quickly from any place in the world. RATs also enable system administrators to assist their users from anywhere and anytime. However, using these tools can lead to cyber security incidents.
Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMwareNov 28 20184:00 pmUTC75 mins
To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
Andy Lawrence, Executive Director of Research & Chris Brown, Chief Technical OfficerNov 28 20185:00 pmUTC60 mins
Join the Uptime Institute Research team on November 28th as they discuss recent developments and research findings spanning outages, innovation, new services, and industry news. This is the first of a quarterly series.
Reuven Harrison, CTO & Co-Founder, Tufin and Jeff Valentine, Chief Product Officer, CloudCheckrNov 28 20185:30 pmUTC30 mins
Join this one-on-one interview with Reuven Harrison, CTO and Co-Founder of Tufin, for an in-depth discussion on DevOps and DevSecOps in 2019.
Reuven will be answering questions live and discussing the following:
- What is your definition of DevOps and why is it different for different organizations?
- What is the rate at which DevOps is being adopted?
- Is DevSecOps just DevOps with Security sprinkled in, or is there more to it than that?
- How can your organization respond to DevSecOps needs?
- What are some of the most common issues when shifting to DevSecOps?
This on-camera interview will be recorded directly from AWS re:Invent in Las Vegas! Tune in from the comfort of your desk and get all of your DevOps questions answered.
Storage Switzerland, Caringo, Cloudian, ScalityNov 28 20186:00 pmUTC60 mins
Join Storage Switzerland, Caringo, Cloudian and Scality, for a live roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts will discuss what object storage is, what is better/different about object storage than other types of storage and what are the use cases enterprises should consider.
Our Object Storage Panel will provide specific details on how to get started with object storage, what use cases pay the most immediate return on the investment and where object storage fits in an organization's overall storage strategy. The panel will also discuss what is coming next in object storage. Each expert will also give a brief overview of their company's object storage solution. We will close out the roundtable by taking questions from our live audience.
By attending one webinar, you’ll learn everything you need to know about object storage, provide actionable information in developing an object storage strategy and hear from three top vendors about how their products will fit into those plans.
Tim Sandage (AWS), Reuven Harrison (Tufin) Brian Johnson (DivvyCloud) and Constancio Fernandes (Symantec)Nov 28 20186:30 pmUTC60 mins
Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.
Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:
- The challenges organizations are facing on how they can culturally come together
- How security can be an integral part of the DevOps practice to solve these challenges
- DevOps growth in the enterprise
- Challenges with using traditional security tools/processes and collaboration through automation
- Fostering shared responsibility among Security and DevOps
This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.
Tim Sandage, Sr. Security Partner Strategist, AWS
Reuven Harrison, CTO & Co-Founder, Tufin
Brian Johnson, CEO, DivvyCloud
Constancio Fernandes, Senior Director Development, Symantec
W. Curtis Preston, Chief Technical Architect, DruvaNov 29 20183:00 pmUTC44 mins
Momentum of cloud adoption for virtual workloads continues to grow, but it’s not without challenges. While there are a variety of motivations driving this transition, one thing is clear: organizations are still figuring out what the best approaches are. No matter where you are on your journey to the cloud, understanding the role the cloud plays with your virtual environment has become an integral part of your IT initiatives.
Join us for this presentation by W. Curtis Preston where he will discuss the recent findings from Druva’s “2018 State of Virtualization and the Cloud Survey,” such as:
- Cloud adoption trends for virtual workloads
- The challenges organizations face on their journey to the cloud
- The motivations - and risks - associated with these IT initiatives
- How organizations globally are approaching moving virtual workloads to the cloud
Storage Switzerland and HitachiNov 29 20186:00 pmUTC60 mins
Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them to not only protect data but also organize it so it can be found and deleted on request. Traditional backup and archive are ill-equipped to help organization adhere to these new regulations.
In this live webinar join Storage Switzerland and Hitachi Vantara for a roundtable discussion on the meaning of these various regulations, the impact of them on traditional storage infrastructures and how to design a storage architecture that can meet today’s regulations as well as tomorrows.
Coan Dillahunty, Nasuni Senior Product Manager and former Data Center Manager for TBWANov 29 20186:00 pmUTC60 mins
Shifting file services to the cloud as part of a data center consolidation can reduce cost, footprint, and increase your future flexibility. But getting it right so that you don’t compromise end user satisfaction or application performance is a real challenge, especially across multiple data centers and apps.
Join this live webinar to learn how to approach it with the least amount of pain and without sacrificing application performance and end-user satisfaction.
Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4Nov 29 20186:00 pmUTC75 mins
Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.
On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:
- Strategies you can implement now to help you protect against a breach.
- Best practices for gathering the intelligence to predict and prevent attacks.
- How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
- Steps to fortify your last line of defense.
Mark Diamond, Founder, President & CEO of Contoural, Garth Landers, Director of Product Marketing – Cloud Archive, MimecastNov 29 20187:00 pmUTC60 mins
Compliance regulations are evolving. E-Discovery is getting harder. Your old-fashioned, legacy archive strategy is not enough. Join Mark Diamond from Contoural and Garth Landers from Mimecast as they discuss the changing enterprise archiving landscape and how to rethink information management for a more modern and effective approach.
Mark Diamond, Founder, President & CEO of Contoural
Mark Diamond is recognized as an industry thought leader in proactive records and information management, litigation readiness and risk & compliance strategies. Under his leadership, Contoural has grown to be the largest independent provider of legal and regulatory, litigation readiness, and risk & compliance consulting services. As trusted advisors, he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
Previously, he was co-founder of Symantec's (Open Vision) Professional Services group; founder and General Manager, Worldwide Professional Services for Legato Systems and Vice President of Worldwide Professional Services at Right Works, a provider of business application software to the B2B marketplace.
Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast
Garth Landers is the Director of Product Marketing for the Mimecast Cloud Archive. Prior to joining Mimecast, he was a Research Director/Analyst at Gartner with primary coverage responsibilities for advising clients on archiving management software and related topics such as e-discovery and information governance policies and procedures. In addition, he provided research and advisory services in other areas related to storage, software and services associated with archive and backup/recovery.
Previously, Garth held positions at EMC and Mobius Management Systems in product marketing and management in addition to an earlier stint at Gartner as a Research Analyst covering enterprise content management.