Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • How Not to Get Hacked like Yahoo! How Not to Get Hacked like Yahoo! Microsoft Recorded: Sep 29 2016 60 mins
    Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.

    Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.

    Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.

    This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
  • Assertions and Attestations - Nailing Your Next Cloud Audit Assertions and Attestations - Nailing Your Next Cloud Audit Frank Krieger, Director of Compliance and Lilac Schoenbeck, VP of Marketing Recorded: Sep 29 2016 51 mins
    The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.

    Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.

    And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:

    - What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
    - How your cloud vendor can support you
    - What questions auditors typically ask
    - How all this impacts your disaster recovery plans as well as your public cloud use
  • Intro to Microsoft Azure's Internet of Things (IoT) Intro to Microsoft Azure's Internet of Things (IoT) Jeremy Foster, Senior Technical Evangelist, Microsoft Recorded: Sep 29 2016 26 mins
    The Internet of Things (IoT) is already a huge deal and it's only going to get bigger

    There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.

    That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.

    Join this webcast to learn how to:
    •Conceptualize why you might need a cloud-based hub solution
    •Easily set up an IoT Hub in Azure
    •Create simulated devices and communicate to your hub
  • Best Practices for Project Portfolio Management in State and Local Government Best Practices for Project Portfolio Management in State and Local Government Rob Hirschmann Recorded: Sep 28 2016 53 mins
    Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.

    Join this webcast to learn how integrated PPM solutions:
    •Bring increased accountability across agency projects
    •Facilitate real-time collaboration between project and program managers and their teams
    •Reduce redundancy and manual effort
  • Modern Cybersecurity:  Enhancing Your Recovery Capabilities to Better Survive Modern Cybersecurity: Enhancing Your Recovery Capabilities to Better Survive Jim Shook Recorded: Sep 28 2016 47 mins
    Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.

    In this webcast you will learn about:
    -Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
    -Why new threats require a new focus
    -Cybersecurity frameworks and best practices
    -Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
    -Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
  • CMDB Implementation Approach & Case Study CMDB Implementation Approach & Case Study Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA & Faisal Usmani, Business Development and Strategy Lead for Co Recorded: Sep 28 2016 58 mins
    CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.

    Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.

    Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.

    At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
  • Making to the jump to risk management Making to the jump to risk management Jeff Blackmon FBCI Recorded: Sep 28 2016 64 mins
    There has always been change in our profession. We originally started by implementing disaster recovery programmes. Soon after that, the businesses realized that the people aspect of recovery was needed as well. The results were the beginning of business continuity programmes. DR and BC have worked together almost two decades now with great success. We are now at a major transformation point again. Business continuity is now sharing more information and interacting more with security and compliance groups.

    This session will go over what most of us already have in place, what we will need to add, and how all three groups interface together to provide a new resilience program for your environment. The goal of this session is to show the interactions between risk management, business continuity, security and compliance that form the components of a resilience programme.
  • Benchmark Your Disaster Recovery Strategy Benchmark Your Disaster Recovery Strategy Taylor Deakyne, EMEA Cloud Manager, Zerto; Sam Woodcock, Solutions Architect, iland; Monica Brink, Dir. EMEA Marketing, iland Recorded: Sep 28 2016 59 mins
    58% experienced issues when failing over IT systems! - The State of IT Disaster Recovery in the UK – 2016 Survey

    Find out if you’re ahead or behind on IT Disaster Recovery. In a survey commissioned by iland and conducted by Opinion Matters, 250 IT decision makers in the UK were asked about their DR experiences, challenges and strategies. And, we’re sharing the results!

    Learn from your peers:

    - The frequency of DR testing – how much is enough?
    - The impact of IT outages – how disruptive would it be to your business?
    - The trade-offs IT leaders make between downtime, cost and security – what trade-offs make sense for you?

    Join iland and Zerto as we dig into the survey findings which will be a useful benchmark for your own DR strategies. Don’t miss it.
  • State of the Hack: Nordics State of the Hack: Nordics Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Sep 28 2016 49 mins
    The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.

    It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.

    Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:

    * The Threat Landscape in the Nordics
    * Trends and Insights in Malware detections across the Nordics
    * Geopolitical situations which can influence the threat landscape in the Nordics
    * How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.

    Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
  • Anatomie d’une attaque par ransomware Anatomie d’une attaque par ransomware Hervé Doreau, Directeur Technique – Symantec France Recorded: Sep 28 2016 39 mins
    Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?

    Aujourd’hui, les responsables sécurité sont confrontés à :
    •un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
    •une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
    •peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT

    Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.
  • Anatomía de un ataque de ransomware Anatomía de un ataque de ransomware Ramsés Gallego - Symantec Strategist Recorded: Sep 28 2016 49 mins
    El año pasado, el ransomware alcanzó un nivel de peligrosidad y profesionalidad nunca visto hasta ahora: ¿cómo puede estar seguro de que su infraestructura informática está protegida y de que está preparado para gestionar un ataque?

    En la actualidad, los líderes de los equipos de seguridad se enfrentan a los siguientes desafíos:
    •Una falta de inteligencia procesable sobre amenazas para mejorar su comprensión sobre los ciberdelincuentes y campañas que podrían tener como objetivo a su empresa.
    •Muy pocos analistas de seguridad cualificados que puedan identificar el creciente número de amenazas que se infiltran en su organización. Por ejemplo, el uso del ransomware de cifrado como herramienta de ataque por parte de los ciberdelincuentes continuó aumentando en 2015, con un crecimiento del 35 %. Sin embargo, las empresas que sufren un ataque siguen tardando más de 200 días en conocerlo.
    •Pocos conocimientos especializados en las técnicas necesarias para responder a las amenazas y repararlas una vez han invadido su entorno informático.

    Los grupos de cibercriminales especializados en ransomware continúan evolucionando sus tácticas, por lo que las organizaciones deben ser plenamente conscientes de las amenazas que estos representan. Únase a Symantec en un webinar que se centrará en un ataque de ransomware para conocer más detalles sobre el incidente y sobre las medidas que tomó la empresa para reparar la amenaza.
  • Anatomia di un attacco di ransomware Anatomia di un attacco di ransomware Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Recorded: Sep 28 2016 64 mins
    Lo scorso anno il ransomware ha raggiunto un nuovo livello di evoluzione e pericolosità: come essere certi che l'infrastruttura IT sia protetta e in grado di affrontare un attacco?

    Oggi i leader della sicurezza hanno importanti sfide da risolvere:
    •Un’intelligence sulle minacce insufficiente a individuare gli aggressori e le campagne che potrebbero attaccare la loro azienda.
    •La penuria di analisti di sicurezza competenti in grado di identificare il numero crescente di minacce che penetrano all’interno delle aziende. Nel 2015, ad esempio, l’uso del crypto-ransomware come strumento di aggressione è aumentato del 35%, ma le aziende aggredite impiegano ancora più di 200 giorni per accorgersi del problema.
    •Scarsa conoscenza specializzata delle tecniche di incident response e remediation per gli ambienti IT colpiti.

    Gli autori dei ransomware continuano ad affinare le proprie tattiche, e le aziende devono imparare a conoscere bene le nuove minacce. Partecipa al webinar Symantec che descrive un attacco di ransomware, le sue conseguenze e la strategia di remediation adottata dall’azienda colpita.
  • Optimizing Data Protection for VCE VxRail Appliance Optimizing Data Protection for VCE VxRail Appliance Alex Almeida Recorded: Sep 27 2016 54 mins
    VCE VxRail Appliance with EMC data protection provides simple, fast and efficient protection of data and applications regardless of where they live, against whatever might happen, and at the right service level based on business value.
  • Effective IT Security in a Connected Mobile World Effective IT Security in a Connected Mobile World Microsoft Recorded: Sep 27 2016 34 mins
    Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.

    Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.

    Join this webcast to explore some common security scenarios such as:
    •How do you provide access when you can't always control the endpoint?
    •How do you know where all your company's files are right now?
    •If you terminate an employee, how would you know what files they had in their possession.?
    •Could you wipe a terminated employee's corporate data while leaving their personal content alone?

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • The Five Problems Facing Business-Critical NFS Deployments The Five Problems Facing Business-Critical NFS Deployments George Crump, Storage Switzerland Recorded: Sep 27 2016 61 mins
    VMware, NetApp and even EMC are proponents of using NFS based storage systems to support mission critical workloads like virtual machines, databases and performance sensitive unstructured data. But in comparison to mission critical fibre channel, the tools to monitor and optimize your NFS infrastructure are lacking. In this webinar Storage Switzerland and Virtual Instruments will discuss the five challenges facing IT professionals that depend on NFS-based storage infrastructure for performance-intensive workloads. You will learn how to detect and overcome:

    * Metadata Bottlenecks
    * Rogue Clients & Noisy Neighbor issues
    * Server/VM Latency issues
    * Poor Write Performance
    * Cluster Node Bottlenecks
  • Decision making under pressure Decision making under pressure Paul Breed MBCI Recorded: Sep 27 2016 46 mins
    Business continuity can be a high pressured role at times, with many decisions having to be made under that pressure. It is important to be able to manage it effectively and so ensure the right decision is taken, whatever the circumstances. In this webinar, Paul Breed MCBI presents a decision making model which includes:

    Information - (Fact, Assumption, Gaps - urgency)
    Threat and Risk Assessment - based on Identity, Capability, Intention
    Development of a Working Strategy - that dovetails the Threat and Risk Assessment
    Options - ideally from a predetermined tactical menu that reduces time critical decision making
    Action - based on the agreed option together with contingencies
    Review - constantly review the decision especially when new information comes to light
  • Anatomie eines Ransomware-Angriffs Anatomie eines Ransomware-Angriffs Alexander Peters, Senior Manager Office of the CTO and Lars Kroll, Technical Lead - Symantec Germany Recorded: Sep 27 2016 64 mins
    Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?

    Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
    •Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
    •Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
    •Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.

    Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
  • Anatomy of a Ransomware Attack Anatomy of a Ransomware Attack Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Recorded: Sep 27 2016 63 mins
    Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.

    Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
  • Business continuity requires a security architecture to reduce risk and cost Business continuity requires a security architecture to reduce risk and cost Jeff Primus AMBCI (Actagis) Recorded: Sep 26 2016 46 mins
    The frequency of cyber-attacks continues to increase at an unparalleled pace. By attacking the most vulnerable value chains of organizations, they result in information confidentiality & integrity breaches, discontinuity of business activities and huge damages. Once considered predominantly as a technological issue, the risks related to the information systems are now evaluated within the Enterprise Risk Management scope. On the other hand, traditionally, Business Continuity Management (BCM) is mostly treated as a domain separate from Information System Security Management (ISSM). With the rapid explosion of cyber threats, the alignment between BCM and ISSM is now becoming a must, in order to provide management with a holistic view and enabling them to implement organizations where the teams closely interact with each other.

    It goes without saying that the organizational part of security and BCM is the key for a successful implementation, yet the information system (IS) part needs to also be addressed in an efficient way. Various standards and frameworks exist to help organizations implementing a BCM, but they lack a strong link with the governance, architecture and security of the IS. In this webinar we will introduce very briefly an innovative approach and describe the first steps for the linkage between the two worlds, enabling an efficient implementation of BC based on an architectured and secured IS.
  • The Problems with NFS on Object Storage The Problems with NFS on Object Storage George Crump, Jonathan Ring Recorded: Sep 26 2016 9 mins
    If object storage is the future of unstructured data storage, NFS is clearly the present. Object storage vendors realize this and provide NFS support. The problem is most of these vendors leverage a NFS gateway to act as the bridge. Gateways create their own problems however, diminishing the value of the object storage investment. In this ChalkTalk video watch as Storage Switzerland’s George Crump and Caringo's Jonathan Ring discuss the ideal way to address NFS on Object shortfalls.
  • ISO 22301 – Les bénéfices pour les organisations et les professionnels ISO 22301 – Les bénéfices pour les organisations et les professionnels Marie-Hélène Primeau MBCI Recorded: Sep 23 2016 52 mins
    Ce webinaire présentera les bénéfices pour les organisation de s’aligner sur la norme ISO 22301 et de la certification à la norme ainsi que les bénéfices pour les individus de connaître la ISO 22301. Le webinaire présentera également la formation offerte par le BCI pour améliorer sa connaissance de cette norme et comment avoir une approche étapiste en vue de certifier une organisation en utilisant l’outil d’auto-évaluation. Ces formation et outil ont été développés par ICOR, le International Consortium for Organizational Resilience.


    Marie-Hélène Primeau est formatrice pour le BCI et enseigne les cours ISO 22301 Lead Auditor. Sa firme, Premier Continuum, a aussi intégré l’outil d’auto-évaluation ISO 22301, développé par ICOR, dans son logiciel de continuité ParaSolution et le distribue sous licence.
  • I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence David Grout, Technical Director, Southern Europe, FireEye Recorded: Sep 23 2016 46 mins
    Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
  • VMworld 2016 Wrap Up: Top Trends You Need to Know VMworld 2016 Wrap Up: Top Trends You Need to Know Sushant Rao, Sr. Director of Product Marketing, DataCore Software Recorded: Sep 22 2016 48 mins
    Did you attend VMworld 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
    Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from VMworld. It’s the next best thing to being there!
  • Tech Talk: Protecting Your Business From a Destructive Cyberattack Tech Talk: Protecting Your Business From a Destructive Cyberattack Alex Almeida Recorded: Sep 22 2016 40 mins
    Threats to the business are evolving quickly. Learn EMC's solution to protect your business from a destructive cyber attack
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Gabriela Markette, Field Marketing Manager, DataCore Software Oct 4 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • ¿Trabaja su software de backup para usted, o usted para su software de backup? ¿Trabaja su software de backup para usted, o usted para su software de backup? Cesar Funes - Commvault Technical Partner Enablement Manager Oct 5 2016 10:30 am UTC 60 mins
    Conformarse vs Orquestar.
    Las soluciones de IT que selecciona deberían ayudarle a dar el mejor soporte posible a su negocio. Pero hay algunas que heredamos, o que seleccionamos con una visión parcial de nuestros sistemas, y que acaban frenando nuestra capacidad de dar valor a nuestra empresa como Departamento de IT.

    Las soluciones de protección de datos suelen encontrarse en este segundo caso. El hecho de que sus fabricantes, como Veritas, Veeam o IBM, no invierten lo suficiente en innovación para convertirlas en auténticas herramientas de gestión de datos empresariales, o de que están pensadas sólo para cubrir una parte de los sistemas, trae como consecuencia que Usted, que las tiene integradas en sus plataformas, sufra algunos o todos estos problemas:

    • Gastos de administración y operación excesivos
    • Inversión en plataformas de soporte de protección de datos costosas y propietarias
    • Riesgos financieros asociadas a la incapacidad de cumplir SLAs y dar valor a su negocio
    • Limitación en la libertad para elegir cuáles serán los sistemas de producción que mejor soporten su negocio, simplemente porque no tendrá cómo protegerlos.

    Es hora de liberarse de esta carga, y apostar por el líder al que el mercado aclama como un socio tecnológico innovador que le devuelve el control sobre sus decisiones de IT. Si va a renovar su actual software de protección de datos, es hora de decidirse por el mejor.

    Únase a nosotros en este webinar y descubra cómo Commvault le garantiza que su software de copia de seguridad no le limitará la capacidad de elegir proveedores de sistemas de producción, y reducirá sus riesgos financieros de cara a la Dirección de su empresa disminuyendo la complejidad de su infraestructura y aumentando su productividad.
  • New Hive and Performance Features in WANdisco Fusion 2.9 (EMEA) New Hive and Performance Features in WANdisco Fusion 2.9 (EMEA) Paul Scott-Murphy, VP Product Management Oct 5 2016 12:00 pm UTC 60 mins
    WANdisco Fusion 2.9 delivers new levels of performance and scalability, with a number of enhancements that make it easier to support hybrid big data deployments with continuous and consistent access across any mix of on-premise and cloud environments.

    One of the most significant new features is the application of WANdisco’s patented active transactional replication to the Hive metastore, used to support familiar SQL-like access to Hadoop. Changes made to table definitions and other objects in the Hive metastore are replicated to Hive metastore instances deployed with other Hadoop clusters. Data added to the underlying Hadoop cluster referencing the new object definitions is replicated to other Hadoop clusters in a subsequent step, to guarantee consistent access across clusters and locations.

    WANdisco Fusion 2.9’s patented technology also:

    •Enables throughput in excess of 100,000 transactions per minute - well beyond the largest enterprise requirements
    •Ensures operations are not affected by transient network outages or “flapping WAN” links
    •Supports scenarios in hybrid cloud deployments where on-premise environments cannot accept inbound network connection requests

    Join us on October 5th as we present and demo the latest release of WANdisco Fusion.
  • Multi-Cloud Management - How to effectively manage multiple cloud environments Multi-Cloud Management - How to effectively manage multiple cloud environments Brent Brightwell, SVP Strategy, DoubleHorn Oct 5 2016 5:00 pm UTC 30 mins
    The digitization of businesses and the way that IT supports the needs of these businesses has changed significantly over time. Today, different IT workloads can be deployed on different types of cloud services, depending upon the business requirements. As a result, many IT departments are moving their infrastructure to the cloud and multi-cloud virtual environments. A multi-cloud management platform allows enterprises to manage workloads and applications across all cloud deployment models, including public, private, and hybrid. Using the right platform for this workload enables enterprises to drive favorable business results. The multi-cloud approach facilitates transition to the IT-as-a-Service (ITaaS) model, where IT departments act as service brokers and support organizations in optimizing their IT infrastructure consumption. In this webinar, we'll discuss the key features of a multi-cloud management platform and also discuss the benefits, challenges, and opportunities in the existing market.
  • Microsoft Ignite 2016 Review: Top Trends You Need to Know Microsoft Ignite 2016 Review: Top Trends You Need to Know Sushant Rao, Sr. Director of Product Marketing, DataCore Software; Todd Mace, Tech Evangelist, DataCore Software Oct 5 2016 6:00 pm UTC 45 mins
    Did you attend Microsoft Ignite 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
    Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from Ignite. It’s the next best thing to being there!
  • Multi-layered online attacks: IT security strategies to protect your company Multi-layered online attacks: IT security strategies to protect your company Paul Mazzucco, TierPoint- Chief Security Officer; Deepak Patel, Imperva - Director, Security Strategy Oct 5 2016 6:00 pm UTC 60 mins
    The latest hacking strategies include attacking targets from multiple fronts using DDoS attempts, malware and other techniques at the same time. Automation, including widespread use of compromised systems, hired botnets and IoT (Internet of Things) devices, is on the rise.

    Join us to learn more about multi-layered attacks and how intelligence and automation are making them significantly more powerful. You will also learn tips to help your organization mitigate the risks.

    Key Learnings:
    · How bots are simplifying automation creating an even bigger volumetric attack force.
    · How DDoS attacks are often a smoke screen to other malware attacks happening.
    · Strategies for protecting your organization against multi-layer attacks.
  • Cloud Security and Manageability on a Personal Level Cloud Security and Manageability on a Personal Level Microsoft Oct 5 2016 8:00 pm UTC 60 mins
    Help your employees take personal responsibility for IT security!

    From biometrics to multi-factor authentication, how do you help your employees be protected at a personal level?

    We’ll explore how you can go beyond mere password strength to help prevent your employees' identities and your business from being compromised. Join this webcast to learn how cloud services and operating systems are designed with security in mind, while preserving natural, friendly user interactions.

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • What's Wrong with Disaster Recovery as a Service (DRaaS) and How to Fix it What's Wrong with Disaster Recovery as a Service (DRaaS) and How to Fix it George Crump, Storage Switzerland Oct 6 2016 5:00 pm UTC 60 mins
    Typical disaster recovery plans leverage backup and or replication to move data out of the primary data center and to a secondary site. Historically the secondary site is another data center the organization maintains. But now organizations look to the cloud to become a secondary site, leveraging the cloud as a backup target and even a place to start their applications in the event of a failure. The problem is this approach merely simulates a legacy design and presents some significant recovery challenges.

    Join Storage Switzerland and ClearSky Data for a live webinar to discuss how organizations might be able to re-invent disaster recovery using the cloud.
  • New Hive and Performance Features in WANdisco Fusion 2.9 New Hive and Performance Features in WANdisco Fusion 2.9 WANdisco Oct 6 2016 5:00 pm UTC 60 mins
    WANdisco Fusion 2.9 delivers new levels of performance and scalability, with a number of enhancements that make it easier to support hybrid big data deployments with continuous and consistent access across any mix of on-premise and cloud environments.

    One of the most significant new features is the application of WANdisco’s patented active transactional replication to the Hive metastore, used to support familiar SQL-like access to Hadoop. Changes made to table definitions and other objects in the Hive metastore are replicated to Hive metastore instances deployed with other Hadoop clusters. Data added to the underlying Hadoop cluster referencing the new object definitions is replicated to other Hadoop clusters in a subsequent step, to guarantee consistent access across clusters and locations.

    WANdisco Fusion 2.9’s patented technology also:

    • Enables throughput in excess of 100,000 transactions per minute - well beyond the largest enterprise requirements
    • Ensures operations are not affected by transient network outages or “flapping WAN” links
    • Supports scenarios in hybrid cloud deployments where on-premise environments cannot accept inbound network connection requests

    Join us on October 6th at 10AM Pacific, 1PM Eastern as we present and demo the latest release of WANdisco Fusion.
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Oct 6 2016 6:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • Running Your Mission Critical Line of Business Applications Running Your Mission Critical Line of Business Applications Ross LoForte, Technology Architect, Microsoft; Jimmy May, SQL Server Solutions Architect, SanDisk Oct 7 2016 4:00 pm UTC 60 mins
    In a recent Gartner survey, more than 85% of enterprise respondents indicated that data growth, performance and availability was their largest challenge.

    Join this session to learn how SQL Server can help you run your mission critical line of business applications including:

    - Enterprise performance
    - IT Security and compliance
    - Scalability
    - High availability and disaster recovery
  • The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime Nahim Fazal, Head of Cybersecurity Development at ‎Blueliv Oct 11 2016 2:00 am UTC 45 mins
    Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

    This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Oct 11 2016 3:00 pm UTC 45 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • The Current State of Emerging Tech [Emerging Tech Virtual Summit] The Current State of Emerging Tech [Emerging Tech Virtual Summit] Steve Clayton, Chief Storyteller, Microsoft Oct 11 2016 4:00 pm UTC 30 mins
    Moving into the future, increases in our technological capabilities will be powered by technology out of our sight. Harry Shum, Executive Vice President of Microsoft’s Technology and Research, calls this the “invisible revolution.” This revolution has become possible because of emerging technologies that didn’t exist a decade ago, like cloud computing, internet of things (IoT) and artificial intelligence.

    Join our special event dedicated to how these emerging technologies are changing the world. You’ll hear leading researchers discuss and explore:
    •What’s possible with artificial intelligence and machine learning.
    •How IoT is being used to make farms more productive and feed more people around the world.
    •Human-computer interaction and the next wave of user interfaces controlled by voice,
    gaze or gesture.
    •How data storage is becoming cheaper and energy-efficient by putting data centers under water.

    These powerful technologies are changing the world, and they can have a transformational impact on your business—the products you make, the way you operate and how you engage with your customers.

    Join this session for an emerging tech “state of the union.” You’ll hear about the latest trends and get insight on how you go about discovering the next great innovation.
  • Backup Impossible: Growing Data Sets vs. Shrinking Backup Windows Backup Impossible: Growing Data Sets vs. Shrinking Backup Windows Troy, Spiceworks; Jay Livens, Dell EMC; Alex Almeid, Dell EMC; Kyle Wisdom, Peninsual Credit Union Oct 11 2016 5:00 pm UTC 60 mins
    It’s no secret the amount of data in the world grows at an exponential rate. But as if larger data sets that take longer to back up wasn’t already enough of a challenge, add in 24x7 business hours, more aggressive RTOs and RPOs, and the constant threat of malware and ransomware, how are IT pros supposed to keep up?

    In this video meet-up, we’ll be discussing the future of backup and how to truly make sure your data is protected in this seemingly impossible environment. We’ll be sitting down with backup and storage experts from EMC and an IT pro from the Spiceworks Community.

    We will discuss:
    - How data de-duplication works and the difference it can make for time crunched backups
    - Managing backups of both virtual and physical machines, including to and from the cloud
    - Protecting your backups against malware and ransomware
  • Solving the dilemma of securing private data in the cloud Solving the dilemma of securing private data in the cloud Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Robert Arandjelovic, Security Strategy Director EMEA - Bluecoat Oct 12 2016 10:00 am UTC 45 mins
    The cloud allows open sharing of data, allowing people to access information at home, in the office or on the move. This openness has come at a price, putting security and data privacy at risk.

    Research shows that on average, organisations are aware of less than 10% of all cloud applications used by their staff, providing a massive blind spot. If you don’t know where your sensitive data is, how do you secure it? In this 45 minute webinar we will outline the Symantec three-part framework for managing the Information Protection lifecycle and show how this applies to securing the cloud. The webinar will address:
    · The opportunities and risks of moving data to the cloud
    · Security and privacy implications
    · The Symantec three-part framework
    o How to ensure only trusted users and devices can access data
    o How to classify and discover sensitive data, and gain full visibility into the cloud
    o How to protect data through the application of encryption technology
    · Future direction and recommendations

    So if you are struggling with the dilemma of providing open access to sensitive data, register for this webinar today.
  • La protezione dei dati privati sul cloud: un dilemma risolto La protezione dei dati privati sul cloud: un dilemma risolto Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Oct 12 2016 12:00 pm UTC 60 mins
    Il cloud rende possibile la condivisione dei dati che diventano così accessibili da casa, dall’ufficio o in mobilità. Ma questa flessibilità ha un costo: la sicurezza e la privacy dei dati sono a rischio. I team addetti a sicurezza e rischi IT gestiscono applicazioni legittime, ma cosa ne è dei sistemi IT ombra o non autorizzati? Il problema è di notevoli proporzioni. Le ricerche indicano che, in media, le aziende sono a conoscenza di meno del 10% di tutte le applicazioni cloud utilizzate dal loro personale, con un'area cieca molto vasta. Come puoi proteggere i tuoi dati sensibili se non sai dove sono? In questo webinar di 45 minuti presentiamo il programma in tre parti di Symantec per gestire il ciclo di vita della protezione e mostrare come si applica al cloud. Il webinar analizza:
    · Opportunità e rischi correlati al trasferimento dei dati sul cloud
    · Implicazioni per la sicurezza e la privacy
    · Il programma in tre parti di Symantec
    o Come assicurare che l’accesso ai dati sia riservato solo a utenti e dispositivi autorizzati
    o Come classificare e rilevare i dati sensibili e ottenere la totale visibilità sul cloud
    o Come proteggere i dati applicando una tecnologia di crittografia
    · Consigli e linee guida per il futuro

    Durante il webinar avrai la possibilità di fare domande ai nostri speaker.

    Se il tuo dilemma è dare o meno libero accesso a dati sensibili, iscriviti subito a questo webinar.
  • Is Your PKI Future-Proofed? Is Your PKI Future-Proofed? Larry Ponemon, Chairman & Founder Ponemon Institute, and John Grimm, Senior Director of Security Strategy, Thales e-Security Oct 12 2016 3:00 pm UTC 60 mins
    Enterprises are dealing with a new and evolving set of challenges and requirements that are driving changes to their core public key infrastructure (PKI). The number of applications that depend on certificate issuance services is increasing dramatically, and ranges from basic SSL and user/device authentication to cloud services and now to the Internet of Things (IoT). So, what are enterprises doing to meet these new challenges?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings of the 2016 Global PKI Trends Study, including:
    •PKI best practices that enterprises are adopting
    •The latest trends in PKI deployment – from internal to managed to the cloud and more
    •How hardware security modules (HSMs) are being used to improve the trust and assurance level of mission-critical PKIs
  • How UBA and Machine Learning Can Turbocharge SIEM How UBA and Machine Learning Can Turbocharge SIEM 451 Group, Niara, Intel Security Oct 12 2016 5:00 pm UTC 60 mins
    Many enterprises have leveraged the correlation, visualization and case management of SIEM to drive the workflow of their Security Operations Center and much of the daily activity of the security team. With the introduction of big data scale, machine learning-based analytics and instantly-accessible forensic data, Network and User Behavior Analytics is a terrific complement to SIEM. Intel and Niara will explain how these new capabilities can be seamlessly introduced to SIEM and demonstrate both enhanced attack detection as well as accelerated investigations and response directly from the McAfee Enterprise Service Management (ESM) console.
  • Cómo resolver el dilema de asegurar la información confidencial en la nube Cómo resolver el dilema de asegurar la información confidencial en la nube Ramsés Gallego - Symantec Strategist Oct 13 2016 7:00 am UTC 60 mins
    La nube permite intercambiar la información de forma abierta, por lo que cualquiera puede acceder a ella en casa, en la oficina o en la calle. Pero esta libertad tiene un precio, ya que supone un riesgo para la seguridad y para la privacidad de los datos. Tanto el área informática de seguridad como la de gestión de riesgos utilizan aplicaciones autorizadas, pero los sistemas informáticos no autorizados, es decir, los llamados shadow IT o informática en la sombra, siguen siendo un problema importante. Los datos muestran que, de media, las organizaciones conocen menos del 10 % de las aplicaciones en la nube que utilizan sus empleados, un importante vacío en materia de visibilidad. Si no sabe dónde está su información confidencial, ¿cómo puede asegurarla? En este webinar de 45 minutos le presentaremos el marco de tres fases de Symantec para la gestión del ciclo de vida de la protección de la información y le mostraremos su aplicación para la seguridad en la nube. El webinar tratará:
    · Las oportunidades y los riesgos de transferir datos a la nube
    · Las implicaciones de seguridad y privacidad
    · El marco de tres fases de Symantec
    o Cómo garantizar que únicamente los usuarios y dispositivos de confianza pueden acceder a los datos
    o Cómo clasificar y descubrir la información confidencial y conseguir una visibilidad total en la nube
    o Cómo proteger los datos a través de la aplicación de tecnologías de cifrado
    · Consejos y recomendaciones para el futuro

    Durante el webinar, tendrá la oportunidad de formular preguntas a los presentadores.

    Si proporcionar acceso abierto a la información confidencial le supone un auténtico dilema, inscríbase en este webinar.
  • É o seu software de backup que trabalha para si, ou o contrário? É o seu software de backup que trabalha para si, ou o contrário? Cesar Funes - Commvault Technical Partner Enablement Manager Oct 13 2016 9:00 am UTC 60 mins
    Conformar vs Orquestrar.
    As soluções de TI que escolhe deveriam ajudá-lo a dar o melhor suporte possível ao seu negócio. Mas há algumas que herdamos, ou que escolhemos com uma visão apenas parcial dos nossos sistemas, e que acabam por limitar a nossa capacidade de dar valor à nossa empresa como Departamento de TI.

    As soluções de proteção de dados estão frequentemente neste segundo caso. O facto de os seus fabricantes, como a Veritas, a Veeam ou a IBM, não investirem o suficiente em inovação para as tornar em autênticas ferramentas de gestão de dados empresariais, ou o facto de estarem pensadas apenas para cobrir uma parte dos sistemas, traz como consequência que quem as tenha integradas nas suas plataformas sofra de alguns ou de todos estes problemas:

    •Gastos de administração e operação excessivos
    •Investimento em plataformas de suporte de proteção de dados dispendiosas e proprietárias
    •Riscos financeiros associados à incapacidade de cumprir SLAs e dar valor ao seu negócio
    •Limitação da liberdade de escolha dos sistemas de produção que melhor suportem o seu negócio, simplesmente porque não terá como protegê-los.

    Está na hora de se libertar desta carga e apostar no líder reconhecido pelo mercado como um parceiro tecnológico inovador que lhe devolve o controlo sobre as suas decisões de TI. Se vai renovar o seu atual software de proteção de dados, está na hora de se decidir pelo melhor.

    Junte-se a nós neste webinar e descubra como a Commvault lhe garante que o seu software de cópia de segurança não irá limitar-lhe a capacidade de escolha dos fornecedores de sistemas de produção, e reduzirá os seus riscos financeiros perante a direção da sua empresa, diminuindo a complexidade da sua infraestrutura e aumentando a sua produtividade.
  • Résoudre le dilemme de la sécurisation des données privées dans le cloud Résoudre le dilemme de la sécurisation des données privées dans le cloud Hervé Doreau, Directeur Technique – Symantec France Oct 13 2016 9:00 am UTC 60 mins
    Le cloud permet un partage ouvert des données, rendant les informations accessibles chez soi, au bureau ou même en déplacement. Mais cet avantage a un prix : il met en danger la sécurité et la confidentialité des données. La sécurité IT dresse des listes d’applications autorisées, mais qu’en est-il des systèmes non autorisés ou du Shadow IT ? C’est un problème majeur. Des études montrent que, en moyenne, les entreprises sont au courant de moins de 10 % des applications cloud utilisées par leur personnel, ce qui constitue un énorme angle mort. Si vous ne savez pas où se trouvent vos données sensibles, comment les sécuriser ? Dans ce webcast de 45 minutes, nous exposerons le cadre de travail en trois volets proposé par Symantec pour la gestion du cycle de vie de la protection des informations et nous montrerons comment il s’applique à la sécurisation du cloud. Nous aborderons les points suivants :
    · Opportunités et risques du transfert des données vers le cloud
    · Implications en termes de sécurité et de confidentialité
    · Cadre de travail en trois volets proposé par Symantec
    o Comment s’assurer que seuls des utilisateurs et des appareils de confiance peuvent accéder aux données
    o Comment classer et déceler les données sensibles et obtenir une visibilité complète dans le cloud
    o Comment protéger les données grâce à l’application d’une technologie de chiffrement
    · Futures orientations et recommandations

    Il sera possible d’interroger les intervenants pendant le webcast.

    Donc, si vous devez composer avec un accès ouvert à l'information et la protection de données sensibles, inscrivez-vous dès aujourd’hui à ce webcast.
  • Lösung des Dilemmas der Absicherung privater Daten in der Cloud Lösung des Dilemmas der Absicherung privater Daten in der Cloud Thomas Hemker – Symantec Security Specialist Oct 13 2016 12:00 pm UTC 60 mins
    Die Cloud ermöglicht einen freien Austausch von Daten, bei dem Nutzer zuhause, im Büro oder unterwegs auf die benötigten Informationen zugreifen können. Diese neue Freiheit hat jedoch auch ihren Preis, denn sie geht mit einem Risiko für Sicherheit und Privatsphäre einher. Offiziell genehmigte Anwendungen werden von IT-Sicherheitsteams verwaltet, doch was ist mit nicht genehmigten oder Schatten-IT-Systemen? Sie stellen ein großes Problem dar. Untersuchungen zeigen, dass Unternehmen im Durchschnitt von weniger als 10 % aller Cloud-Anwendungen Kenntnis haben, die von ihren Mitarbeitern genutzt werden. So entsteht ein enorm großer blinder Fleck. Wie können Sie Ihre sensiblen Daten absichern, wenn Sie nicht wissen, wo sie sich befinden? In diesem 45-minütigen Webinar geben wir Ihnen einen Überblick über das dreiteilige Rahmenkonzept von Symantec für die Verwaltung des Informationsschutz-Lebenszyklus und zeigen Ihnen, inwieweit es für die Absicherung der Cloud relevant ist. Das Webinar behandelt die folgenden Themen:
    · Die Möglichkeiten und Risiken, die durch eine Verlagerung von Daten in die Cloud entstehen
    · Implikationen für Sicherheit und Datenschutz
    · Das dreiteilige Rahmenkonzept von Symantec
    o Wie gewährleistet werden kann, dass nur als vertrauenswürdig eingestufte Nutzer und Geräte auf Daten zugreifen können
    o Wie sensible Daten erkannt und klassifiziert werden und vollständige Transparenz in der Cloud erzielt wird
    o Wie Daten durch die Anwendung von Verschlüsselungstechnologie geschützt werden können
    · Zukünftige Ausrichtung und Empfehlungen

    Während des Webinars wird es Gelegenheit geben, den Vortragenden Fragen zu stellen.

    Sollte Ihnen das Dilemma des freien Zugriffs auf sensible Daten Schwierigkeiten bereiten, melden Sie sich jetzt für dieses Webinar an.
  • Businesses Held Hostage: Are You Ready for a Ransomware Attack? Businesses Held Hostage: Are You Ready for a Ransomware Attack? Scott Crawford, Research Director at 451 Research & Matthew Gardiner, Senior Product Marketing Manager at Mimecast Oct 13 2016 5:00 pm UTC 60 mins
    No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.

    How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:

    -The impact of ransomware: Just how serious a threat is it?
    -How could ransomware get into your organization?
    -Why is ransomware happening more now than ever before?
    -How can you best defend against a ransomware attack…before it locks up your critical information assets?

    We’ll discuss how a three-pronged strategy of prevention, business continuity and email archiving can help defeat ransomware before it take your business hostage.
  • Webinar: Solving the “password1” Problem: Why Businesses Need 2FA Webinar: Solving the “password1” Problem: Why Businesses Need 2FA Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products Oct 13 2016 5:00 pm UTC 60 mins
    Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.

    With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.

    In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
    •Account credential theft: What can be done to prevent employees from falling into a trap?
    •How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
    •The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.