Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.

    But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, they are building systems that look an awful lot like ETL.
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Overhead power distribution in your data center offers many attractive possibilities, but is not without its challenges.

    Join Starline's Director of Marketing, Mark Swift; CPI’s Senior Data Center Consultant, Steve Bornfield; and University of Florida's Joe Keena for an exploration of the options and some of the pitfalls, supported by real-life examples from the field.
  • Peter is investigating DevOps, Bill looks at security while Max is stuck on the infrastructure level
  • The goal of Virtual Desktop Infrastructure (VDI) is to lower the operational costs of supporting an organization’s desktops and laptops. A VDI project should make it easier for IT to support users, keep the organization safe from viruses and better protect its data assets. The key to a successful VDI project is user adoption. But while many organizations consider using an All-Flash Array (AFA) to deliver the performance that will lead to user adoption, the problem is AFAs drive up the cost per desktop, increase the vulnerability of the architecture and encourage additional storage silos.

    Join Storage Switzerland and Cloudistics for an informative webinar that will provide an alternative approach that meets user’s performance expectations while leveraging existing – and often already paid for – storage hardware and does not introduce new silos of storage.
  • In this session we will discuss how state and local government organizations can create modern cloud applications in Microsoft Azure. Learn how you can help modernize your agency and the services you deliver to citizens using:
    •Devices that are sensors, sensor gateways or IoT devices that are publishing events to Event Hub either directly or using Microsoft IoT Hub SDK
    •Gateways - a logical component that groups processing, management of event processors
    •Event processor routes and device actors - Device Actors are chained with various other actor types that are responsible for aggregating, storing, analysis and reporting on device events

    Key takeaways:
    •Initiate a project using Visual Studio Online
    •How an IoT pattern can be used in Azure IoT Hub using a presentation and references to real tenants.
  • Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect, impacting critical applications. Determining the root cause of the problem is a challenge for most IT organizations, since ESBs serve as a ‘black box’, offering little insight into the issue.

    Now, you can assess and resolve performance issues for applications that communicate across your ESB, before they affect your users. Join Richard Nikula, Vice President, Product Development and Support at Nastel, to learn how Nastel AutoPilot for CA Cross-Enterprise APM lets you analyze application behavior in real-time in production, test and development environments.
  • At the BCI World Conference in November, the Business Continuity Institute, supported by Zurich Insurance Group, launched their annual Supply Chain Resilience Report. This webinar is a presentation of some of the key findings of the report. This includes that nearly one in ten organizations are not aware of who their key suppliers are, leaving them open to severe disruption as they are unable to manage their supply chain effectively.
  • Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will explain what this new offering is, and how it enables you to leverage the public cloud for disaster recovery with a solution that plugs into your existing backup environment.
  • Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.

    Register for this webcast to learn about:
    •New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
    •How to provide remote access and single sign-on to on-premises web applications with Application Proxy
    •Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service

    Register now to watch live or receive notification when this program is available on-demand.
  • Joshua “Jedi Master” Stenhouse will show you how to protect your data center from the worst disasters the death star can dish out. We’re talking all of Alderaan failed over and live within seconds. Governor Tarkin can suck it! Plus, you don’t want to miss the best giveaways and network diagrams in the galaxy…register today!

    In this Star Wars themes webinar you’ll learn more about Zerto Virtual Replication (ZVR), the industry’s leading hypervisor-based replication solution for VMware environments that:

    Delivers robust business continuity and disaster recovery (BC/DR) for VMware, Hyper-V and AWS.
    Meets the hardest SLAs while being easy to use.
    Supports public, private or hybrid clouds.
    Easily migrates production workloads across different infrastructures.
  • Napkins, notepads, and multiple devices – keeping notes is a mess. Research suggests that the average employee spends roughly 76 hours a year looking for misplaced notes, items or files (Brother International Organization, 2010).

    Imagine what you could do if you could capture all your ideas and information in one versatile digital notebook. Join us for this webcast to learn how you can harness the power of digital notetaking. Start by collecting and organizing all kinds of information.

    In this webcast, you’ll learn now you can get more hours out of the day by:
    •Collecting information from multiple sources into one handy notebook. For example, grab a news clip off the web, record an inspired idea on the go and combine handwriting, spreadsheets, diagrams, even email.
    •Accessing your information from nearly any device, any time. Use familiar Microsoft Office tools to access your notebook.

    Microsoft OneNote makes it easier to collaborate, whether you want to share your notes with colleagues, add them to a meeting or work together on the same notebook. It’s the simple, more effective way of getting down to business. Join us for this webcast to learn how you can get started organizing your business today.
  • No wired connection can deliver 100% uptime. Fortunately, there are practical, convenient, and affordable ways to ensure your organization is not disrupted due to an outage.

    In this webinar, our experts will discuss network failover solutions and next generation Out-of-Band Management (OOBM) through the cloud. Next generation OOBM allows the ability to extend management capability to any primary router Out-of-Band without a static IP. Equipped with Power-over-Ethernet for flexible, unobtrusive placement anywhere to optimize cellular reception, this powerful solution reduces truck rolls, consolidates infrastructure, and maximizes uptime for businesses that require always-on connectivity.

    Join Cradlepoint and guest speaker Ken Silay, former director of technology for Chico’s FAS Inc., for a webinar to learn how businesses today are using Cradlepoint solutions for 99.999% network uptime.

    Attendees will learn:
    -How to mitigate the costs of downtime with 4G LTE
    -The advantages of next generation Out-of-Band Management
    -How Cradlepoint’s turnkey failover networking solutions seamlessly integrate with existing network infrastructure
  • Les entreprises ont besoin de travailler de manière plus flexible et cette nécessité devient source de défis. Gérer les données et les collaborateurs, où qu’ils se trouvent, avec l’émergence de nouvelles technologies, peut vous amener à penser que la protection de vos informations est un défi insurmontable.

    À partir du 22 janvier 2016, nous organisons une série de webcasts consacrés à la protection des informations. Des experts spécialisés en débattront et vous guideront pour la protection de vos informations en temps réel. Nous examinerons comment utiliser les données pour prendre de meilleures décisions et comment les actions entreprises avant, pendant et après un incident peuvent réduire l’impact subi.

    Presenters
    Laurent Heslault , Directeur Statégie Sécurité
    Hervé Doreau, Directeur Technique
    Stéphane Laguerre, Spécialiste DLP
    Cédric Pottier, Spécialiste User Authentication
  • As Git has grown in popularity many IT organizations are wondering if migrating from Subversion to Git is inevitable. The two have different strengths architecturally and support different models of development. This webinar will describe how to ensure you provide developers with the most appropriate tool.
  • Is your unstructured data growing rapidly? Is your budget strained? Has managing your storage become too time consuming and complicated?

    In this session, Adrian Herrera, VP of Marketing, will share Caringo’s experiences working with hundreds of customers of various sizes across a number of different industries so you can learn:

    · The differences between block, file and object storage
    · What benefits are achieved by implementing an object store
    · What common use cases are addressed by object storage
    · If object storage is right for your business
  • Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors