Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Data Protection Made Easy: App Availability and Robust Data Protection
    Data Protection Made Easy: App Availability and Robust Data Protection Marc Lucas, Systems Engineer, Commvault Live 60 mins
    In this webinar, produced in conjunction with Commvault EMEA Platinum Partner of the Year COOLSPIRiT, learn how Commvault's scalable, powerful and simple solutions ensure Application Availability and Robust Data Protection across your entire infrastructure.

    Presented by Marc Lucas, Commvault Systems Engineer, find out how to:

    * Simplify the move to the Cloud
    * Utilise award-winning BaaS, DraaS and SaaS Data Protection
    * Obtain greater insight with software defined storage
    * Ensure data availability for business-critical applications
    * Minimize system downtime with an innovative and scalable solution

    COOLSPIRiT provides in-depth knowledge and expertise across the solutions portfolio. Their highly-skilled accredited experts can analyse and review your existing IT infrastructure to recommend and deliver the best value for your business. With proven best practice and multiple use cases, COOLSPIRiT Solutions Architects can help to design, configure and implement a robust IT strategy for data availability, compliance and disaster recovery.
  • Elasticsearch and Object Storage
    Elasticsearch and Object Storage Jamshid Afshar, Engineer & Tony Barbagallo, VP of Product Recorded: Jul 26 2017 42 mins
    Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability of metadata searching operations. Join Caringo VP of Product Tony Barbagallo and Caringo Engineer Jamshid Afshar as they take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage.
  • The Showdown for Data Preservation: Iron Mountain vs. The Cloud
    The Showdown for Data Preservation: Iron Mountain vs. The Cloud Storage Switzerland, CloudLanes Recorded: Jul 26 2017 59 mins
    Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Recorded: Jul 26 2017 28 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • MeetTheCEO of CloudLanes!
    MeetTheCEO of CloudLanes! Storage Switzerland’s George Crump and Charlie Hodges Recorded: Jul 25 2017 41 mins
    CloudLanes CEO, Asif Moinuddin is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Moinuddin's background, introduces listeners to CloudLanes creators of the Cloud Data Platform, which enables enterprises to responsibly move data from on-premises to any cloud, between clouds, and utilize software from any cloud to light up their data with integrity and assurance. This enables businesses to fully leverage the agility, scale, security, and economics of the cloud, risk-free with better TCO.

    Listen to the live or on demand conversation and get your cloud data questions answered by our panel of experts. No Registration Required!
  • Dell EMC Data Protection: Vision and Strategy
    Dell EMC Data Protection: Vision and Strategy Scott Waterhouse Recorded: Jul 25 2017 52 mins
    In this session, you will learn about the state of the nation of Dell EMC Data Protection. What are the current Data Protection challenges our customers are facing? What are the unique benefits of the Dell EMC Data Protection solution? How do we assist our customers and partners with their effort to Modernize, Automate, and Transform their IT environments through efficient and innovative solutions? The discussion will cover protecting virtual environments, cloud based applications, and how to gain the efficiencies of cloud storage for long term retention.
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Mega Breaches: How to mitigate your risks using Data-Centric Security?
    Mega Breaches: How to mitigate your risks using Data-Centric Security? Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec Recorded: Jul 25 2017 57 mins
    What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.

    Get advice on preventing data breaches from these industry experts:

    • Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.

    • Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.

    Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
  • Next Gen App Primary Storage
    Next Gen App Primary Storage Mike Matchett, Sr. Analyst & Consultant, Taneja Group Recorded: Jul 24 2017 2 mins
    In this final part of a 3 part series, Senior Analyst & Consultant Mike Matchett discusses Igneous Systems and next gen app primary storage.

    Igneous Systems promises to help filer-dependent enterprises keep up with all their file protection challenges with their Igneous Hybrid Storage Cloud that features integrated enterprise file backup and archive.
  • Big Data, HPC and Storage Interview with Frederic Van Haren, HighFens
    Big Data, HPC and Storage Interview with Frederic Van Haren, HighFens Mike Matchett, Taneja Group; Frederic Van Haren, HighFens Recorded: Jul 21 2017 12 mins
    In this highly topical interview, I get to question Frederic Van Haren about a number of big data and HPC storage topics. For years, before the world even called it big data, Frederic was responsible for some of the biggest and fastest growing big data/HPC analytical datasets in the world, actively used by large teams of highly advanced speech-to-text researchers with cutting edge analytics, and in global production operations for a variety of well-known applications.
    I ask Frederic for some of his hard-earned insights and best practice advice for those looking to implement big data storage in their enterprises for analytics, data lakes, and whatever the future may bring. We also get in some questions about what IT folks should do for their careers, and what to focus on first in these kinds of projects.
  • Overcoming the Top 3 Challenges of the Storage Status Quo
    Overcoming the Top 3 Challenges of the Storage Status Quo Storage Switzerland, Panzura Recorded: Jul 20 2017 61 mins
    Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can't meet the unstructured data demands of the mobile workforce or distributed organizations. In this webinar, George Crump, Lead Analyst at Storage Switzerland and Brian Wink, Director of Solutions Engineering at Panzura will expose the hidden gotcha's of the storage status quo and explore how to manage unstructured data in the cloud.
  • Multi-cloud is the new normal and hybrid cloud is inevitable.
    Multi-cloud is the new normal and hybrid cloud is inevitable. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jul 20 2017 45 mins
    As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
  • Maximum Availability Architecture for Oracle BDA and BDCS
    Maximum Availability Architecture for Oracle BDA and BDCS Paul Scott-Murphy, Product Management, WANdisco,Jean-Pierre Dijcks, Product Manager, Oracle, Nick Collins, Analyst, Accenture Recorded: Jul 20 2017 55 mins
    Join this discussion with expert panel Paul Scott-Murphy of WANdisco, Jean-Pierre Dijcks from Oracle, and Nick Collins of Accenture, to learn how to:

    - Deploy Oracle Big Data Appliance (BDA) and Big Data Cloud Service (BDCS) in environments running any mix of HCFS compatible distributions with a path for full cluster migration with no downtime and no data loss.
    - Meet enterprise SLAs with Oracle Maximum Availability Architecture.
    - Replicate selected data among multiple big data systems and verify that they remain consistent regardless of where they are ingested or changed.
    - Replicate data at any geographic distance with signficantly low RPO and RTO.
    - Complete data transfer in approximately half the time of DistCp rgardless of the load imposed on the cluster.
    - Overcome the limitations of traditional approaches that leverage DistCp or dual-ingest methods.

    About the Presenters:

    Paul Scott-Murphy VP of Product Management at WANdisco. Paul Scott-Murphy has overall responsibility for the definition and management of WANdisco's product strategy, the delivery of product to market and its success. This includes direction of the product management team, product strategy, requirements definitions, feature management and prioritization, roadmaps, coordination of product releases with customer and partner requirements, user testing and feedback.

    Jean-Pierre Dijcks, Master Product Manager at Oracle. Highly experienced product manager with 15 years of experience in enterprise software and enterprise data. Currently responsible for all product management aspects (technology, GTM, Enablement etc.) of Oracle BDA and BDCS.

    Nick Collins, Principal Applications Systems Analyst at Accenture. Nicholas Collins is a Principal Applications Systems Analyst at MD Anderson Cancer Center, where he serves as the chair over architecture for the Department of Clinical Analytics and Informatics. He has worked with Oracle technologies for over ten years and is a Master Level CDMP.
  • How to Prevent Data Walking Out the Front Door
    How to Prevent Data Walking Out the Front Door Nancy Patton, Esq. (Sr. Solutions Consultant Exterro), Dave Packer (VP, Product & Alliances Marketing, Druva) Recorded: Jul 19 2017 64 mins
    With all the news surrounding data breaches and information leaks, it’s often forgotten that the number one way sensitive/confidential information illegally enters the public domain is when employees leave their organization.

    In this webcast, learn about how technology can help prevent data from walking out your front door and proactively safeguard employee data required for e‑discovery/compliance.

    Register for this webcast and learn how:

    - Data archiving software can automatically lock down and ensure data is not removed from the org
    - E-Discovery technology can automatically track employee movements and notify legal teams when key custodians leave the org
    - Leading organizations are leveraging these types of technology to be more efficient and strengthen data protection efforts
  • 5 Best Practices for Governing Your Content in the Cloud
    5 Best Practices for Governing Your Content in the Cloud Paul Falor, CIO & VP of Strategic Alliances, North Highland Company & Josh Rosenberg, Sr. PMM, Information Governance, Box Recorded: Jul 19 2017 46 mins
    The way we work as an organization is no longer changing.  It has already changed.  People access content from all kinds of devices, across different locations.  Business content is being created and viewed both inside and outside of your organization.  But how do you effectively protect the way it's shared and managed while meeting your compliance needs?  Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats. 
     
    Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.  
     
    Learn about:
    ·  Key considerations for a cloud-first data governance strategy
    ·  Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
    ·  How to use SaaS technology to empower your users while effectively governing their content
  • Intelligente Endpunktsicherheit: mehr als nur Vorbeugung
    Intelligente Endpunktsicherheit: mehr als nur Vorbeugung Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye Recorded: Jul 19 2017 32 mins
    Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
    Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
    Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
    Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?

    Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.

    Die Themen:
    - Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
    - Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
    - Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
    - Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
    •Mehrere Engines für die Bedrohungserkennung und -abwehr
    •Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
    •Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
  • State of encrypted traffic – there’s a gap in your cyber-defense
    State of encrypted traffic – there’s a gap in your cyber-defense Ken Dang Recorded: Jul 18 2017 52 mins
    Hackers have expanded their craft to use SSL traffic as a means to obfuscate their attacks and rasomware download. Using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, attackers now cipher malicious payloads and command and control communication to evade your cyber defense.

    Attend this live webcast to:
    •Have an understanding of how adversaries are using encryption against us.
    •Be aware of the common attacks that leverage SSL/TLS traffic to evade detection
    •Be prepare for the key challenges when inspecting SSL Traffic
  • Cloud Leak: How a Verizon Partner Exposed Millions of Customer Accounts
    Cloud Leak: How a Verizon Partner Exposed Millions of Customer Accounts Dan O'Sullivan, UpGuard Analyst Recorded: Jul 18 2017 32 mins
    A misconfigured cloud-based file repository exposed names, addresses, account details, and account personal identification numbers (PINs) of as many as 14 million US customers of telecommunications carrier Verizon. UpGuard’s Cyber Risk team discovered this critical data repository was not exposed by the enterprise holding primary responsibility for the information, but by a third-party vendor to the enterprise.

    Beyond the sensitive details of customer names, addresses, and phone numbers—all of use to scammers and direct marketers—the prospect of such information being used in combination with internal Verizon account PINs to take over customer accounts is hardly implausible. Dan O’Sullivan, the analyst who first broke the story, will go through the details of the discovery and the significant impact of this cloud leak.


    For the original article: https://www.upguard.com/breaches/verizon-cloud-leak
  • Ready for the cloud? Prepare your network.
    Ready for the cloud? Prepare your network. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jul 13 2017 52 mins
    Is your network secure? Cloud-ready? As fast as it can be? Before you push “the next big thing” as part of your digital transformation, make sure you have a strong network foundation. Learn more in this webinar.
  • Where is the All-Flash Data Center?
    Where is the All-Flash Data Center? Storage Switzerland, Tegile Systems Recorded: Jul 13 2017 52 mins
    Find it With Multi-tiered Flash!
    The all-flash data center was to solve all our problems. We’ve had all-flash arrays for ½ a decade. Where are the all-flash data centers? The problem is that performance and cost have been opposing forces in data storage systems for decades, especially in the initial all-flash era. Recent advancements in flash technology are finally breaking this tension and are enabling a new class of applications while driving costs down dramatically.
  • The Evolution of DCIM: Remote, Data-driven and Cloudy
    The Evolution of DCIM: Remote, Data-driven and Cloudy Rhonda Ascierto, Research Director - Datacenter Technologies, 451 Research Recorded: Jul 13 2017 59 mins
    New cloud services for datacenter management are transforming traditional on-premises approaches. By applying Internet of Things technology, DCIM-based cloud services can deliver the benefits of DCIM without the deployment costs – and over time they promise value beyond what is possible on-premises.

    Key Topics Addressed in this Session:
    • How DCIM data is being exploited today
    • How big-data analytics and AI is adding to the power of DCIM
    • What data will remain on-prem and what will go to cloud
  • Data Security – Identifying Your Last Line of Defense
    Data Security – Identifying Your Last Line of Defense Jules Anderson – UK Regional Sales Manager, Thales e-Security Recorded: Jul 13 2017 54 mins
    Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.

    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.

    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    During this webinar we will cover:
    - Compliance with privacy and data security requirements (helping you comply with the critical Article 32 and 34 GDPR rules)

    - Cyber-security risk management and mitigation - using Thales encryption, an organisation can render private data unintelligible to a cyber-intruder (external or internal) even in the event of a breach

    - Enabling organisations to securely drive digital transformation such as BYOD, Cloud Migration, IoT, Blockchain

    - Giving organisations capability to keep control and visibility on their data and encryption keys while moving to the cloud

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • Integrating Threat Isolation with SWG and SMG (1:00pm SGT)
    Integrating Threat Isolation with SWG and SMG (1:00pm SGT) Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass Recorded: Jul 13 2017 32 mins
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Peacefully Protected: Stopping Cyber Breaches with Defense-in-depth
    Peacefully Protected: Stopping Cyber Breaches with Defense-in-depth Larry Walsh, CEO and Chief Analyst at 2112 Group Recorded: Jul 12 2017 55 mins
    WannaCry may be behind us, but you still have to be mindful of new ransomware threats just over the horizon. That means taking steps today to ensure your data is protected from devastating disruptions tomorrow.

    This webinar will feature defense-in-depth strategies that can help keep your business safe from cyber breaches. You’ll also learn why cloud-based backup services are a central presence in any strong cybercrime defense plan.

    Join us, and find peace in a multilayered approach to data defense.

    About the presenter:

    Larry Walsh is one of the most recognizable figures in the IT channel and security communities, and is considered one of the more forward-thinking leaders in the industry. A seasoned journalist, analyst, author, and industry commentator, Walsh is also the founder of Channelnomics, which is a leading provider of IT channel news and analysis. A specialist in the development and execution of channel programs, disruptive sales models, and growth strategies for companies of all sizes, from start-ups to Fortune 500 organizations, Walsh has worked with a roster of diverse technology players, including Ingram Micro, Intel Security, SAP, and Verizon.
  • A Head-to-Head Comparison of the Top-rated Products in HCI & SDS
    A Head-to-Head Comparison of the Top-rated Products in HCI & SDS DataCore Software: Alfons Michels - Senior Product Marketing Manager, Sushant Rao - Senior Director, Product Marketing Recorded: Jul 12 2017 54 mins
    When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.

    But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.

    Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization called WhatMatrix. In this webinar, we will cover the:
    - Criteria to evaluate these products
    - Pros and cons of different vendors’ products
  • Time for Banks to Reassess Their Risk of DDoS Attacks
    Time for Banks to Reassess Their Risk of DDoS Attacks Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks Jul 27 2017 4:00 pm UTC 45 mins
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 27 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • NIST 800-171 Protect CUI or Risk Losing Federal Business
    NIST 800-171 Protect CUI or Risk Losing Federal Business Charles Russell Jul 31 2017 5:00 pm UTC 60 mins
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Tara Callan, Marketing Manager, DataCore Software Aug 1 2017 6:00 pm UTC 60 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Combating Data Breaches: Proactive Defence during a Digital Transformation
    Combating Data Breaches: Proactive Defence during a Digital Transformation Ian Greenwood, Regional Sales Manager and Mark Penny, PKI Security Consultant, Professional Services EMEA, Thales e-Security Aug 2 2017 11:30 am UTC 60 mins
    Combating Data Breaches: Proactive Defence during a Digital Transformation
    Join Herjavec Group and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.
    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.
    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    Topics covered during the webinar:

     Complex and sophisticated data threat landscape

     GDPR at a glance

     Digital transformation ambitions and challenges

     Why adopt a data encryption strategy?

     Focus on how encryption and key management solutions can help you comply, secure and keep control of your data

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Technical Deep Dive: Modernizing Your Next-Gen IT Operations
    Technical Deep Dive: Modernizing Your Next-Gen IT Operations Grant Fenn, CEO, Downer Group & Matt Furse & Fai Lai, Digital Experts, Microsoft Aug 2 2017 11:00 pm UTC 39 mins
    Gain industry insights on harnessing Digital Transformation to drive the next generation of operational capabilities.

    Implementing a digital transformation strategy that can encompass platforms, systems, integrations and needs across organizations is vital. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations, including how to build a cloud architecture to support data, analytics and digital transformation from end to end.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 3 2017 5:00 am UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Ransomware - Beyond the Basics
    Ransomware - Beyond the Basics Jess Stanford, Product Manager Cybereason & Tom Powers, Director Program Management, Carbonite Aug 8 2017 4:00 pm UTC 60 mins
    Join our Cybereason, Carbonite joint webinar to learn the current and future state of ransomware as well as tactics and technologies for advanced cyber threat detection and prevention.

    In this webinar you will learn:

    - Why ransomware is so pervasive and prevalent.
    - How you can futureproof your cyber threat prevention approach.

    About the presenters:

    Jessica Stanford, Director of Product Marketing at Cybereason, will be discussing the evolving methods cyber criminals are using along with advanced methods for detection.

    Tom Powers, Director of Product Management at Carbonite, will be looking at a real-world ransomware recovery scenario, examining lessons learned, and exposing vulnerabilities in the strategies and backup/recovery technologies used.
  • Orchestrating Effective IT Risk Management Across the Lines of Defense
    Orchestrating Effective IT Risk Management Across the Lines of Defense Kelley Vick, IT GRC Forum; Cameron Jackson, Riskonnect Aug 8 2017 8:00 pm UTC 60 mins
    Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.

    Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.
  • The Unique Challenges of Disaster Recovery in a Hybrid IT World
    The Unique Challenges of Disaster Recovery in a Hybrid IT World Harry Smith, Zerto Technology Evangelist; Dale Levesque, TierPoint Manager of Product Development Aug 9 2017 6:00 pm UTC 60 mins
    Business disruptions and downtime can cause serious damage to a company's bottom line. And today, with multiple potential sources of disruption — from equipment failure to natural disasters and cyber-attacks — IT leaders are seeking even faster and more resilient disaster recovery (DR) strategies. Identifying risks and developing a DR plan are essential, but just as important is selecting the right vendor for your Disaster Recovery needs, which can be challenging.

    In this live webinar, TierPoint Manager of Product Development, Dale Levesque and Zerto Technology Evangelist, Harry Smith will discuss the keys to effective DR planning and address the added challenges presented by increasingly complex hybrid IT environments.

    Join Dale and Harry as they share use cases and answer key questions about creating an effective DR plan and selecting the best provider for your needs, including:

    • What are the major causes of downtime?
    • How has DR evolved from backup computer centers to cloud computing and advanced data replication technologies?
    • What are the latest DRaaS trends?
    • What are the key considerations when selecting a DR solutions provider?
  • How to Build Better Cloud Applications Using PaaS
    How to Build Better Cloud Applications Using PaaS Thomas Decant, Product Marketing Manager, Cloud & Enterprise, Anirudh Singh Rautela, Azure Cloud AppDev Specialist Aug 9 2017 11:00 pm UTC 30 mins
    With today's digital demands, its more important than ever to deliver apps at lightning speed. Azure app hosting allows you to create powerful cloud applications for web and mobile on any platform, for any device.

    Join Thomas Decant, Product Marketing Manager in the Cloud and Enterprise team at Microsoft, and Anirudh Singh Rautela, Cloud Application Development Specialist at Microsoft, in this two-part webinar. They will take us through the possibilities and benefits that Azure App Service provides your business and showcase how easy it can be to implement PaaS services.
  • Security Orchestration In Action: Integrate – Automate –Manage
    Security Orchestration In Action: Integrate – Automate –Manage Silvio Pappalardo & Alex Ruhl, FireEye Aug 10 2017 1:30 pm UTC 60 mins
    Simplify & Accelerate Security Operations through integration and automation

    Join us to hear how Security Orchestration from FireEye can:

    UNIFY SECURITY TOOLS
    Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
    Save time and resources & Improve your overall ROI

    ENHANCE SECURITY TEAM CAPABILITY
    Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
    Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.

    INCREASE EFFICIENCY AND PERFORMANCE
    Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
    Minimise error prone manual processes while maintaining response and process consistency &
    Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.

    Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
  • Are Your Third Party Vendors Creating Uninvited Cyber Risk?
    Are Your Third Party Vendors Creating Uninvited Cyber Risk? Greg Pollock, VP of Product at UpGuard Aug 10 2017 5:00 pm UTC 45 mins
    Many of the largest and most well known breaches are cases of third party information exposure.

    One of the largest leaks of all time was discovered when an RNC vendor, Data Root Analytics, exposed 198 million voter records, including personal details, voter information, and predictively modeled attributes such as race and religion.

    Outsourced information work is crucial for organizations to scale and remain competitive, but it should be done with careful forethought to the risks the company faces should that information be compromised.

    In this webinar you will learn:

    - Why cybersecurity is dead
    - How to mitigate cyber risk in a cost effective way
    - How vendor risk becomes your risk
    - Steps to become cyber resilient
    - How to measure success on your path towards cyber resilience
  • Software-Defined Everything at the Elastic Edge
    Software-Defined Everything at the Elastic Edge Tyler Peterson and Matt Thueson, NetCloud Product Specialists at Cradlepoint Aug 16 2017 4:00 pm UTC 45 mins
    From SD-WAN at branches and quick-serve restaurants to SD-Perimeter (SD-P) for the Internet of Things and remote employees, networks today need constant connectivity, mobility, cloud services and software-defined everything. The Elastic Edge of the network requires a secure, next-generation WAN that expands, contracts, and evolves at a moment’s notice.

    Join Tyler Peterson and Matt Thueson of Cradlepoint for a live webinar on Aug. 16, 2017, to discuss use cases and success stories for SD-WAN, SD-P, and always-available LTE connectivity.

    Attendees will learn about:

    + The characteristics of the Elastic Edge
    + Simpler, more efficient networking at the branch level
    + Virtual Cloud Networks and dark cloud security for IoT
    + Real-word SD-WAN and SD-P success stories
  • Taming the Big Database Beast
    Taming the Big Database Beast Henry Baltazar, Research Director at 451 Research. Chandra Reddy, Vp of Marketing at Actifio Aug 16 2017 5:00 pm UTC 60 mins
    Learn how to instantly clone and recover very large databases in the data center or in the cloud.

    The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
  • Understanding your Big Data: From the Warehouse to the Cloud & Back Again
    Understanding your Big Data: From the Warehouse to the Cloud & Back Again Just Analytics, Andrea Gagliardi La Gala, Solution Architect & Darmadi Komo, Product Marketing Manager, Microsoft Aug 16 2017 11:00 pm UTC 64 mins
    Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.

    In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.

    Learn how to:
    - Use Azure public cloud for big data
    - Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
    - Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
  • Trust Starts From Within
    Trust Starts From Within Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead Risk Advisory, Deloitte Aug 17 2017 1:00 am UTC 60 mins
    With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.

    These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.

    Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.

    Join this webinar to learn about:

    - New challenges introduced by the Australian mandatory data breach notification law
    - Key steps in the journey towards data privacy compliance
    - How to monitor insider threats
    - How to leverage these regulations to gain trust and ensure great customer experiences

    We look forward to your participation in this free webinar.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Aug 17 2017 10:00 am UTC 60 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software
    Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software Storage Switzerland, Maxta Aug 17 2017 5:00 pm UTC 60 mins
    In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.

    Attendees will learn how each deployment model overcomes these challenge:

    1. Ease of initial evaluation and testing
    2. How to transition to hyperconvergence while having current servers
    3. How to avoid hypervisor lock-in
    4. How to build a future proof hyperconverged architecture
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Aug 17 2017 6:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:
    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Ransomware attacks continue... do you have a backup plan?
    Ransomware attacks continue... do you have a backup plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Aug 22 2017 5:30 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Using Reference Architectures to Fully Integrate Your Next-Gen Apps
    Using Reference Architectures to Fully Integrate Your Next-Gen Apps Pradeep Menon, Data Solution Architect & Karthik Rajasekharan, Azure Product Marketing Director Aug 23 2017 11:00 pm UTC 39 mins
    Intelligent application technology allows you to build apps with powerful algorithms, across platforms, with just a few lines of code. The answer lies in your application's architecture.

    Join Pradeep Menon, Microsoft Data Solution Architect, and Karthik Rajasekharan, Microsoft Azure Product Marketing Director to learn:

    - The different reference architectures and how to integrate these services into your applications immediately.
    - A hands-on approach to implementing Cognitive Services on Azure
    - About the next generation of application development and deployment