The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.
What You Will Learn:
1. you can achieve a deeper level of security by being aware what is happening on your network.
2. be aware of how you access the games, use secure connections
3. Keeping your applications and firewall up to date can help you keep secure.
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
IBM InfoSphere Information Server is a market-leading data integration and governance platform. It provides a set of capabilities to build confidence in your data by helping you understand, cleanse, transform and deliver trusted information to critical business initiatives, such as big data, master data management and point-of-impact analytics. Information Server provides comprehensive connectivity to DB2 (including DPF and BLU Acceleration) and it can also push computation to DB2 when appropriate. By using Information Server with DB2, you get its best-of-breed capabilities to integrate DB2 data and manage its metadata as well.
Join us for this DB2 Tech Talk to learn how using these products together can help you deliver trusted information to your business, support big data initiatives, and more.
This 30-minute webinar will discuss how the Sayers Cloud can be an off-premise extension of your existing IT infrastructure. Now in its second year, Sayers Cloud has proven success in helping our customers scale IT services flexibly and cost-effectively, whether for production compute, test/dev or disaster recovery needs.
One of the seemingly endless tasks of today’s IT professional is finding more ways to squeeze costs out of the data center environment. With data growth soaring across all industries, it is not surprising that storage is often at the top of the list for shedding costs. Join Storage Switzerland senior analysts, Eric Slack and Colm Keegan for a webinar on February 26th which details how organizations can reign in their data center storage expenditures while meeting business data retention objectives.
In today’s post-breach world, organizations need technology aligned with new strategies to accelerate and automate incident response and breach investigation workflows to reduce mean time to resolution. In this webcast, we will demonstrate the need for on-demand access to endpoint for the purposes of understanding what happened after the attackers got in, and what — if anything — was taken as a result.
You will learn how together, McAfee and Guidance Software help:
•Reduce time to deploy incident response capabilities
•Streamline the response and investigation process
•Ensure a complete understanding of breach impact
•Manage digital investigations on assets managed by McAfee ePO
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
45% of data breaches reported in 2013 were from the medical and healthcare sector. ESET researcher Lysa Myers looks at information security in the healthcare industry and how we can do better when it comes to protecting the privacy of patient data.
Instant recovery of critical applications is an imperative in a healthcare setting, and is required as part of HIPAA and Joint Commission standards. Join this 15 minute webinar and learn how Quorum can help you improve patient outcomes through an "always on" IT environment.
SAVE TIME, SAVE DOWNTIME. REWIND THE NETWORK. FIND THE ISSUE. FIX IT.
By integrating Splunk ‘s advanced monitoring and alerting and Emulex’s Endace network recording and visualisation solutions at an ‘event’ level, you can complete the detection and investigation cycle quickly. This identifies the root cause of network security and operational issues and contains network security and operations issues more effectively while reducing the impact on users, detect false positives more quickly and better ‘tunes’ detection systems.
In this webinar, you will:
•Understand how packet capture and analysis provides evidence and actionable insight that help you make effective interventions
•Learn how to integrate Splunk and Endace, simplify operations and reduce the time taken to find “packets of interest” by more than 50 percent*
•Hear how finance software company IRESS deployed tighten network monitoring, while also reducing associated operationa expenditures (OPEX)
•Connect with our experts using our interactive Q&A tool
Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:
• Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
• Protect your sensitive files in any format and in any device, including iOS and Android
• Share protected information with anyone, inside and outside your own organization
You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
Disk Backup Appliances have traditionally featured deduplication as the primary selling point. While efficiently storing protected data is critical, the ability to scale your systems to meet rampant data growth – while maintaining backup windows and meeting recovery objectives – separates the innovators from the traditional appliances. Add virtual, and the demands become even greater.
In this webinar, George Crump, Lead Analyst at Storage Switzerland, and Kevin Russell,_VP Systems Engineering of ExaGrid, will lead an interactive discussion about the four changes disk backup appliances need to make to:
- Support the demands of growing virtual server environments
- Meet server backup windows
- Achieve recovery objectives
- Handle ongoing data growth
All pre-registrants will receive an advanced copy of Storage Switzerland’s latest white paper, “Disk Backup Is About More Than Deduplication".
Register for the live event and receive your copy of the report today! By registering, you will not only get the report but you will also have access to over 80 on-demand Storage Swiss webinars without having to re-register ever again.
Workloads continue to increase in data centers, be they virtual or physical. The network infrastructure must respond to these operational demands with ever greater agility. Cisco DFA or Dynamic Fabric Automation is an evolution of the Cisco Data Center and Cloud Networking which enables customers to gain efficiency and increase service velocity. Cisco DFA simplifies fabric management, optimizes the infrastructure, and automates network provisioning with the Cisco Nexus 2000, 5000, 6000, and 7000 Series Switches
With DFA, customers gain unsurpassed operational simplicity thorough superior integration and can scale well beyond 4,000 VLANs and tenants. This session will help you understand how Cisco DFA technology can be deployed incrementally in the evolving data center. Customer use cases will show real-world benefits. A demonstration included will illustrate some of the DFA capabilities in more detail.
Storage in the data center has evolved from islands of server attached storage to shared networked storage. But in both cases storage needed to be specifically designed for the workload it was on. This has lead to storage hardware sprawl.
In this webinar will be an interactive discussion on what hardware sprawl is and how you can stop it.
1. What is causing hardware sprawl?
2. What is the risk of silo'd storage systems?
3. How storage systems need to evolve in order to stop Hardware Sprawl.
Cisco introduces VMDC DCI solution which provides validated design to ensure high availability and performance for applications across Metro and Geo data centers. This solution unlocks Business continuity and stateful workload mobility which is top of mind for both public and private cloud providers to connect multiple data centers to support Business Critical operations.
Join Alex McDonald, SNIA Cloud Storage Initiative Chair and a member of the office of the CTO of NetApp and discover how you can effectively deliver Cloud Architectures within your, or any, infrastructure.
Today’s Service Providers have unique technology business needs.
The technology in your data center can position you to address these needs and help you stay nimble and competitive.
Join us on March 12, to hear from today’s leading technology providers who understand the unique needs of an MSP. Hear from a speaker panel of experts who understand the MSP space and how technology can help you stay relevant and a step ahead of the competition.
Experts from global IT companies IBM and Insight will talk about:
· How technology can help MSP’s compete, grow and differentiate
· The resources, programs and sourcing options to make leading technology more accessible
· The latest technology solutions that address the unique IT needs of Managed Service Providers
Internal auditors play a vital role in their organisation’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organisation.
Join Protiviti's Mark Harrison & Adam Christou, as they help internal audit professionals identify hot topics & emerging trends in 2014 to better execute the department’s strategic focus on risk throughout the year.
To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.
McAfee DLP leverages TITUS Classification metadata to set active DLP policy and improve policy inforcement. Join TITUS and McAfee for a discussion about:
•Why it is crucial to include users as the first line of defense
•How DLP, NDLP, and ESM leverage TITUS
•And the role of TITUS Classification in the DLP architecture
Why You Should Attend:
• See how vulnerability reporting is presented for the interests of compliance, IT, and CEO.
• Understand new assessment precision and remediation prioritization tools.
• Learn how key vulnerability management solution providers are expanding vulnerability assessments to include more than just network endpoints.
Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
Is your organisation over or under spending on ICT Service Continuity (traditionally IT disaster recovery) solutions? Does your IT function know what the actual business requirements for recovery are? The implementation of an ICT Service Continuity Management framework within the organisation can help you understand the business requirements for recovery better, and in turn ensure that your ICT Service Continuity strategy is tailored made to your organisation’s needs. Join us for this webinar to gain insights into the ISO27031 standard for ICT Service Continuity Management, how it aligns with BCM standards and good practice guidelines, and how your organisation can benefit financially from good corporate governance for a traditionally technical discipline.
Case studies: Alastair will be presenting the first part of this webinar, with the focus on the subject of supply chain resilience. A well-known incident and the response of two similar companies and their differing strategies.
Secondly James Halpin will present a specific example of BC resilience, with regards to an existing client of PlanB and how their BC programme has mitigated the potential risk of financial impact, during in a recent incident.
During Business Continuity Awareness Week, the BCI will be publishing a report that ties in with the theme of the week - 'counting the cost'. The report focuses on the cost of common threats to an organisation: IT and telecommunications outage, data breach and cyber attacks, and adverse weather conditions. As a meta-analysis of available literature, it draws upon various reports and cost estimates. In a time where cutting budgets is the norm, and BC-related expenses are often one of the first to go, it is important to be reminded of the cost of being caught flat-footed in an incident. The false economy created by cutting down on business continuity may create bigger problems that may impact on organisational resilience and viability. This webinar is a presentation of the findings of the report by its author - Patrick Alcantara.
In today’s interconnected world, communication, whether it is electronic, verbal or written, has the power to create opportunities for an organisation or to be a serious threat and cause unrecoverable harm.
This impact is heightened in a crisis and your organisation needs to proactively prepare for these events and have a well-oiled approach and plan. In this webinar we will look at local and international examples of communications (good and bad) and the affect it has on the organisations share price and then we will offer some tips on steps you can take to be fully prepared to get your message out successfully.
This webcast discusses how IT transformation forces data protection practices to evolve and how IT and storage managers can modernize their backup infrastructure to provide better data protection services and drive operational efficiency in backup.
The benefits of attending this webcast are:
- Understand the transformation in IT and how it forces change upon backup infrastructures and processes
- Current data protection challenges and how they can be overcome
- Actionable advice on how to modernize the backup infrastructure and what benefits can be expected
This webcast is relevant for storage managers, backup managers and general IT managers with responsibility for storage and backup