The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
They seem to solve the same problem – meeting the constantly growing performance and capacity demands of the enterprise. But Scale-out NAS and Distributed Storage are different. Join our next LIVE podcast to learn what Scale-out NAS and Distributed Storage are, how they are different and which one is right for you. Attendees to the live podcast will be able to ask questions and get answers in real-time. NO REGISTRATION REQUIRED!
Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.
Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.
Join this webcast to learn how to:
- Implement disaster recovery for all your major IT systems
- Unify data management, security, and protection
- Provide protection for your data and applications, no matter where they reside
- Extend on-premises backups storage and data archiving solutions to the cloud
How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?
As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.
Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
Join us for our next live podcast. We will provide analysis on the latest news like:
* Carbonite buying DoubleTake
* Violin Memory being bought at auction
* StorageCraft buying Exablox
* Datto buying OpenMesh
Will also review our recent briefings including:
In this episode’s deep dive our analyst team will discuss the pros and cons of Amazon and Google cloud storage. NO REGISTRATION REQUIRED!
In retail, the rapid adoption of omnichannel services, automation, digitization, IoT and mobile devices, and cloud-based applications has rendered Internet and downtime unacceptable. From helping customers to handling back-office duties, retail staff need 24/7 connectivity to do their jobs effectively.
Retail IT professionals need flexibility and numerous options for providing Internet failover, router redundancy, and business continuity in a variety of locations and circumstances.
At 9 a.m. PT / 12 p.m. ET on Feb. 15, 2017, join Cradlepoint’s Landon Reese to explore the best options for failover in retail, as enterprises look to improve the customer experience and save time, money, and man-hours.
For many enterprises 2017 will be the year they start automating security changes for increased agility across their hybrid network.
Tufin is ready to provide policy-based automation across legacy and next generation networks, physical FWs and cloud platforms.
Join us to learn about the enhancements in Tufin Orchestration Suite R16-4:
•Policy-based automation for Check Point R80
•End-to-end automation for rule and server decommissioning
•Built-in enforcement of cloud tag policy
and much more.
Caringo Product Manager Glen Olsen takes an in-depth look at how FileFly 2.0 supports Microsoft Distributed File System Replication and how you can protect your organization’s data with limitless tiering.
Is your data warehouse meeting your customers needs?
Your business users are demanding analytics over unstructured data, and to fully realize the value of data, you need a complete platform that can manage both structured and unstructured data with security, consistency, and credibility.
Is your data warehouse up to the task? When does it make sense to augment your data warehouse or completely migrate to an alternative?
Data warehouse and big data solutions from Microsoft provide a trusted infrastructure that can handle all types of data, and scale from terabytes to petabytes, with real-time performance.
Join this webcast to:
- Learn about the process, tools, and reference architectures for data warehouse migration
- Understand when it's time to augment your data warehouse or migrate to an alternative
- Get to know the benefits of migrating off of insufficient solutions with a specific use case from Hortonworks
In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.
But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, whether on-premises or to the cloud, they are building systems that look an awful lot like ETL.
Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
Learn about the first signature-less engine to be integrated into VirusTotal
CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addition of CrowdStrike’s advanced machine learning engine to this anti-malware industry staple is a major leap forward for users who rely on VirusTotal capabilities to help defend their endpoints.
In this live CrowdCast, CrowdStrike’s Chief Scientist Dr. Sven Krasser offers an exclusive look “under the hood” of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe.
Topics will include:
•What CrowdStrike Falcon machine learning is and how it works
•How to interpret results of machine learning-based threat detection
•How users can benefit from the CrowdStrike Falcon machine learning engine
•How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform
Dr. Sven Krasser
Chief Scientist, CrowdStrike
Dr. Sven Krasser is a recognized authority on network and host security. He currently serves as Chief Scientist for CrowdStrike, where he oversees the development of endhost and cloud-based Big Data technologies. Previously, Dr. Krasser was at McAfee where he led the data analysis and classification efforts for TrustedSource. He is the lead inventor of numerous key patented and patent-pending network and host security technologies and is the author of numerous publications on networking and security technologies.
Disaster Recovery as a Service (DRaaS) is a recovery option that is getting a lot of attention right now. In this live podcast, Storage Switzerland and Carbonite cover exactly what DRaaS is and whether or not your organization should consider it? Join us as we cover all things DRaaS. We’ll even answer all your DRaaS related questions.
Dell EMC’s Data Domain deduplication engine is data agnostic. This means the engine will attempt to find duplicate segments in the backup stream and deduplicate it by referencing the existing segment already on the Data Domain. Normally, if the data has not changed, the backup stream should be theoretically identical. In this webcast, we discover how RMAN modifies the Oracle database backup stream making it difficult to deduplicate and how an mtree option enables the deduplication engine via a more sophisticated algorithm to handle the modifications made by RMAN.
Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.
Join our webinar to learn:
- What these changes are
- How these changes can impact managing your environment, especially for patch management
- How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
Join us and our strategic partner Verizon, for an on-demand webinar discussing our Managed SD WAN solution. This session will explain how Managed SD WAN can help increase bandwidth, agility and reliability while maintaining security through real life use cases and in-field deployment scenarios in the Retail & Finance sectors.
Do you have one or two Windows file servers filling up too quickly? Would you like to store near unlimited data and improve performance while avoiding expensive additions or upgrades? Tune in to hear Glen Olsen, Caringo Product Manager, explain how you can accomplish this feat with FileFly for Swarm—a complete, automated file lifecycle management for limitless tiering of storage. In addition, Glen will discuss the powerful tiering data protection enhancements in FileFly 2.0.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
On Tuesday, February 7, 2017 at 10:30am PT/1:30 pm ET, join us for this special webinar, hosted by Polly Mitchell-Guthrie, SAS, and Laura Ladrie, North Carolina State University, to learn how the aCAP can help distinguish your analytics program.
The majority of internal and external cyber-attacks begin with exploiting vulnerabilities in the network and targeted applications. Over 99% of actual attacks exploit known vulnerabilities listed as known Common Vulnerabilities and Exposures (CVEs). The traditional defence is to probe the system using manual or automatic vulnerability scanning techniques; but this produces a lot of redundant and irrelevant information that does not shed any light as to whether a hacker can use the vulnerability to reach a critical asset. The only solution today is human penetration testing, but infrequent testing does not reflect the network's dynamic nature, especially in today's virtual and cloud based environments.
A fresh approach to support manual penetration testing and enhance cyber resilience is to continuously and automatically test the network, applications and databases by using penetration testing techniques to expose vulnerabilities, establish complex attack path scenarios in real time and provide security and business insights to act on.
This presentation will look at the technology and role of machine-based penetration testing.
Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers. At the end of this discussion, the Mandiant practice will open up for Q&A on the topic.
A medida que evoluciona la virtualización, una nueva generación de nubes privadas se vislumbra en el horizonte. Probablemente se plantea usted mismo reducir costes derivados de la nube mediante el aprovechamiento de la tecnología Open Source, para proporcionar un entorno web escalable y desarrollar una nueva generación de aplicaciones.
Conozca en este webinar de la mano de Cesar Funes, Technical Partner Enablement Manager South Region, cómo asegurarse de que cuenta con una estrategia efectiva de protección y recuperación de servicios desplegados sobre instancias de OpenStack, y de las tecnologías que le permiten afrontar la construcción de su nube privada sin perder seguridad, granularidad y control sobre las copias de sus datos.
VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.
In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.
Some report highlights:
•Ransomware changes in 2016 and the effects on malicious email and exploit kits
•The growth and challenges of SSL
•How Internet of Things devices were exploited and different security steps some organizations are taking in response
•Developments in Android security
•Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.
- Josh Downs, Community Manager - Information Security, BrightTALK (moderator)
The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.
Join this webcast to learn more about the two major new security features that launched with the Anniversary update:
- Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
- Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
Machine learning is both cool and valuable, but to apply it effectively requires that we disregard the former in order to be rigorous about the latter. In this session we take a hard look at the qualities that make machine learning fit for purpose for problems in cyber security in order to lay out a global roadmap for how machine learning can solve security problems today. Even more importantly, our bottom-up analysis of machine learning will chart the areas where an excessive faith in automation can become harmful to a business' security posture.
About the presenter:
Greg has previously managed products and product teams for gaming and education startups with a focus on meaningful, measurable engagement loops. His games have been ranked in the top ten by traffic on Facebook, the top ten by revenue on the App Store, and as the Editor's Choice in the App Stores of over 70 countries.
The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.
So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.
We will explain how Symantec technology addresses this approach and how you will benefit from:
•Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
•Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
•Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.
In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
The Internet of Things (IoT) starts with your things—the things that matter most to your business. IoT is about making your data come together in new ways. Tap into how data works for your business with IoT dashboards. Uncover actionable intelligence and modernize how you do business. See how IoT is revolutionizing businesses with field service organizations and driving business and digital transformation.
Join this webcast to:
- Learn why your business needs an IoT strategy
- Understand how to connect and scale your IoT with efficiency
- Analyze and act on untapped data
- Integrate IoT with your business processes
- Drive efficiency and scale in field services using IoT
Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.
La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.
Acompáñenos en este webinar, donde analizaremos:
- Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
- Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
- Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
A View of the Northern Virginia Datacenter Market with 451 Research and Iron Mountain
The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.
Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.
However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.
But, is HCI right for you? What use cases make sense for HCI?
Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:
- Use cases suitable for HCI
- Criteria to evaluate HCI products
- Pros and cons of different vendors’ HCI
- Avoiding the missteps of early adopters
With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.
Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
There’s no way around it: Setting up and maintaining traditional VPNs for remote access requires extensive time, energy and resources. Configuring, managing, and troubleshooting devices and applications located at the data center in headquarters and in each end device is one of the most complex and laborious aspects of network administration — especially with increased workforce mobility and IoT.
With a next-generation Virtual Cloud Network (VCN), configuration, management, and security policies are streamlined and handled in the cloud. This enables rapid deployment, reduces operational expenses and completely integrates with your existing infrastructure.
At 9am PT / 12pm ET on March 1 2017, join Cradlepoint’s Bryan Embrey to explore how resilient, redundant, secure, and scalable VCNs leverage software-defined networking (SDN) and network function virtualization technologies to reduce complexity, hardware, and IT man-hours.