The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Oliver Lomer, Senior Marketing Manager - Sungard ASRecorded: May 24 201917 mins
When people think of disasters that disrupt business operations they often think of the extreme – major weather incidents, cyber-attacks or terrorist incidents for example – but are these really the main causes of disruption? Should businesses be focused on other threats to their operations? In this webinar Oliver Lomer dives into Sungard AS’ invocation statistics from 2018 to uncover the truth of the Disaster Landscape.
Arno Edelmann and Nathan HoweRecorded: May 24 201946 mins
Die Herausforderung der netzwerkzentrierten Sicherheit
30 Jahre lang haben Unternehmen auf netzwerkzentrierte Methoden gesetzt, um User mit dem Netzwerk und den Anwendungen darauf zu verbinden. Doch die Arbeitsweise der User hat sich gewandelt; mit dem Verlagern von Apps in die Cloud wurde das Netzwerk auf das Internet ausgeweitet. Dies macht netzwerkzentrierte Lösungen wie Remote-Access-VPN überflüssig.
Wir zeigen eine Möglichkeit, den Übergang zu User- und App-zentrierter Sicherheit mithilfe von Zscaler Private Access (ZPA) zu schaffen.
Marc Mombourquette and Michael Carcerano, Dell EMCRecorded: May 23 201950 mins
Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400
Existing data protection solutions targeted at the mid-size orgs sacrifice comprehensive coverage, efficiency, and support in the name of simplicity. The IDPA DP4400, including the new 8-24TB option, delivers a converged data protection solution that is the perfect mix of simplicity and power for SMB organizations and remote office/branch office (ROBO) environments. In addition, it offers the lowest cost-to-protect and is guaranteed under the Future-Proof Loyalty program.
In this webinar, you’ll learn how Dell EMC’s IDPA DP4400 is not only receiving plaudits from industry experts, but also winning the trust of new and existing customers. According to IDC, both IDPA revenue and unit shipments have grown by more than 10x from 2017 to 2018 with an annual run rate exceeding $100 million in just six quarters in the market.
The IDPA DP4400 is a turnkey data protection appliance tailor-made for mid-size organizations. It offers complete backup, deduplication, replication, recovery, search & analytics, system management—plus, cloud readiness with disaster recovery and long-term retention to the cloud—all in a convenient 2U appliance.
Come learn how your organization can benefit from all that IDPA DP4400 has to offer.
Marc Mombourquette - Product Marketing, Dell EMC
Michael Carcerano – Product Management, Dell EMC
Andy Hardy, VP of EMEA at Nasuni | Anne Blanchard, Sr. Dir of Product Marketing at NasuniRecorded: May 23 201918 mins
In this video webinar, we take a look at the 5 reasons why large enterprises need a multi-cloud file infrastructure. GDPR, data sovereignty, regional cloud strategies, and the need for global productivity are driving enterprises to think more broadly about where and how they store and share files. With these changing requirements, taking a multi-cloud approach to file storage is becoming an integral part of an organization's cloud-first initiative.
Tune in and learn:
- Why file solutions offered by object storage vendors are not meeting the challenge
- How GDPR is impacting the requirement for multi-cloud
- How moving to a multi-cloud solution can increase overall productivity
John Noakes and James WilsonRecorded: May 23 201919 mins
Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.
This webinar shares best practice for operating, managing and securing virtual machines through the Azure platform.
Please visit uk.insight.com/azurewebinars to learn how Insight can help you optimise your Azure workloads or to speak to your Insight Account Manager today.
Piotr Łukasiewicz, System Engineer, CommvaultRecorded: May 23 201954 mins
W nowoczesnym przedsiębiorstwie pracownicy coraz szerzej wykorzystują możliwości, które daje praca zdalna z wykorzystaniem urządzeń mobilnych - nie tylko tych należących do pracodawcy. Dowiedz się, jak kompleksowo zabezpieczyć dane na wypadek awarii, kradzieży czy ataku ransomware - za pomocą jednego narzędzia - Commvault Data Platform.
Christian Giebner & Joachim Nossek, EMEA Sales EngineeringRecorded: May 23 201935 mins
Warum automatisieren? Warum jetzt? Automatisierung ist für die digitale Transformation von entscheidender Bedeutung, da sie für die Reduzierung der Angriffsfläche unerlässlich und für die Gewährleistung einer kontinuierlichen Compliance unabdingbar ist.
Besuchen Sie uns am Dienstag, den 21. Mai, für unseren Webcast "5 eindeutige Anzeichen für die Automatisierung von Netzwerksicherheitsvorgängen", um Folgendes zu erfahren:
- So beschleunigen Sie den Netzwerkänderungsprozess sicher
- Best Practices für den Einstieg in die Automatisierung
- Richtlinien zur Erreichung des Ziels der Zero-Touch-Automatisierung
Machen Sie es zu einem Ihrer Ziele für 2019, die Automatisierung zu übernehmen und den Zeit- und Arbeitsaufwand für manuelle Aufgaben rund um Firewall-Vorgänge zu reduzieren. Mithilfe der fünf eindeutigen Zeichen können Sie den Business Case erstellen und das Management-Buy-in für die Maximierung von Flexibilität und Sicherheit mit Tufin Security Policy Automation and Orchestration erzielen.
Kannst du die Live Session nicht machen? Registrieren Sie sich und die On-Demand-Aufzeichnung wird an Sie gesendet.
Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye MandiantRecorded: May 22 201960 mins
Many organizations struggle with how to prioritize hardening and protective security actions.
Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.
Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:
• Five technical categories to consider when implementing preventative security
• Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
• Common pitfalls in evidence destruction, investigation techniques and remediation timing
• Recommendations for enabling effective remediation and the power of operational playbooks
Register today to learn how to better handle your organization’s next security incident.
Matt Tyrer and Paolo Iacoviello - CommvaultRecorded: May 22 201933 mins
Time to turn off your legacy backup! Commvault moves that old data to the cloud.
Are you still paying maintenance on old backup systems just because you aren’t sure what to do with those backup and archive data sets that still need to be kept for compliance or retention requirements? What if you could migrate those backups and archives directly to the cloud while preserving the important metadata such as the original retention date stamps and times?
Join Commvault to learn how to move backups and archives out of legacy systems – and store those datasets and workloads directly in cloud storage.
Our technical subject matter experts will explain how the Commvault platform can automatically capture legacy backups and archives for cloud migration. Learn how to move backups to the cloud from any of these systems:
IBM Spectrum Protect, previously called Tivoli Storage Manager (TSM)
Dell EMC NetWorker
Dell EMC Avamar
Microsoft Data Protection Manager (DPM)
Microfocus Data Protector, previously HP Data Protector
You don’t need to keep that old system running in the corner “just in case.” Learn how to streamline your IT workload, provide better data availability, and include your legacy backups in enterprise search.
Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital RiskRecorded: May 22 201944 mins
According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.
However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?
Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator)Recorded: May 21 201960 mins
More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² and CISSPs from around the world as we discuss pain points and challenges encountered in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
Adam Dagnall, SE, CloudianRecorded: May 21 201951 mins
Learn how UK retailers save 70% of Data Storage costs w/ Cloudian feat. an exclusive Intel keynote.
Slash Backup & Data Protection costs and eliminate ingress/egress charges by:
• Repatriating workloads from AWS
• Re-optimising Hadoop Big Data workloads
• Saving 70% – 80% of storage costs for Splunk with Splunk SmartStore
• Tiering data from Pure Storage Flash array to free up capacity trapped with Snaps
Flavio Di Cosmo, SEMEA Sales EngineerRecorded: May 21 201931 mins
Perché automatizzare? Perché ora? L'automazione è fondamentale per la trasformazione digitale, essenziale per ridurre la superficie di attacco e obbligatoria per garantire la conformità continua.
- Come accelerare in modo sicuro il processo di modifica della rete
- Best practice per iniziare con l'automazione
- Linee guida per raggiungere l'obiettivo di Zero-Touch Automation
Rendilo uno dei tuoi obiettivi del 2019 per adottare l'automazione e ridurre il tempo e gli sforzi da dedicare alle attività manuali relative alle operazioni del firewall. I cinque segni chiari possono aiutarti a costruire il business case e ottenere il buy-in di gestione per massimizzare l'agilità e la sicurezza con Tufin Security Policy Automation and Orchestration.
Anthony Le Pipe, WEMEA Sales EngineerRecorded: May 21 201932 mins
Pourquoi automatiser? Pourquoi maintenant? L'automatisation est essentielle à la transformation numérique, essentielle pour réduire la surface d'attaque et obligatoire pour garantir la conformité continue. Rejoignez-nous le mardi 21 mai pour notre diffusion Web "5 signes clairs dont vous avez besoin pour automatiser les opérations de sécurité réseau" pour apprendre:
- Comment accélérer en toute sécurité le processus de changement de réseau
- Meilleures pratiques pour démarrer avec l'automatisation
- Lignes directrices pour atteindre l'objectif de l'automatisation Zero-Touch
Faites de l’automatisation l’un de vos objectifs pour 2019 et réduisez le temps et les efforts consacrés aux tâches manuelles liées aux opérations de pare-feu. Les cinq indicateurs clairs peuvent vous aider à élaborer une analyse de rentabilisation et à obtenir l'adhésion de la direction à l'optimisation de l'agilité et de la sécurité avec l'automatisation et l'orchestration des stratégies de sécurité de Tufin.
Ray Ford, GDPR Institut and Nigel Tozer, CommvaultRecorded: May 20 201969 mins
A year on from the start date, many organisations are quietly admitting they still don’t consider themselves to be compliant with GDPR. Surveys are coming out that confirm this, all at a time when the regulators seem to be getting serious about enforcing this regulation. The question is this – are GDPR plans failing, or is gaining control of data the real challenge?
In many organisations the main challenge is still data:
Avoiding a breach and dealing with its consequences
Dealing with data on laptops and in the cloud
Finding and erasing data
This webinar will help you build a data strategy for GDPR and beyond, and as well as dealing with the topics above, we will also take a look at how good data controls can provide financial and business benefits beyond mere compliance. The session is suitable for Chief Data Officers, Data Protection Officers and IT teams responsible for data management.
Simon Rycroft, Principal Consultant, ISF and Kashif Barlas, Senior Consultant, ISFRecorded: May 20 201945 mins
With businesses streamlining processes and automating customer service through outsourced arrangements, the volume and content of electronically transmitted personal data records has increased beyond all previous estimates. The sharing of special categories of data between businesses and their suppliers has become the norm, sometimes without adequate protection for the individual’s privacy in breach of the GDPR. Where there are hundreds of supplier contracts, it is not pragmatic for an organisation to review and tighten all these contracts immediately in the wake of the GDPR, however a risk-based approach can certainly reduce the compliance burden upon existing teams.
In this seminar, we introduce the concept of a minimum viable product for this aspect of data privacy and describe how it can be aligned with an organisation’s risk appetite and agreed before prioritising and mitigating data privacy risks.
Adam Fox & David HuskissonRecorded: May 20 201947 mins
NAS data is growing at a rapid rate, but many customers are facing challenges in wrangling this data with costly, slow, legacy solutions. Rubrik and Pure Storage have developed a compelling solution to help protect your NAS data at scale. Rubrik NAS Direct Archive to Pure FlashBlade allows our customers to manage, protect, and store their NAS data in a cost-effective, scalable and high-performing environment.
In this on-demand webinar, experts from Rubrik and Pure Storage present a technical deep dive on how to leverage Rubrik for NAS Direct Archive to Pure FlashBlade and the performance implications of this joint solution.
Join this on-demand webinar to learn how to:
Maximize backup and restore performance for any NAS host while reducing costs
Achieve fast search and near-zero RTO with cataloged metadata
Modernize your data center with Rubrik and Pure FlashBlade by simplifying management and providing the world's first datahub.
Adam Fox, Sr. Solutions Architect, Rubrik
David Huskisson, Rapid Restore Solutions Manager, Pure Storage
Tim Ayling, Global Head of Fraud Prevention SolutionsRecorded: May 20 201942 mins
Isn’t it funny how biometrics, a science that has been around for centuries, did not enter the public consciousness until Apple launched Touch ID with the iPhone 5S in September 2013? Now it is seen by many as the solution to our fraud concerns. Of course, this technology, like any other, whilst offering tremendous potential, is not the be-all and end-all of fraud and cybercrime prevention. In this presentation we will look at why Artificial Intelligence and behavioural biometrics, on their own, are not the answer to all your cybersecurity woes.
Denis Makrushin, Security researcher, Kaspersky Lab; Vitaly Mzokov, Solution Business Lead, Kaspersky LabRecorded: May 20 201957 mins
Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.
Please find more by the link – https://securelist.com/time-of-death-%D1%81onnected-medicine/84315/
Want to know more about underground financial threats? Join our next webinar:
Sapna Singh, cyber SME and advocate for women in cyberRecorded: May 18 201953 mins
Join WSC and Sapna Singh, May 18th at 11 AM EST for a discussion on Cloud Computing and Cloud Security. Hear from cyber professional and advocated for women in cyber in the Middle East as she Dives into what the cloud is and how it works. After which she gets into AWS and breaks down a few of the major areas of the platform.
This is a primer for our hands-on cloud workshop to be hosted later in the year!
Storage Switzerland, Virtual InstrumentsRecorded: May 17 201917 mins
Most All-Flash Arrays were bought in the last few years and have not come anywhere close to “end of life,” yet most vendors are now shipping NVMe All-Flash Arrays which offer better performance. As enticing as these new systems might be, IT planners need to proceed with caution to make sure that the organization has workloads that can justify the move to NVMe as well as ensuring the rest of the storage and network infrastructure is up to the task.
In this 15 Minute webinar Storage Switzerland and Virtual Instruments take an objective look at the NVMe and help you map out a strategy for the transition.
Storage Switzerland, Axellio Inc.Recorded: May 16 201957 mins
Many organizations need to continue to run virtualized applications on-premises but are also looking to replace and consolidate aging server infrastructure. At the same time, these organizations want to leverage cloud services for data protection, high availability and disaster recovery as well as providing a centralized hub to track and manage what is happening across multiple data centers. The challenge is that most infrastructure solutions don’t offer both an efficient approach to demanding scale-up and scale-out applications while effectively integrating cloud services – for on-premises and cloud efficiency. Instead of creating a simple to manage hybrid cloud, the organization is forced to make trade-offs.
During the webinar, “Simplifying the Large-Scale Hybrid Cloud”, Storage Switzerland and Axellio discuss how Microsoft Azure Stack HCI and Axellio’s FabricXpress Servers can deliver new levels of consolidation in the enterprise. Learn how to intelligently leverage Azure to simplify operations like data protection, business continuity, and data center operations – while deploying less infrastructure and less software for your demanding on-premises workloads.
- How to Design Hybrid Cloud for Consolidation of Enterprise Workloads & Infrastructure
- What Cloud Services Does On-premises HCI Need?
- What is Microsoft Azure Stack HCI and how does Axellio leverage this for greater simplicity?
Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMwareRecorded: May 16 201964 mins
To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
Vicente Diaz, Artem KarasevMay 24 20192:00 pmUTC60 mins
Counteracting modern cyberthreats requires a 360-degree view of the tactics and techniques used by threat actors. While the C&Cs and tools cybercriminals use change frequently, it’s extremely difficult for attackers to change their behavior and methods during an attack execution. Identifying and exposing these patterns quickly helps deploy effective defensive mechanisms in advance, disarming cybercriminals and disrupting the kill chain.
Kaspersky Lab's APT Intelligence Reporting now tracks 100+ threat actors, uncovering the most sophisticated and dangerous targeted attacks, cyber-espionage campaigns, major malware, ransomware and underground cybercriminal trends in 85 countries. Join our webinar and learn how to use our unique expertise and knowledge to enable bulletproof protection from the most damaging threats.
CJ Breaux - Systems Engineer, Dell EMCMay 24 20195:00 pmUTC60 mins
On average, it takes an organization 108 days to detect a security breach. Endpoint security solutions must work with the way employees work today. They not only need to do the job of protecting data and preventing threats, but they should also enable worker productivity – not hinder it. Join us to learn how you can prevent, detect, and respond to threats faster and more efficiently with Dell SafeGuard and Response.
Geoffrey Hughes, Capgemini, Former CISO, Architect, Compliance Officer, Karen Crowley, Sr. Product Marketing Manager, TufinMay 28 20196:00 amUTC51 mins
Join us on May 28th at 2pm SGT/4pm AEST to hear Capgemini talk about the challenges of improving operational efficiency in the age of increasing network complexity and digital transformation.
Former CISO, Security Architect and Compliance Officer, Geoff Hughes of Capgemini will address:
Why organisations struggle to deploy automation at scale
Best practices for getting started with automation
The role application security plays in digital transformation
Register now for this 30-minute discussion to learn how you can improve operations and meet business agility goals with automation.
Kaspersky Lab and guestsMay 28 20191:00 pmUTC68 mins
In the digital world, effective information security is now a key business success factor. As attackers find new ways to attack digital assets, the ability of the organization to maintain continuity, and the security of the information circulating in it, may be called into question. New attack methods and threat vectors require fundamentally new approaches to corporate protection.
As part of the World Cyber Security Congress in London on March 27, Kaspersky Lab will be conducting a seminar exploring ways to solve the problem of protection in the digital world, where the risks are so high, and where the only sure defense lies a comprehensive security approach.
Join us there to:
• Find out about the threats organizations like yours are currently facing
• Learn how to build reliable protection in the era of digital transformation
• See how leading-edge global corporation has built its security on proven technologies
• Put your questions to our experts
During the seminar, our Principal Security Researcher in the Global Research and Analysis Team David Emm will talk about contemporary threats in ‘The Top Cyber-threats Facing Your Digital Business’.
Next, in ‘Cybersecurity as Part of Your Digital Transformation Strategy’, Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland will outline how to build a cybersecurity system able to respond to highly complex threats.
The seminar will end in conversation - CTO one of our customer talks about their success story in fighting today’s cyberthreats.
John Bell, Sr. Consultant & Eric Dey, Director of ProductMay 28 20196:00 pmUTC60 mins
While the S3 protocol has become the de facto choice for cloud and object storage, there can be important details that your storage vendor isn’t telling you. Are there bottlenecks or scaling problems waiting for you in a year or two? Should you be asking for more than "just S3" for unlocking value from your data? Our experts discuss these secret details and explain how Caringo’s storage solution gives you S3 along with the other pieces necessary to meet your evolving storage needs.
Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONEMay 29 201910:00 amUTC45 mins
Cloud, by its nature, can provide enhanced security because of the shared security model.
In the case of Azure, security responsibility is shared between Microsoft and the customer.
For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.
How do you make sure your data is secure as it enters the cloud?
Join SoftwareONE and Trend Micro as we discuss the following:
•The shared responsibilities across the customer and cloud provider
•The shifting and transforming landscape and its impact on maintaining compliance
•The growing requirements for speed and automation
•Stopping advanced threats and protecting vulnerabilities
•Putting in place security and compliance controls above and beyond the responsibility of the cloud provider
We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.
While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.
Find out how SoftwareONE and Trend Micro can help you achieve this.
Anthony Lawson, Technical Marketing Engineering Manager, CradlepointMay 29 20194:00 pmUTC60 mins
From large retailers and restaurant chains to financial service companies and many others, most organizations with lots of locations understand that LTE has become a crucial part of branch networking. But where is LTE’s “sweet spot” in branch settings?
Join Cradlepoint’s Anthony Lawson, Technical Marketing Engineering Manager, for a live webinar exploring the best ways to maximize the benefits of LTE within branch network architecture. You’ll learn how other companies are winning with wireless WAN and and getting on the pathway to 5G.
Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical OfficerMay 29 20194:00 pmUTC60 mins
The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
Erik Costlow, Principal Product Evangelist, Contrast SecurityMay 29 20195:00 pmUTC60 mins
In this webinar we will uncover why WAFs exist and go through architectures of a WAF, Cloud Native vs. On-Premise and of Self-Defending Applications. We’ll highlight what WAF’s can and cannot see and why they require augmentation to function to their fullest. We’ll also investigate into the three types of WAFs and highlight their similarities and differences:
- Traditional WAF
- “Next-Gen” WAF
- Cloud WAF
We will also discuss the commonalities and disparities of Cloud and on-premise WAF’s and present some best practices, deployment strategies and management for each. Additionally we’ll highlight WAF augmentation and underscore why you need to secure within the application instead of just in front and how Contrast’s platform can see things that are “invisible” to WAFs and comparing the different approaches to application protection.
The webinar will illustrate how Runtime Application Self-Protection (RASP) works from within the application via instrumentation in production environments and show how easy it is to deploy in for DevOps, Cloud and Container environments. We will also illustrate why RASP is more accurate than a WAF, so you can block attacks out-of-the-box quickly, economically and effectively.
Alan Kerr, Senior Solutions Architect at StablePath & Jim Barnes, Director of IT at RSDMay 29 20196:00 pmUTC60 mins
REGISTER NOW to hear the Storage Success Story of RSD, Refrigeration Supplies Distributor and DataCore partner, StablePath.
The webinar is on May 29th at 2 pm EST. Learn More.
Meet Refrigeration Supplies Distributor, the largest independently owned refrigeration parts and HVAC equipment wholesaler in the western United States. RSD recently celebrated 112 years in business.
Meet DataCore partner, StablePath. This California based DataCore reseller has nearly two decades of experience in the IT industry. They have built their solid reputation leveraging best-of-breed technology and services.
With the help of StablePath, RSD strives to set the mark for customer service. Having a world-class IT infrastructure is a critical element in achieving 100% customer satisfaction!
The RSD Challenge. Before implementing DataCore software-defined storage, RSD was running production data, including its business-critical ERP system on EMC storage and Veeam backups on tape. However, having a dual-controller single-disk array configuration would cause IT to run into problems, slowness and experience failures continually. They needed a faster solution.
The StablePath Solution for RSD. A large part of the RSD infrastructure upgrade involved virtualizing the ERP system among others, and a key consideration was the performance needed to power this business-critical asset. The ERP provider ran initial tests with DataCore software-defined storage for RSD, and the results were shocking—not only did it meet the existing performance needs, but it also sped up the system significantly. Plus, their Veeam backups ran 3X faster than before. As a result, RSD experienced:
Increased Performance, Zero Downtime
Faster Backups and Comprehensive Disaster Recovery
Also, remember, all attendees will have the chance to win a $200 gift card.
See you on the webinar!
If you have any questions, reach out to us at Info@DataCore.com or +1.954.377.6000.
Storage Switzerland and DriveScaleMay 29 20198:00 pmUTC30 mins
Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra to Drive Down Cloud Data Center Costs
Hyperscale applications like Elastic, Hadoop, Kafka and Cassandra typically use a shared nothing design where each node in the compute cluster operates on its data. Hyperscale architectures, to maximize storage IO performance, keep data local to the compute node processing the job. The problem is that the organization loses the efficiency of shared storage infrastructure. As the hyperscale architecture scales, overprovisioned and underutilized compute, GPU and storage resources cost the organization money!
Join Storage Switzerland and DriveScale for our 15 minute webinar to learn how composable infrastructure can provide both high performance and high efficiency.
In 15 minutes learn:
- The challenges facing hyperscale architectures
- The true cost of underutilized compute and storage
- Why fast Ethernet networks are good for your data
- How a composable architecture brings scale, performance and cost efficiency to your data center
Grzegorz Szostak, Presales rozwiązań Commvault, S4EMay 30 20198:00 amUTC75 mins
Systemy hiperkonwergetne integrują w jeden organizm, serwery, pamięć masową oraz funkcje sieciową. Tak inteligetne systemy należy odpowiednio zabezpieczyć. Podczas webinarium zaprezentujemy jak dwaj liderzy swoich rynków integrują i uzupełniają się
Christian Wells, Senior Product Consultant and Denis Dennehy, Customer Success Director, Blue PrismMay 30 20193:00 pmUTC75 mins
The Control Room is Blue Prism’s command center: it provides a centralised administration console for controlling, monitoring, executing and scheduling automated processes to the Digital Workforce as well as an overall hub for resource management.
Often underutilized, understanding the Control Room is critical to reaching the full potential of your Connected- RPA Digital Workforce.
But why getting the best out of your Control Room so important?
- Scheduling allows for time critical processes to be completed within defined SLAs even during peak volumes without the need to recruit for overtime or out-of-hours human workers.
- Digital Workers can be allocated to certain processes or can put to work across all processes like a multiskilled worker dependant on volumes. This allows for you to be reactive according to business needs.
- You have access to all run data and run logs that can tell you exactly what actions have completed by your Digital Workforce; this can be more transparent than actions completed by the human workforce and ensures full auditability of processes automated.
- It is a real time view of what your Digital Workforce is currently working on, at what speed and how effective it is.
In this webinar, we’ll be helping you get to the next level with your usage of the Control Room, covering everything you need to know (and more), including:
- Delivery Methodology
- Service Model definition of Business as Usual activities and the role of the Controller
- Controller's Collateral - Operation Handbook and Contingency Planning
- Control Room Overview
- Staffing Model: Difference between the Controller (monitoring) and Lead Controller (Scheduling, Resource Management)
- Christian Wells, Senior Product Consultant, Blue Prism
- Denis Dennehy, Customer Success Director, Blue Prism
Brian Summers - Storage Field Marketing Manager, Dell EMCMay 30 20194:00 pmUTC60 mins
We will briefly discuss the evolution of storage to understand how the industry has arrived at the modern storage solutions we see today. Then we will take a close look at Dell EMC midrange storage offerings to better understand where these products fit in the overall Dell EMC storage portfolio.
Presented by: Brian Summers - Storage Field Marketing Manager, Dell EMC
Adrian "AJ" Herrera, VP Marketing, and Jose Juan Gonzalez Marcos, Sales EngineerMay 30 20194:00 pmUTC60 mins
Organizations across all industries are struggling with enabling instant on-demand access to archived video. Workflows relied upon for years, based on tape, are becoming too difficult to manage and video assets are taking longer and longer to recall. The cloud is an option but compounding recurring costs, bandwidth limitations and asset security are valid concerns. The solution is on-prem object storage. In this webinar, you will learn how to plug object storage into digital asset management solutions via the Amazon S3 interface. You will also learn how to consolidate video archives, enable private streaming and provide video-on-demand (VOD) directly from the archive layer.
Colin Whittaker, IRD; Richard Bird, Ping Identity; Teju Shyamsundar, Okta, Jerrod Chong, Yubico; and Andy Smith, Centrify.May 30 20195:00 pmUTC75 mins
The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.
To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:
- Securing access at all points across applications, devices, users and environments.
- Sharing insights across security systems to strengthen security.
- Collecting and analyzing information to stop attacks.
- How MFA can transform secure access—to any application, from any device, anywhere, at any time.
- Strengthening identity assurance with privileged users.
Small, stylish and light products designed with the latest advances in engineering including Express technology for increased performance, and future-ready connectivity. Our systems ensure users can work faster anywhere.
Not only do our machines have intelligent manageability and security features that are trusted by IT, but they are designed for long life-cycles, thereby reducing waste and recycling costs.
With a choice of form factors workers will be proud to carry, we offer total solutions of laptops, 2-in-1s and ecosystem products for the many ways users work.
Дмитрий Иванюк, эксперт по решениям CommvaultMay 31 20198:00 amUTC60 mins
Приглашаем Вас и ваших коллег принять участие в вебинаре для представителей Sales-департамента «Ищем проблемные точки в инфраструктуре клиента».
Дата: 31 мая
Время проведения: 11.00-12.00
Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.
Курс предназначен для BDM, менеджеров по продажам, руководителей проектов, руководителей продаж.
Посетите вебинар и вы узнаете:
•как заинтересовать в решении Сommvault
•определить необходимость выбора решения Сommvault
•подробнее о миграции и битве с конкурентами
•Важная проблема Клиента- «защита информации»
•портрет потенциального заказчика
•обзор различных сценариев продаж
Storage Switzerland, KaminarioMay 31 20195:15 pmUTC15 mins
IT professionals are hearing a lot about composable infrastructures and many vendors are claiming to offer a solution, but only a few have truly composable solutions ready for deployment today. The goal of composability is to bring the cloud like infrastructure experience to the on-premises data center so that mission-critical workloads can benefit.Join Storage Switzerland and Kaminario for our next 15 minute webinar. During this webinar listen in as our panel of experts discuss what composable infrastructures are, how they have evolved and most importantly what to look for in a composable solution.
Register to receive an exclusive copy of Storage Switzerland’s latest eBook “Developing a Cloud-Like Experience for Mission Critical Data.”
Melisande Mual | The Paypers, Berit Svendsen, Vipps | Husayn Kassai, OnfidoJun 3 201911:00 amUTC75 mins
Organisations are often challenged with finding the right balance between innovating and staying secure. How are cutting-edge advancements revolutionising the way we look at identity and authentication?
Join the panel to hear about:
-Understanding the digital identity landscape
-How to avoid drop-off during the verification process
-How developments like biometrics, AI, blockchain can impact identity and data management
-How to adapt and respond to new regulations like PSD2, Open Banking, and GDPR
Panel moderated by: Melisande Mual, Founder at The Paypers,
Berit Svendsen, EVP International Business at Vipps
Husayn Kassai, CEO & Founder, Onfido
Panelist to be announced
Tim Ayling, Global Head of Fraud Prevention Solutions, Kaspersky LabJun 4 20195:00 amUTC29 mins
When it comes to discussions related to fraud, we think about the finance first. Financial institutions historically have suffered the most being the targets of various criminal schemes, malware, social engineering, money laundering and other fraud vectors.
However, nowadays we see that organizations across different industries are suffering reputational, financial and other damages caused by fraud. Government agencies, healthcare organizations, retail and e-commerce, loyalty schemes, gaming industry and gambling rooms report cases of account takeover, new account fraud, even money laundering related attacks. Most of them have fraud prevention measures in place to fight or at least to monitor this. But fraud has evolved into a form of organizational crime and attackers offer training and knowledge sharing to help find a way past well-known fraud management solutions.
At the webinar we are going to cover the most up-to-date threat landscape for different types of businesses and share some real cases of success.
Sunil Choudrie, Senior Strategist, SymantecJun 4 20195:00 amUTC31 mins
Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.
The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.
Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.
Istvan Nemeth, CTO BiztributorJun 4 20198:00 amUTC45 mins
Folyamatosan emelkedik a célzott phishing támadások száma – mert működnek. A közelmúltban gyors és drámai váltást láthattunk a hagyományos széles spam támadások felől a célzott, email-alapú phishing támadások felé. E támadások már jelentős pénzügyi, működési és márka-károkat okoznak a szervezetnek világszerte.
A közelmúlt leghírhedtebb kibertámadásai – beleértve a múlt heti Binance-támadást is – úgy kezdődtek, hogy valaki egy spear-phishing emailre kattintott. A sikeres spear-phishing támadások átlagos költsége: 1,6 millió dollar.
Nézd meg az elő webinart, amelyben a biztributor CTO-ja, Német István veszi át a támadási vektor főbb jellemzőit és a modern védelmi mechanizumusokat. A témából:
-email-alapú támadások trendjei
-új típusú fenyegetések
-a FireEye Email Security egyedi megközelítése
-best practice-ek, tanulságok éstapasztalatok