Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Recorded: Feb 21 2017 64 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Recorded: Feb 21 2017 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Recorded: Feb 21 2017 52 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • [Video Interview] RSA 2017 - Ian Glover, President, CREST [Video Interview] RSA 2017 - Ian Glover, President, CREST Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude Feb 24 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Access control for Subversion and Git Access control for Subversion and Git Doug Robinson Mar 2 2017 6:00 pm UTC 60 mins
    Enterprise development teams are frequently working with multiple types of SCM repositories, such as Git and Subversion. Git does a solid job handling source code; Subversion does a solid job handling binary artifacts and is likely where many older projects' full histories reside. Managing both Subversion and Git repositories together is quite a challenge. Join us to learn how to make it easy.
  • Think beyond GDPR – Integrate your cyber defences Think beyond GDPR – Integrate your cyber defences Sunil Choudrie & Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?

    As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.

    Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Best Options for Failover in Retail Best Options for Failover in Retail Landon Reese, Cradlepoint Recorded: Feb 15 2017 46 mins
    In retail, the rapid adoption of omnichannel services, automation, digitization, IoT and mobile devices, and cloud-based applications has rendered Internet and downtime unacceptable. From helping customers to handling back-office duties, retail staff need 24/7 connectivity to do their jobs effectively.
     
    Retail IT professionals need flexibility and numerous options for providing Internet failover, router redundancy, and business continuity in a variety of locations and circumstances.
      
    At 9 a.m. PT / 12 p.m. ET on Feb. 15, 2017, join Cradlepoint’s Landon Reese to explore the best options for failover in retail, as enterprises look to improve the customer experience and save time, money, and man-hours.
  • Automation for Check Point R80 & Rule Decommissioning Automation for Check Point R80 & Rule Decommissioning Amnon Even Zohar, Director of Cloud Product Management & Maya Malevich, Director, Product Marketing Tufin Recorded: Feb 15 2017 40 mins
    For many enterprises 2017 will be the year they start automating security changes for increased agility across their hybrid network.
    Tufin is ready to provide policy-based automation across legacy and next generation networks, physical FWs and cloud platforms.
    Join us to learn about the enhancements in Tufin Orchestration Suite R16-4:
    •Policy-based automation for Check Point R80
    •End-to-end automation for rule and server decommissioning
    •Built-in enforcement of cloud tag policy
    and much more.
  • FileFly and DFSR (Distributed File System Replication) Support FileFly and DFSR (Distributed File System Replication) Support Glen Olsen, Product Manager Recorded: Feb 14 2017 48 mins
    Caringo Product Manager Glen Olsen takes an in-depth look at how FileFly 2.0 supports Microsoft Distributed File System Replication and how you can protect your organization’s data with limitless tiering.
  • Data Warehouse Migration: Benefits & Best Practices for your Big Data Solutions Data Warehouse Migration: Benefits & Best Practices for your Big Data Solutions Ivan Kosyakov, Technical Solutions Professional, Microsoft & Mark Lochbihler, Director of Partner Engineering, Hortonworks Recorded: Feb 14 2017 24 mins
    Is your data warehouse meeting your customers needs?

    Your business users are demanding analytics over unstructured data, and to fully realize the value of data, you need a complete platform that can manage both structured and unstructured data with security, consistency, and credibility.

    Is your data warehouse up to the task? When does it make sense to augment your data warehouse or completely migrate to an alternative?

    Data warehouse and big data solutions from Microsoft provide a trusted infrastructure that can handle all types of data, and scale from terabytes to petabytes, with real-time performance.

    Join this webcast to:
    - Learn about the process, tools, and reference architectures for data warehouse migration
    - Understand when it's time to augment your data warehouse or migrate to an alternative
    - Get to know the benefits of migrating off of insufficient solutions with a specific use case from Hortonworks
  • ETL and big data: Building simpler data pipelines ETL and big data: Building simpler data pipelines Paul Scott-Murphy Recorded: Feb 14 2017 61 mins
    In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.

    But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, whether on-premises or to the cloud, they are building systems that look an awful lot like ETL.
  • Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Cheryl O'Neil - Dir. Prod. Mktg.; Kedar Dhuru - Sr. Prod. Mgr.; Ido Tzang - System Architect Recorded: Feb 14 2017 39 mins
    Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
  • Podcast - What is DRaaS? Podcast - What is DRaaS? Charlie Hodges, Storage Switzerland Recorded: Feb 9 2017 17 mins
    Disaster Recovery as a Service (DRaaS) is a recovery option that is getting a lot of attention right now. In this live podcast, Storage Switzerland and Carbonite cover exactly what DRaaS is and whether or not your organization should consider it? Join us as we cover all things DRaaS. We’ll even answer all your DRaaS related questions.
  • Effective Patch Strategies for Windows 10 and Office 365 Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Product Management, Symantec Recorded: Feb 9 2017 50 mins
    Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.

    Join our webinar to learn:
    - What these changes are
    - How these changes can impact managing your environment, especially for patch management
    - How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
  • Introducing FileFly 2.0 Introducing FileFly 2.0 Glen Olsen, Product Manager Recorded: Feb 7 2017 41 mins
    Do you have one or two Windows file servers filling up too quickly? Would you like to store near unlimited data and improve performance while avoiding expensive additions or upgrades? Tune in to hear Glen Olsen, Caringo Product Manager, explain how you can accomplish this feat with FileFly for Swarm—a complete, automated file lifecycle management for limitless tiering of storage. In addition, Glen will discuss the powerful tiering data protection enhancements in FileFly 2.0.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Carlos Nieves, Director Marketing, DataCore Software Recorded: Feb 7 2017 34 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • INFORMS - Associate Certified Analytics Professional (CAP®) Overview INFORMS - Associate Certified Analytics Professional (CAP®) Overview Polly Guthrie-Mitchell, Laura Ladrie Recorded: Feb 7 2017 58 mins
    On Tuesday, February 7, 2017 at 10:30am PT/1:30 pm ET, join us for this special webinar, hosted by Polly Mitchell-Guthrie, SAS, and Laura Ladrie, North Carolina State University, to learn how the aCAP can help distinguish your analytics program. 
  • The Future of Machine-Based Penetration Testing The Future of Machine-Based Penetration Testing Sion Retzkin - Cronus Cyber Technologies Recorded: Feb 7 2017 34 mins
    The majority of internal and external cyber-attacks begin with exploiting vulnerabilities in the network and targeted applications. Over 99% of actual attacks exploit known vulnerabilities listed as known Common Vulnerabilities and Exposures (CVEs). The traditional defence is to probe the system using manual or automatic vulnerability scanning techniques; but this produces a lot of redundant and irrelevant information that does not shed any light as to whether a hacker can use the vulnerability to reach a critical asset. The only solution today is human penetration testing, but infrequent testing does not reflect the network's dynamic nature, especially in today's virtual and cloud based environments.
    A fresh approach to support manual penetration testing and enhance cyber resilience is to continuously and automatically test the network, applications and databases by using penetration testing techniques to expose vulnerabilities, establish complex attack path scenarios in real time and provide security and business insights to act on.
    This presentation will look at the technology and role of machine-based penetration testing.
  • Securing Industrial Control System (ICS) - What you need to know Securing Industrial Control System (ICS) - What you need to know Rob Caldwell, Manager, Mandiant Consulting Recorded: Feb 6 2017 45 mins
    Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers. At the end of this discussion, the Mandiant practice will open up for Q&A on the topic.
  • Todo lo que necesita saber de la protección de cargas de trabajo sobre OpenStack Todo lo que necesita saber de la protección de cargas de trabajo sobre OpenStack Cesar Funes - Commvault Technical Partner Enablement Manager Recorded: Feb 3 2017 51 mins
    A medida que evoluciona la virtualización, una nueva generación de nubes privadas se vislumbra en el horizonte. Probablemente se plantea usted mismo reducir costes derivados de la nube mediante el aprovechamiento de la tecnología Open Source, para proporcionar un entorno web escalable y desarrollar una nueva generación de aplicaciones.

    Conozca en este webinar de la mano de Cesar Funes, Technical Partner Enablement Manager South Region, cómo asegurarse de que cuenta con una estrategia efectiva de protección y recuperación de servicios desplegados sobre instancias de OpenStack, y de las tecnologías que le permiten afrontar la construcción de su nube privada sin perder seguridad, granularidad y control sobre las copias de sus datos.
  • Top Deployed SD-WAN Use Cases (Part Two) Top Deployed SD-WAN Use Cases (Part Two) David Klebanov, Director Technical Product, Viptela Recorded: Feb 2 2017 40 mins
    This live demo will cover the major use cases of SD-WAN that are applicable to both large and small enterprise scenarios.
    These include:
    - Distributed media streaming with multicast
    - Enabling cloud-security capabilities with Zscaler
    - Segmentation and per-segment topologies
    - Service insertion and service chaining
    - Virtualized elements for Cloud (IaaS+PaaS)
    - Zero touch provisioning
  • BBC | Cinegy | Quantum Webinar BBC | Cinegy | Quantum Webinar Roland Rodgers - BBC, Andrew Ward - Cinegy and Janet Lafleur - Quantum Recorded: Feb 2 2017 59 mins
    How BBC Northern Ireland Turned Decades Of Content Into A Secure, Accessible Petascale Archive

    As the national branch of the BBC, BBC Northern Ireland produces a complete schedule of news and current affairs programming that it distributes over two television channels, two radio stations, and multiple online platforms.

    BBC NI also delivers content from other BBC production centers to Northern Ireland audiences. In addition, its facilities also serve as a central digital archive for the Rewind Projects, hosting thousands of hours of existing content from all of the BBC’s different national sites.

    To meet their challenge of storing, protecting, and making the content available for reuse, they turned to a workflow management solution from Cinegy built on the Quantum StorNext storage platform.

    Attend this webinar and learn more about key elements of the BBC NI solution:

    • Unified asset management environment spans multiple, discrete storage tiers for storing video and audio essences together with metadata

    • Teams of users and applications in all areas have fast, simultaneous access to all media content on disk and tape

    • Automated movement of data between disk and tape tiers for backup and archive

    • High-speed, multi-stream transcoding delivers content quickly for accelerated production because data is visible on any computer

    • Dual-redundant systems supports around-the-clock operations and provides back-end storage support to ensure DR protection

    • A scalable solution that can grow as storage demands increase in the future
  • Arcserve's New UDP v. 6.5 Arcserve's New UDP v. 6.5 Gary Sussman, Kervin Myrtil, Chris Rockholt Recorded: Feb 1 2017 43 mins
    Arcserve delivers the only data protection solution to uniquely combine enterprise-grade capabilities with the simplicity required by small and over-stretched IT teams, proving power and resilience can coexist with simplicity and elegance.

    Join us as we discuss the latest version of Arcserve's Unified Data Protection solution.
  • Ready for GDPR? Learn about challenges and ways to comply Ready for GDPR? Learn about challenges and ways to comply CEO Richard Hibbert & Head of Products, Oliver Vistisen Recorded: Feb 1 2017 45 mins
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance.