The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Our security experts walk through dynamic peer group analysis in CounterBreach 2.0. Tune in to see how to use machine learning to define dynamic peer groups, detect suspicious file access behavior, and dynamically manage access permissions.
The cloud has brought both risk and reward to MSPs. In today’s hybrid cloud world, MSPs must deliver consumption-based, private and public cloud offerings to their clients. This includes offering primary storage, offsite backup and DR that is high-performance, scalable and secure. Outsourcing primary storage along with backup and DR enables an MSP’s customers to reduce their on-premises footprint software licenses, connectivity and the problems that come with it. It also sets up the MSP to offer hybrid services like DR as a Service and the new opportunity of copy data management - stop making copies.
Aktuell werden gezielt Webserver, Cloud Datenbanken und IoT-Geräte durch ein professionelles Vorgehen kompromittiert
Lernen Sie die technischen Details kennen, wie diese Angreifer vorgehen und wie Sie sich davor schützen können.
Vor einiger Zeit hat die WannaCry Malware viele Unternehmen daran erinnert, wie verheerend ein erfolgreicher Ransomware Angriff sein kann. Glücklicherweise war WannaCry vergleichsweise einfach konzipiert. Es gibt jedoch wesentlich versiertere Angreifer, welche sich auf gezielte Ransomware Attacken gegen hochsensible Unternehmen-Daten spezialisiert haben.
Mit APT-ähnlichen Methoden und Techniken werden die relevanten Unternehmensbereiche gezielt kompromittiert und per Lateral-Movement das interne Netz unterwandert. Webserver, Cloud-Datenbanken bis hin zu Industrieanlagen werden so gezielt angegriffen und von hochprofessionellen Erpressern blockiert bis zigtausende von Euros an Lösegeldzahlung geleistet werden. Selbst IoT Geräte wurden bereits „Opfer“ von Ransomware.
In dem Webcast behandeln wir die Themen:
•Infektionsvektoren von Ransomware (Email,Web und Exploits)
•Rückblick WannaCry; Details über die Links zur Lazarus Gruppe und die Programmierfehler
•TTP der SamSam Gruppe und anderen gezielten Ransomware-Attacken
•Ransomware auf IoT (Unternehmen mit SmartTV und Mitarbeiter mit SmartWatch)
•Einblick in den aktuellen Internet Security Threat-Report (ISTR) von Symantec
The SAP on Microsoft approach has allowed Accenture to deliver on their business priorities while lowering costs and improving performance. In turn, a lower cost of ownership allows Accenture to position itself for the future by investing in other areas to expand its capabilities and continue driving a digital Accenture future forward.
Join Aman Dokania, Cloud APAC Managing Director at Accenture and Danette Seward, Senior Director of Advanced Cloud Workloads at Microsoft, as they provide real-world examples of this successful partnership in action.
With today's digital demands, its more important than ever to deliver apps at lightning speed. Azure app hosting allows you to create powerful cloud applications for web and mobile on any platform, for any device.
Thomas Decant, Product Marketing Manager in the Cloud and Enterprise team at Microsoft, takes us through the possibilities and benefits that Azure App Service provides your business.
With Richard Knight and Adam Barker, Microsoft Asia Sales Leads for SAP, discover how to reduce your SAP TCO by 40-75% and data storage cost by 60%. Discover why Azure is the most comprehensive cloud platform for SAP workloads on how it is providing unparalleled performance for even the largest SAP and SAP HANA workloads.
In today's digital age, customer experience is more important than ever. But how do you guarantee customer retention and positive user experience across multiple platforms, devices, industries, and outlets?
Tune in to a real-life case study to learn how RAC WA, the Royal Automobile Club of Western Australia, leveraged Sitecore's content management and multichannel marketing automation software on Azure PaaS to grow its customer engagement by 30% all up, and 50% on mobile.
Learn with Ivan Chan, T-Systems Business Developer, Ravi Gangampalli, SAP Solution Architect, T-systems, and Arnaud Lheureux, Microsoft Cloud Solution Architect, the process of how to achieve a safe and smooth SAP on Azure transformation. From the design phase to operations, you'll learn how to manage your migration project from start to finish.
PACT group was recently named one of Australia's most innovative companies for the fourth consecutive year, and for good reason.
Michael Ross, PACT Group CIO explains how he managed to get more features, greater capability and better performance without increasing costs by migrating his SAP production to Azure. Join this webcast to uncover tips and best practices for seamlessly migrating your enterprise software solutions.
Increased agility, reduced complexity, faster time to market. Learn how easy it is to implement Platform-as-a-Service to modernize line of business applications or develop new ones that will natively be adapted to any device and benefit from the most advanced customer focused innovation.
Join Pradeep Menon, Microsoft Data Solution Architect, as he provides a hands-on approach to getting started with Cognitive Services on Azure. You'll learn the different reference architectures and how to integrate these services into your applications immediately.
Sean Helm, General Manager of the Snowden Group, talks about how Azure helped Snowden modernize their products, drive leading edge services to their customer and realize additional revenue streams by entering new markets.
Learn more about Just Analytics' consulting practice journey towards being data-focused and customer-centric using Microsoft's Big Data and Data Warehouse technologies.
Understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns. Learn how Just Analytics helps their customers tackle cultural challenges in data centric decision making.
Grant Fenn, CEO of Downer Group, talks about how a venerable business in the engineering and infrastructure management services industry harnessed Digital Transformation to drive the next generation of operational capabilities.
With customers spanning a broad range of industries, including public and private transport, energy, infrastructure, communications and resources sectors, it's vital for Downer Group to implement a digital transformation strategy that can encompass platforms, systems, integrations and needs across the board. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations.
Digital transformation can help businesses modernize products, enter new markets and drive change. In the Internet of Things (IoT) era, it's becoming increasingly important to modernize your legacy applications in order to transcend the digital transformation, as well as enhance security of your IoT solutions and connected device authentication across multiple platforms.
Learn how Azure's IoT cloud solutions took these companies from ground-up to the cloud without costly infrastructure investments.
On Thursday, 29 June, Kaspersky Lab is teaming up with Comae Technologies to present an emergency webinar for businesses to help them understand and defend against the Petya/ExPetr ransomware. The malware has affected companies in a range of industry sectors across the world, with Ukraine, Russia and number of Western European countries most affected.
Juan Andres Guerrero-Saade, senior security researcher in Kaspersky Lab’s Global Research and Analysis Team, will be joined by Matt Suiche from Comae Technologies to present the very latest information on the ransomware’s attack vectors, the infection process and how it spreads through company networks. They will provide mitigation guidance and explain the actions organizations need to take to secure their computers and networks against this threat.
The Alphabet Soup of International Standards, Best Practice Frameworks, Governance Models and the like can be daunting and confusing at first. Which one is ‘Right’? Which one is the ‘Best’? Which one of these should a business use to improve?
The good news is that it doesn’t have to be that difficult.
Phillip Palmer has been educating and advising organisations in best practices for over 15 years. A self-described ‘Service Management Evangelist and Process and Quality Purist’, Phillip has garnered praise and awards for his infectious enthusiasm and practical application of best practice guidance.
Is your disaster recovery (DR) strategy inhibiting your company’s growth? A hybrid DR approach can bring significant benefits but only if you go in with full knowledge and understanding. In this webinar, we’ll outline the four pitfalls that can sink a DR strategy.
Join our webinar on the capabilities enabled between Microsoft and Red Hat, and how their IT ecosystems support and complement each other.
For years Windows and Linux have been rival development and runtime environments used by two distinct development communities – .Net vs. J2EE. At least that’s what we thought. In fact, they are not rivals at all, really. Rather, they are both commonly used by nearly all enterprises to develop and execute the applications they need to run their businesses.
Today, those applications are being modernized, containerized and redeployed across multiple clouds. Business and IT planners alike are rethinking how to develop new cloud-native applications and the infrastructure needed to deploy them to their best execution venue whether on-premises, in or across private, public or hybrid clouds. They expect the IT vendors and service providers they use to do more than just coexist. They expect partnerships dedicated to customer success – and none more so than among the two leading vendors in each community, Microsoft and Red Hat.
In this webinar 451 Research Principal Analyst Carl Lehmann, Margaret Dawson, Global Product Marketing Manager at Red Hat
and Jose Miguel Parrella,Sr Product Marketing Manager for Open Source at Microsoft will address:
•How to overcome common challenges of application modernization, infrastructure management, and cloud deployment.
•The partnership, and capabilities enabled therein, between Microsoft and Red Hat.
•How Microsoft Azure and Red Hat ecosystems support and complement each other.
Participants will learn how Microsoft and Red Hat build upon each other’s strengths in container-based, cloud-native application development, infrastructure deployment and operations to better serve their mutual customers through joint business practices, technology support, and ecosystem.
Wie der jüngste WannaCry Cyber Angriff gezeigt hat sind nicht gepatchte Systeme ein beliebtes Einfalltor für Schadcode unterschiedlichster Art und ein aktives Patch Management ist unbestritten eine der kritischsten Maßnahmen zum Schutz ihrer IT-Landschaft und sollte somit auf keinen Fall vernachlässigt werden.
Allerdings gibt es in der Praxis in unterschiedlichsten Umgebungen (Produktion, Embedded Systeme, ältere oder statische Applikationsumgebungen um nur einige wenige zu nennen) valide und vielfältige Gründe warum Systeme nicht auf dem aktuellen Stand gehalten werden können.
An dieser Stelle gibt es auch immer wieder Schwachstellen für die keine oder zumindest zum Zeitpunkt des Bekanntwerdens noch keine Updates zur Verfügung stehen und wir möchten in diesem Webcast aufzeigen wie mit Hilfe einer aktiven Systemhärtung Ihre System trotzdem geschützt werden können.
Des Weiteren werden wir Ihn aufzeigen wie mit Hilfe einer solchen Lösung auch aktuelle und gepatchte Systeme auf einen höheres Schutzniveau gebracht werden können.
Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?
Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.
- Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
- Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
- Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
- Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
•Mehrere Engines für die Bedrohungserkennung und -abwehr
•Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
•Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.
The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.
Register for our webinar ‘Power of The Proxy’ today!
Are you compliant with data preservation requirements? Ensure that you're saving information according to your needs. Office 365 U.S. Government is designed for the unique needs of U.S. government organizations. It provides all the features and capabilities of Office 365 services in a segmented cloud community that enables organizations to meet U.S. compliance and security standards.
The stakes of managing complex infrastructure continue to increase alongside the ever-increasing costs of outages. And while many IT Operations teams are investing in monitoring and ITSM tools to detect issues, they are often forced to react to high volumes of event data without context and without any consistent, well-defined processes. This leads to costly operational inefficiencies, employee burnout, and extended customer downtime.
Join us as we share newly PagerDuty product capabilities specifically designed for modern IT Operations teams. These capabilities take the chaos out of the incident resolution lifecycle — from assess, to resolve, to learn. Learn from the collective wisdom of thousands of the best IT operations teams how to make the unpredictable predictable, so you can spend more time on innovation.
You’ll discover how to:
•Optimize your ITSM toolsets by integrating people, data, and processes
•Maximize cross-functional transparency and consistency
•Prioritize incidents with well-defined rules
•Automate troubleshooting and remediation
•Ensure continuous learning and improvements across your team
During a major customer-impacting incident, every minute counts. The team must work together seamlessly and quickly to a successful resolution — and that’s done best with an Incident Commander driving coordination.
An Incident Commander is tasked with being the decision maker, delegating tasks and listening to input from subject matter experts in order to bring the incident to resolution. This is a critical role and there are essential best practices you must follow to get it right.
Join us to learn:
•What is an Incident Commander?
•The role and responsibilities of an Incident Commander
•Incident call procedures and terminology
•Incident commander skills for success
WannaCry may be behind us, but you still have to be mindful of new ransomware threats just over the horizon. That means taking steps today to ensure your data is protected from devastating disruptions tomorrow.
This webinar will feature defense-in-depth strategies that can help keep your business safe from cyber breaches. You’ll also learn why cloud-based backup services are a central presence in any strong cybercrime defense plan.
Join us, and find peace in a multilayered approach to data defense.
About the presenter:
Larry Walsh is one of the most recognizable figures in the IT channel and security communities, and is considered one of the more forward-thinking leaders in the industry. A seasoned journalist, analyst, author, and industry commentator, Walsh is also the founder of Channelnomics, which is a leading provider of IT channel news and analysis. A specialist in the development and execution of channel programs, disruptive sales models, and growth strategies for companies of all sizes, from start-ups to Fortune 500 organizations, Walsh has worked with a roster of diverse technology players, including Ingram Micro, Intel Security, SAP, and Verizon.
When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.
But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.
Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization. In this webinar, we will cover the:
- Criteria to evaluate these products
- Pros and cons of different vendors’ products
Is your network secure? Cloud-ready? As fast as it can be? Before you push “the next big thing” as part of your digital transformation, make sure you have a strong network foundation. Learn more in this webinar.
Find it With Multi-tiered Flash!
The all-flash data center was to solve all our problems. We’ve had all-flash arrays for ½ a decade. Where are the all-flash data centers? The problem is that performance and cost have been opposing forces in data storage systems for decades, especially in the initial all-flash era. Recent advancements in flash technology are finally breaking this tension and are enabling a new class of applications while driving costs down dramatically.
Hackers have expanded their craft to use SSL traffic as a means to obfuscate their attacks and rasomware download. Using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, attackers now cipher malicious payloads and command and control communication to evade your cyber defense.
Attend this live webcast to:
•Have an understanding of how adversaries are using encryption against us.
•Be aware of the common attacks that leverage SSL/TLS traffic to evade detection
•Be prepare for the key challenges when inspecting SSL Traffic
The way we work as an organization is no longer changing. It has already changed. People access content from all kinds of devices, across different locations. Business content is being created and viewed both inside and outside of your organization. But how do you effectively protect the way it's shared and managed while meeting your compliance needs? Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats.
Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.
· Key considerations for a cloud-first data governance strategy
· Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
· How to use SaaS technology to empower your users while effectively governing their content
As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
The global financial crisis in 2008 demonstrated the importance of adequate risk management. Since that time, new risk management standards have been published, including the international standard, ISO 31000 ‘Risk management – Principles and guidelines’.
The ISO 31000 Risk Management Standard provides guidance for the framework of risk management applicable for organizations of any size. ISO 31000 defines a risk management framework as a 'set of components that provide the foundations and organizational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organization. On this webinar our panel of experts will discuss ISO 31000 and how your organization can utilize the standard to implementing a structured approach to enterprise risk management, and map risk across the organization.
Key Points to be discussed:
- The principles and processes of risk management
- The requirements of ISO 31000
- Practical guidance on designing a suitable framework
- Practical advice on implementing enterprise risk management
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.
On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.
In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.