Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace
    7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Mar 28 2017 9:30 am UTC 45 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
    Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Charlie Hodges, Storage Switzerland Mar 28 2017 3:30 pm UTC 60 mins
    For most enterprises, optimizing your Windows fileserver means buying a new, bigger server with more capacity and better network connections. Or it means buying a dedicated Network Attached Storage (NAS) system. Then they feel they need to add new ransomware and data protection software. All of these "solutions" are expensive, involve a costly data migration and don't really increase IT efficiency. In this webinar, experts from Storage Switzerland and Caringo will teach you how data management can eliminate the need for additional Windows file servers, capacity and protection.
  • How to Automate Protection with Azure Cloud Backup and DRaaS
    How to Automate Protection with Azure Cloud Backup and DRaaS Dustin Sawicki & Jordan Pfingsten, Technical Solutions Professionals, Microsoft Mar 28 2017 6:00 pm UTC 60 mins
    Learn the ins and outs of Disaster Recovery as a Service with simple, automated protection and disaster recovery in the cloud.

    Your environment can be protected by automating the replication of the virtual machines based on policies that you set and control.

    Join this webcast to:
    - Learn how Site Recovery can protect Hyper-V, VMware, and physical servers, and how you can use Azure or your secondary datacenter as your recovery site
    - See how Site Recovery coordinates and manages the ongoing replication of data by integrating with existing technologies including System Center and SQL Server AlwaysOn
    - Understand the total picture of Disaster Recovery as a service (DRaaS)

    This webcast is part of our Think Tank Thursdays – DOE & DHS Dialogue webcast series. Sign up for this session, or the entire series today!
  • Getting Started with Hyperconverged
    Getting Started with Hyperconverged Sushant Rao, Senior Director of Product Marketing Mar 29 2017 2:00 pm UTC 60 mins
    If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability
    SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Mar 29 2017 3:00 pm UTC 45 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Identity & Access Management in Healthcare: Strengthening IT Security
    Identity & Access Management in Healthcare: Strengthening IT Security Craig Eidelman & Alfred Ojukwu, US Health and Life Sciences, Microsoft Corporation Mar 29 2017 6:00 pm UTC 60 mins
    Help strengthen security through effective identity management, monitoring, and protection

    Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.

    Join this webcast to learn how to:
    • Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
    • Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
    • Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service

    This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale?
    The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • Block The Risk Of Ransomware
    Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A Mar 30 2017 10:00 am UTC 30 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Stroke of genius; The only known way to fully protect against keystroke loggers
    Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • FireEye in 2017
    FireEye in 2017 Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • Building a truly hybrid cloud with Google Cloud
    Building a truly hybrid cloud with Google Cloud James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management Mar 30 2017 5:00 pm UTC 60 mins
    Join James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management, as they explain how to address the challenges of operating hybrid environments that span Google and on-premises services, showing how active data replication that guarantees consistency can work at scale. Register now to learn how to provide local speed of access to data across all environments, allowing hybrid solutions to leverage the power of Google Cloud.
  • Businesses Held Hostage: Are You Ready for a Ransomware Attack?
    Businesses Held Hostage: Are You Ready for a Ransomware Attack? Scott Crawford, Research Director at 451 Research & Matthew Gardiner, Senior Product Marketing Manager at Mimecast Mar 30 2017 5:00 pm UTC 60 mins
    No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.

    How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:

    -The impact of ransomware: Just how serious a threat is it?
    -How could ransomware get into your organization?
    -Why is ransomware happening more now than ever before?
    -How can you best defend against a ransomware attack…before it locks up your critical information assets?
  • Security: It's Not a Privilege, It's a Right
    Security: It's Not a Privilege, It's a Right Alex Shteynberg, Technology Architect, Microsoft Corporation Mar 30 2017 6:00 pm UTC 60 mins
    Control and manage your data with the confidence. Microsoft Office 365 helps keep your data safe, maintaining privacy, and meeting compliance requirements at all times.

    Join this session to learn:
    - How Office 365 gives you the control to log and manage data access workflows directly with datacenter engineers
    - Security, compliance, and privacy approach to help ensure that your data is protected
    - Leading global compliance standards, such as HIPAA, FISMA, and ISO 27001
    - Best practices in data center design, data loss prevention, zero-day advanced threat protection and threat intelligence
  • Making the Case for Lithium-Ion Batteries in the Data Center
    Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • Podcast: What does Converged, Hyperconverged, Hybrid Cloud, etc.. Really Mean?
    Podcast: What does Converged, Hyperconverged, Hybrid Cloud, etc.. Really Mean? George Crump, Storage Switzerland Mar 31 2017 4:45 pm UTC 60 mins
    Storage Switzerland will tackle one of the biggest challenges facing IT professionals today during a special, live podcast. We will explain what vendors mean when they use terms like converged, hyperconverged, hybrid cloud, instant recovery, continuous data protection, the list goes on. Its confusing because many vendors use the same terms to describe different capabilities or technologies. Join to Storage Switzerland and we’ll sort the whole thing out. You, the listener, get to drive the conversation. You'll vote for the terms you want to discuss and we'll talk about them!
  • How To Actually Leverage The New World of Low-Cost Commodity Storage
    How To Actually Leverage The New World of Low-Cost Commodity Storage Peter McCallum & Gavin McLaughlin Apr 4 2017 2:30 pm UTC 30 mins
    Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
  • There Will Be Attacks - Prepare Your Email Defenses Today
    There Will Be Attacks - Prepare Your Email Defenses Today Steven Malone, Director of Product Management - Mimecast Apr 4 2017 5:00 pm UTC 60 mins
    Email threats are evolving. Today, a whopping 91% of cyberattacks start with an email. Join this session and learn about latest trends in email attacks and how to protect against them.

    - Discover how your email could be hacked by any number of threats
    - Examine the damaging impact attacks have on businesses
    - Learn why your employees could be the weakest link in email security
  • Zero breach Tolerance: Earliest protection across the attack lifecycle
    Zero breach Tolerance: Earliest protection across the attack lifecycle Adrian Sanabria, Senior Analyst at 451 Research, & Mike Nichols, Director of Products at Endgame Apr 4 2017 5:00 pm UTC 60 mins
    Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.

    Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest protection can change the shape and outcome of an enterprise security program.
    This talk will outline strategies for:
    •Prioritizing the alerts and events that really matter
    •Identifying parts of the investigation workflow that can be automated
    •Building a detection methodology that creates confidence and continuously improves defenses
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Colin Whittaker, Moderator; Vibhav Agarwal, MetricStream, Mark Bower, HPE Security - Data Security, and Brian Kelley, IDERA. Apr 4 2017 5:00 pm UTC 60 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.

    On this webinar our panel of experts will discuss the key points to streamline your data-security program and meet regulatory change.
  • Azure Weekly Webcast: Disaster Recovery & Cloud Backup
    Azure Weekly Webcast: Disaster Recovery & Cloud Backup Mack Ratcliffe, Christian Booth & Allan Inayat Allana Apr 5 2017 6:00 pm UTC 60 mins
    Here's a technical deep dive on Disaster Recovery and cloud backup when it counts.

    Get ready for a technical deep dive into common customer scenarios enabled by Azure and Operations Management Suite (OMS).

    Join this webcast to:

    - Learn about orchestrated replication of on-premises VMs and physical servers
    - See how to test failover and DR drills without impacting production
    - Learn how to integrate Microsoft and 3rd party backup solutions with Azure for long-term backup

    This webcast is part of our Explore weekly hot topics on Microsoft Azure webcast series. Sign up for this session, or the entire series today!
  • Everything You Need To Know About Protecting OpenStack Workloads
    Everything You Need To Know About Protecting OpenStack Workloads Chris Dyer, Senior Systems Engineer Apr 6 2017 9:00 am UTC 60 mins
    As virtualization evolves, the next generation of private cloud is looming on the horizon. Now is the time to look at how you can reduce the cost of cloud by leveraging Open Source technology, to provide an elastic web-scale environment and develop a new generation of applications.

    Join Commvault’s Senior Systems Engineer, Chris Dyer, as he discusses:

    • The key design and implementation considerations for OpenStack private cloud environments

    • How to ensure you have an effective protection and recovery strategy of OpenStack instances

    • The impact of choices around storage and compute architecture of the OpenStack Cloud

    • Best practices for effective management of both traditional and next generation workloads
  • Trends Behind Today's Breaches & Cyber Attacks in EMEA
    Trends Behind Today's Breaches & Cyber Attacks in EMEA Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Apr 6 2017 12:30 pm UTC 45 mins
    Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
    Register today and get insights into:
    •New phishing trends breaching today’s companies
    •Changes in modern attack telemetry and methodology
    •Intelligence-led insights into emerging global threats
    •Modern defensive strategies to better protect your organisation
    •How GDPR is changing business in EMEA
  • Third Party Risk: Gaining certainty amid a web of global relationships
    Third Party Risk: Gaining certainty amid a web of global relationships Michael Rasmussen, GRC Analyst at GRC 20/20 and SureCloud's COO, Nick Rafferty Apr 6 2017 2:00 pm UTC 60 mins
    In today’s interconnected world, organizations struggle to adequately govern risk in third party business relationships. Over half of the organization’s insiders are no longer traditional employees. Insiders now include suppliers, vendors, outsourcers, service providers, contractors, subcontractors, consultants, temporary workers, agents, brokers, dealers, intermediaries, and more. Third party problems are the organization’s problems that directly impact brand, reputation, compliance, strategy, and risk to the organization.

    Join Michael Rasmussen, The GRC Pundit of GRC 20/20, and Nick Rafferty, SureCloud COO, to get an expert view of the challenges companies face and how to gain certainty amid an uncertain web of complex, global relationships.

    In this webinar you will learn:

    Why fragmented approaches to third party governance are doomed to fail

    How inadequate resources can’t keep up with growing risk and regulations

    How document, spreadsheet and email-centric approaches lack current-state analyses and audit trails

    Amid a challenging environment, what to do today by defining a strategy and adopting a single-version-of-the-truth software solution.

    How SureCloud's unique GRC Platform and its Third Party Risk Manager Application can strengthen your assessment process

    Agenda includes plenty of time to address your questions.

    Time: 10 am Central U.S. time (8 am Pacific, 11 am Eastern)
  • How to Replace Your Legacy Antivirus Solution
    How to Replace Your Legacy Antivirus Solution Dan Larson, Sr. Director of Technical Marketing, Apr 6 2017 3:00 pm UTC 60 mins
    Legacy AV products are failing to stop modern threats. That’s why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterday’s AV solutions. Defending against today’s sophisticated polymorphic threats requires new weapons and that’s just what the CrowdStrike Falcon Platform delivers.

    The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service – all cloud-delivered with a single lightweight agent.

    In this CrowdCast, Dan Larson, Sr. Director of Technical Marketing, will discuss:

    • The typical challenges with legacy antivirus, from efficacy to complexity & bulky architecture

    • How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning

    • How Falcon’s lightweight sensor and cloud architecture dramatically reduces operational burden

    • How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon

    • Why CrowdStrike was positioned as a “Visionary” in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement