Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Uniting a global development workforce with Juniper Uniting a global development workforce with Juniper Dave Uebele, Juniper Networks, SCM Engineer and Russ Hill, WANdisco, SCM Specialist Mar 23 2017 5:00 pm UTC 60 mins
    Join us to learn how Juniper Networks relies on WANdisco to unite a globally distributed development workforce within Subversion, delivering results such as:
    - A 24/7 Continuous Integration environment with zero Subversion downtime
    - Increased productivity and maximized valuable engineering time and efficiency
    - Eliminated the effects of network failures and the dependency on legacy backup procedures
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Mar 23 2017 5:00 pm UTC 60 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Mar 23 2017 6:00 pm UTC 45 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Mar 23 2017 6:00 pm UTC 75 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • BCI Horizon Scan 2017 BCI Horizon Scan 2017 Patrick Alcantara (BCI) & John DiMaria (BSI) Mar 27 2017 1:00 pm UTC 60 mins
    What are the threats facing your organization? The Business Continuity Institute's annual Horizon Scan Report, in collaboration with BSI, outlines what the main threats are according to business continuity and resilience professionals worldwide, segmented by region, sector and size of organization. Read the report, and if you have questions or want a better understanding of what it means, then makes sure you tune into this webinar.
  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Mar 28 2017 9:30 am UTC 45 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Charlie Hodges, Storage Switzerland Mar 28 2017 3:30 pm UTC 60 mins
    For most enterprises, optimizing your Windows fileserver means buying a new, bigger server with more capacity and better network connections. Or it means buying a dedicated Network Attached Storage (NAS) system. Then they feel they need to add new ransomware and data protection software. All of these "solutions" are expensive, involve a costly data migration and don't really increase IT efficiency. In this webinar, experts from Storage Switzerland and Caringo will teach you how data management can eliminate the need for additional Windows file servers, capacity and protection.
  • How to Automate Protection with Azure Cloud Backup and DRaaS How to Automate Protection with Azure Cloud Backup and DRaaS Dustin Sawicki & Jordan Pfingsten, Technical Solutions Professionals, Microsoft Mar 28 2017 6:00 pm UTC 60 mins
    Learn the ins and outs of Disaster Recovery as a Service with simple, automated protection and disaster recovery in the cloud.

    Your environment can be protected by automating the replication of the virtual machines based on policies that you set and control.

    Join this webcast to:
    - Learn how Site Recovery can protect Hyper-V, VMware, and physical servers, and how you can use Azure or your secondary datacenter as your recovery site
    - See how Site Recovery coordinates and manages the ongoing replication of data by integrating with existing technologies including System Center and SQL Server AlwaysOn
    - Understand the total picture of Disaster Recovery as a service (DRaaS)

    This webcast is part of our Think Tank Thursdays – DOE & DHS Dialogue webcast series. Sign up for this session, or the entire series today!
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Mar 29 2017 3:00 pm UTC 45 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Identity & Access Management in Healthcare: Strengthening IT Security Identity & Access Management in Healthcare: Strengthening IT Security Craig Eidelman & Alfred Ojukwu, US Health and Life Sciences, Microsoft Corporation Mar 29 2017 6:00 pm UTC 60 mins
    Help strengthen security through effective identity management, monitoring, and protection

    Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.

    Join this webcast to learn how to:
    •Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
    •Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
    •Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service

    This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • Everything You Need To Know About Protecting OpenStack Workloads Everything You Need To Know About Protecting OpenStack Workloads Chris Dyer, Senior Systems Engineer Mar 30 2017 9:00 am UTC 60 mins
    As virtualization evolves, the next generation of private cloud is looming on the horizon. Now is the time to look at how you can reduce the cost of cloud by leveraging Open Source technology, to provide an elastic web-scale environment and develop a new generation of applications.

    Join Commvault’s Senior Systems Engineer, Chris Dyer, as he discusses:

    • The key design and implementation considerations for OpenStack private cloud environments

    • How to ensure you have an effective protection and recovery strategy of OpenStack instances

    • The impact of choices around storage and compute architecture of the OpenStack Cloud

    • Best practices for effective management of both traditional and next generation workloads
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A Mar 30 2017 10:00 am UTC 30 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • FireEye in 2017 FireEye in 2017 Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • Stroke of genius; The only known way to fully protect against keystroke loggers Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • Building a truly hybrid cloud with Google Cloud Building a truly hybrid cloud with Google Cloud James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management Mar 30 2017 5:00 pm UTC 60 mins
    Join James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management, as they explain how to address the challenges of operating hybrid environments that span Google and on-premises services, showing how active data replication that guarantees consistency can work at scale. Register now to learn how to provide local speed of access to data across all environments, allowing hybrid solutions to leverage the power of Google Cloud.
  • Businesses Held Hostage: Are You Ready for a Ransomware Attack? Businesses Held Hostage: Are You Ready for a Ransomware Attack? Scott Crawford, Research Director at 451 Research & Matthew Gardiner, Senior Product Marketing Manager at Mimecast Mar 30 2017 5:00 pm UTC 60 mins
    No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.

    How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:

    -The impact of ransomware: Just how serious a threat is it?
    -How could ransomware get into your organization?
    -Why is ransomware happening more now than ever before?
    -How can you best defend against a ransomware attack…before it locks up your critical information assets?
  • Security: It's Not a Privilege, It's a Right Security: It's Not a Privilege, It's a Right Alex Shteynberg, Technology Architect, Microsoft Corporation Mar 30 2017 6:00 pm UTC 60 mins
    It's your data: You own it. You control it.

    Microsoft Office 365 gives you the control to log and manage data access workflows directly with datacenter engineers. Security, compliance, and privacy are built-in to Office 365 to help ensure that your company data is protected. Office 365 meets leading global compliance standards, such as HIPAA, FISMA, and ISO 27001, and it delivers industry-leading best practices in data center design, data loss prevention, Zero day advanced threat protection and Threat Intelligence.

    Join us to learn why 4 out of 5 Fortune 500 companies have come to trust Microsoft’s Office 365 service.
  • Making the Case for Lithium-Ion Batteries in the Data Center Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • How To Actually Leverage The New World of Low-Cost Commodity Storage How To Actually Leverage The New World of Low-Cost Commodity Storage Peter McCallum & Gavin McLaughlin Apr 4 2017 2:30 pm UTC 30 mins
    Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
  • There Will Be Attacks - Prepare Your Email Defenses Today There Will Be Attacks - Prepare Your Email Defenses Today Steven Malone, Director of Product Management - Mimecast Apr 4 2017 5:00 pm UTC 60 mins
    Email threats are evolving. Today, a whopping 91% of cyberattacks start with an email. Join this session and learn about latest trends in email attacks and how to protect against them.

    - Discover how your email could be hacked by any number of threats
    - Examine the damaging impact attacks have on businesses
    - Learn why your employees could be the weakest link in email security
  • Zero breach Tolerance: Earliest protection across the attack lifecycle Zero breach Tolerance: Earliest protection across the attack lifecycle Adrian Sanabria, Senior Analyst at 451 Research, & Mike Nichols, Director of Products at Endgame Apr 4 2017 5:00 pm UTC 60 mins
    Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.

    Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest protection can change the shape and outcome of an enterprise security program.
    This talk will outline strategies for:
    •Prioritizing the alerts and events that really matter
    •Identifying parts of the investigation workflow that can be automated
    •Building a detection methodology that creates confidence and continuously improves defenses
  • Streamlining Your Data-Security Program to Meet Regulatory Change Streamlining Your Data-Security Program to Meet Regulatory Change Colin Whittaker, Moderator; Vibhav Agarwal, MetricStream, Mark Bower, HPE Security - Data Security, and Brian Kelley, IDERA. Apr 4 2017 5:00 pm UTC 60 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.

    On this webinar our panel of experts will discuss the key points to streamline your data-security program and meet regulatory change.
  • Azure Weekly Webcast: Disaster Recovery & Cloud Backup Azure Weekly Webcast: Disaster Recovery & Cloud Backup Mack Ratcliffe, Christian Booth & Allan Inayat Allana Apr 5 2017 6:00 pm UTC 60 mins
    Here's a technical deep dive on Disaster Recovery and cloud backup when it counts.

    Get ready for a technical deep dive into common customer scenarios enabled by Azure and Operations Management Suite (OMS).

    Join this webcast to:

    - Learn about orchestrated replication of on-premises VMs and physical servers
    - See how to test failover and DR drills without impacting production
    - Learn how to integrate Microsoft and 3rd party backup solutions with Azure for long-term backup

    This webcast is part of our Explore weekly hot topics on Microsoft Azure webcast series. Sign up for this session, or the entire series today!