Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Definitive Incident Resolution Lifecycle for Modern Ops
    Definitive Incident Resolution Lifecycle for Modern Ops Dave Cliffe, Group Product Manager & Sean Higgins, Product Manager Recorded: Jun 23 2017 39 mins
    The stakes of managing complex infrastructure continue to increase alongside the ever-increasing costs of outages. And while many IT Operations teams are investing in monitoring and ITSM tools to detect issues, they are often forced to react to high volumes of event data without context and without any consistent, well-defined processes. This leads to costly operational inefficiencies, employee burnout, and extended customer downtime.

    Join us as we share newly PagerDuty product capabilities specifically designed for modern IT Operations teams. These capabilities take the chaos out of the incident resolution lifecycle — from assess, to resolve, to learn. Learn from the collective wisdom of thousands of the best IT operations teams how to make the unpredictable predictable, so you can spend more time on innovation.

    You’ll discover how to:

    •Optimize your ITSM toolsets by integrating people, data, and processes
    •Maximize cross-functional transparency and consistency
    •Prioritize incidents with well-defined rules
    •Automate troubleshooting and remediation
    •Ensure continuous learning and improvements across your team
  • MSPs: Give customers the cloud (without letting them float away).
    MSPs: Give customers the cloud (without letting them float away). Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jun 22 2017 37 mins
    The cloud has upended the way your customers want to adopt applications and underlying infrastructures. It’s important that your business stays ahead of this transformation. Your customers are looking to you as their trusted managed services advisor to “make it work.” Join us to learn best practices for transitioning your customers to the cloud.
  • Threat Intelligence: Actionable Insights to Global Attack Trends
    Threat Intelligence: Actionable Insights to Global Attack Trends Dean Suzuki, Technical Architect, Microsoft; Anton Sarkisov, Technical Solutions Professional, Microsoft Recorded: Jun 22 2017 32 mins
    The average cost of a data breach has risen to $4 million, with costs incurred for litigation, brand or reputation damage, lost sales—and in some cases—complete business closure.*

    Your organization can stay ahead of threats with Office 365 Threat Intelligence, which leverages the Microsoft Intelligent Security Graph to analyze billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from our Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. It provides information about malware families, including breach information with details down to the actual lines of code that are used for certain types of malware.

    Join this webinar to understand how your organization can become more secure through the powerful new features of Office 365 Threat Intelligence, including:

    - Interactive and intuitive tools to analyze prevalence and severity of threats in near real-time
    - Real-time and customizable threat alert notifications
    - Remediation capabilities for suspicious content


    * Source: The Ponemon Institute study
  • 10-Minutes to Cloud: How to Quickly Shift Big Data Processing
    10-Minutes to Cloud: How to Quickly Shift Big Data Processing Storage Switzerland, Avere Systems Recorded: Jun 22 2017 61 mins
    Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.

    In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
  • LTE, SD-WAN & Network Trends
    LTE, SD-WAN & Network Trends Ian Pennell, Chief Marketing Officer, Cradlepoint Recorded: Jun 22 2017 32 mins
    Today, businesses and organizations of all sizes — and from all industries — are challenged to extend their networks to more people, places, and things than ever. It’s also clear that legacy WANs — predominately based on wired, hardware-defined, and resource-intensive infrastructures — can’t keep pace with the rapidly changing needs of today’s lean and agile connected enterprise.

    Join Cradlepoint’s Ian Pennell on June 22 for a live webinar about trends in enterprise WAN architectures. Learn what Cradlepoint’s recent State of the Network 2017 report revealed about LTE adoption, software-defined WAN, and more.
  • CEO Series featuring Cohesity
    CEO Series featuring Cohesity Arun Taneja, Taneja Group; Mohit Aron, Cohesity Recorded: Jun 22 2017 46 mins
    Cohesity is one of the rising stars in the world of data management. They have flipped the data protection market on its ear. In this CEO Series webcast, Arun Taneja, Founder and Consulting Analyst of Taneja Group will interview Mohit Aron, CEO of Cohesity, to understand the concept of Hyperconverged Secondary Storage and why it matters to the industry. We will explore the advantages it provides for your data protection, test/dev, and data analytics workloads and how Cohesity is different from other solutions on the market. It is time to say goodbye to the old, staid methods of protecting data. The traditional methods simply don’t make sense in the new world of Big Data, Multi and Hybrid cloud and web-scale applications. Join the webcast for a whirlwind tour of new ideas and methods in this space.

    Speakers:
    Arun Taneja, Founder & Consulting Analyst, Taneja Group
    Mohit Aron, Founder & CEO, Cohesity
  • Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage
    Top Trends You Need to Know: Hyperconverged, SDS, Flash, and Cloud Storage George Teixeira - President, CEO & Co-founder & Sushant Rao - Senior Director of Product Marketing - DataCore Software Recorded: Jun 22 2017 59 mins
    Storage and infrastructure are going through a lot of changes. With technologies like Software-defined Storage as well as new infrastructure like Hyper-converged, there is a lot for IT admins to consider.

    Join us in this webinar where we’ll cover Software-defined Storage, Flash, Hyper-converged and Cloud Storage. You learn why these technologies and infrastructure models are or aren't being utilized by companies and the areas where they have not lived up to their promises.
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Protect Against Ransomware
    Protect Against Ransomware Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec Recorded: Jun 22 2017 56 mins
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • 5 Steps To The Perfect Storage Refresh
    5 Steps To The Perfect Storage Refresh Storage Switzerland, Virtual Instruments Recorded: Jun 21 2017 60 mins
    In this live webinar, Storage Switzerland and Virtual Instruments will give you a 5 step, independent process for moving through a storage refresh project.

    In this webinar you will learn about the five key steps to success:

    1. Storage Technology Evaluation: (flash, hybrid, OpenStack, Ceph, etc)
    2. Product Evaluation: Determine which storage system meets your requirements
    3. Storage Configuration Optimization: Determine optimal storage configuration
    4. Production Management: Determine how to assure performance and rapidly resolve the inevitable problems
    5. Change Impact Analysis: Determine how future changes will impact performance
  • What’s New in Caringo Swarm Object Storage
    What’s New in Caringo Swarm Object Storage Eric Dey, Product Manager Recorded: Jun 21 2017 52 mins
    Join Caringo Product Manager Eric Dey for a detailed look at the recent changes to Swarm Object Storage and a peek at the product roadmap. You will learn about recent updates to all aspects of Swarm such the foundational storage cluster, the user interface, and support for NFSv4 file sharing. Eric will also review the best-of-breed features that can help you reduce your storage TCO when implementing cloud storage for data protection, management, organization, and search at massive scale.
  • Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale
    Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale Eric Tran-Le, Global Chief Marketing Officer, Logtrust Recorded: Jun 21 2017 60 mins
    With more than 4.5 million digital devices in the field, delivering billions of data streams for TV and Video On-Demand services, this Fortune Global 500 Telco needed to improve Quality of Experience (QoE) and Quality of Service (QoS) – in real-time. Because every second counts and time-to-insight matters, managing the volume, variety and velocity of data streaming in real-time, and analyzing against historical data needed to be effortless, seamless and lightning fast. Using Logtrust’s Big Data-in-Motion technology, Tran-Le will showcase how the Telco giant analyzes in real-time billions of data for 20 million customers each day, and has reduced call volume, improved QoE/S, and saved millions of dollars a year.

    Key Takeaways:

    • Understanding current IoT data management challenges
    • Overcoming the technology and data scalability wall
    • Analyzing past and present “events of interest” across millions of IoT devices
    • Making sense out of chaos for time-sensitive IoT/Big Data applications for rapid time-to-insight and value

    Eric Tran-le is the Global Chief Marketing Officer at Logtrust, a Big Data-in-Motion as-a-Service solution provider for fast data, big data analytics. He has more than 20+ years’ experience in both product management and operational system engineering for managing private and native cloud applications at scale. Tran-Le is leading real-time threat hunting, security and IoT analytics initiatives at Logtrust. Formerly, Tran-Le was VP Oracle Management Cloud Services, VP Enterprise Cloud Management, and VP Product Management at Oracle, as well as Network Business Unit Manager at Microsoft.
  • Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network
    Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network Amnon Even Zohar Sr. Product Manager, Cloud Security Recorded: Jun 21 2017 45 mins
    For many security teams, the primary challenge of cloud adoption is how to gain the same level of visibility that exists for on-prem platforms.

    The Tufin Orchestration Suite has been a key solution for gaining central visibility and control across security vendors and platforms in the physical network and for reducing the complexities associated with a distributed environment.

    Join this session to learn how Tufin can provide you with the insight you need into your private and public cloud platforms. You’ll hear how you can leverage the Tufin console to manage security, connectivity, and compliance across your hybrid networks, and much more.
  • [VIDEO] The Influence of AI & Machine Learning on the Security Industry
    [VIDEO] The Influence of AI & Machine Learning on the Security Industry Josh Downs, BrightTALK & Giovanni Vigna, Professor & CTO, University of Santa Barbara & Lastline Recorded: Jun 21 2017 13 mins
    BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The difference between traditional AI & Machine Learning and the tools when applied to cyber security

    - Whether the buzz surrounding the tools is legitimate

    - How the human still needs to fit into the picture when using machine learning based security techniques

    - How AI & Machine learning can be used for threat hunting purposes

    - The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks

    - The value of security culture in an organisation

    - Trends in the techniques used in cyber warfare

    - The exponential growth of the IoT and what it means for securing the connected devices
  • Why Data Migration Hurts And How To Stop the Pain
    Why Data Migration Hurts And How To Stop the Pain Storage Switzerland, Primary Data Recorded: Jun 20 2017 61 mins
    Transitioning from Data Migration to Data Management

    In this webinar join, Storage Switzerland and Primary Data for a roundtable discussion on how automated data management can help you overcome the budgetary and technological challenges with a migration strategy and how you can implement data flow to eliminate the problem once and for all.
  • PCI Continuous Controls; Set It and Forget It
    PCI Continuous Controls; Set It and Forget It Jennifer Pesci-Anderson, Peter Ridgley, George Waller Recorded: Jun 20 2017 61 mins
    With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
  • Modernizing your SAP HANA Environment with All Flash Storage
    Modernizing your SAP HANA Environment with All Flash Storage Jeff Kato, Taneja Group; Stephen Carpenter, HPE Storage; Hasmig Samurkashian, HPE Storage Recorded: Jun 20 2017 59 mins
    As businesses become increasingly dependent on SAP HANA for real-time decisions, the demands of the infrastructure continue to grow. A more efficient and modern infrastructure is required to meet the demands of these global always on real-time environments. Storage plays a crucial role in maintaining high service levels and guarding against costly downtime. The right storage for SAP HANA is all flash.
    Join us as Jeff Kato, Senior Analyst and Consultant from Taneja Group describes why all flash is the best choice for HANA. Jeff will also provide a comparison of the leading all flash solutions in the market and illustrate where 3PAR All Flash leads the competition in critical storage efficiency metrics. Stephen Carpenter, Master Technologist from HPE’s Storage Business Unit, will share some key insights that distinguishes 3PAR StoreServ architecturally for HANA workloads. Additionally, Hasmig Samurkashian, Product Manager from the HPE Storage team will share actual customer deployment examples.

    Presenters:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group
    Stephen Carpenter, Master Technologist, Advanced Technology Center, HPE Storage
    Hasmig Samurkashian, WW Solutions Product Manager, HPE Storage
  • Securing the Internet of Everything: The war of the coffee machines
    Securing the Internet of Everything: The war of the coffee machines Peter Wood Recorded: Jun 20 2017 47 mins
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • [VIDEO] Dr Jessica Barker on the Human Side of Cyber Security
    [VIDEO] Dr Jessica Barker on the Human Side of Cyber Security Josh Downs, BrightTALK & Dr Jessica Barker Recorded: Jun 20 2017 9 mins
    BrightTALK caught up with Dr Jessica Barker for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry ransomware, what it means for the cyber threatscape and how to protect against similar attacks in the future

    - Improving security culture in the workplace for all your staff

    - AI & Machine Learning in the cyber security realm

    - The explosion of the IoT and how to protect all the devices on the network

    - Hacking back - the ethical standpoint
  • [VIDEO] Ransomware Lessons and Preparing for GDPR
    [VIDEO] Ransomware Lessons and Preparing for GDPR Chris Hodson, EMEA CISO, Zscaler Inc Recorded: Jun 19 2017 4 mins
    BrightTALK caught up with Zscaler's Chris Hodson for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry malware and the lessons to be learned from the outbreak

    - Steps that cyber security and data protection professionals need to take to be ready for GDPR in 2018

    - The development of cyber warfare and what it means for the security industry
  • Dissecting the OPM Breach: How AI and Threat Hunting Removed the APT
    Dissecting the OPM Breach: How AI and Threat Hunting Removed the APT Thomas Pace, Director of Consulting Services at Cylance® Recorded: Jun 15 2017 50 mins
    The 2015 data breach at the U.S. Office of Personnel Management (OPM) was a defining moment for the federal government, as it continues to reel from the colossal theft of personnel information affecting 21.5 million individuals. Join us for an insightful discussion to understand more about this massive cyberattack in our webinar, “Dissecting the OPM Breach. How Artificial Intelligence and Threat Hunting Removed the APT.”

    During the webinar Thomas Pace, Director of Consulting Services at Cylance®, will walk you through the course of events that led up to the OPM breach, expose the motivation behind the attack, and project its probable long-term impacts on how the U.S. government evaluates its IT and security strategy.

    Thomas will review the role Cylance played in responding to the breach by explaining the tools and processes that Cylance utilized to quickly detect and remove the malware from over 10,000 machines. You’ll also get an inside look at how the lessons learned can help your organization to better prepare against and prevent security vulnerabilities.

    Register for the webinar to learn more about:

    •The evolution of the threat landscape during the past two years
    •The value of having incident response processes and products in place before an incident occurs
    •The inefficiencies of legacy antivirus solutions
    •The benefits of artificial intelligence-based malware detection
  • WannaCry: The Cost of Unnecessary Exposure
    WannaCry: The Cost of Unnecessary Exposure Chris Vickery, Cyber Risk Analyst at UpGuard Recorded: Jun 15 2017 31 mins
    Global in scale, with across the board press coverage, the WannaCry ransomware attack has quickly gained a reputation as one of the worst cyber incidents in recent memory.

    Despite the scale, this attack relied on the same tried and true methods as other successful malware: find exposed ports on the Internet, and then exploit known software vulnerabilities.

    About our speaker: as a security researcher, Chris Vickery possesses a long track record of professional distinction and success discovering major data breaches and vulnerabilities across the cyber landscape.

    To learn more about Chris Vickery's work check out http://gizmodo.com/top-defense-contractor-left-sensitive-pentagon-files-on-1795669632
  • A More Intelligent Data Center Through the Use of Intelligent PDUs
    A More Intelligent Data Center Through the Use of Intelligent PDUs Jeff Fidacaro, Senior Analyst, Datacenters and Critical Infrastructure at 451, Justin Blumling, Sales Engineer at Geist Recorded: Jun 15 2017 46 mins
    Join 451 Research and Geist on June 15th, 2017 at 11am EDT (4pm BST) to discuss how data center and facility teams are finding value in the implementation of intelligent power distribution in the IT cabinet. The webinar will provide everyday use cases that will clearly define why intelligent power is worth deploying.

    In recent years, much has been said about the need for intelligent rack PDUs and most data center and Facility teams have made a conscious decision to either deploy them or wait until the market has matured beyond the initial offering. Many early adopters chose intelligent power solutions as a means to help future-proof their data center or just because it was the newest technology. Today, the number of data centers with intelligent rack PDUs is growing – and expectations are high for them to make significant impact.

    Over the 45-minute webinar 451 and Geist will explore what makes intelligent power truly useful and how they can create value quickly after install, utilizing the following agenda:
    -Jeff Fidacaro, Senior Analyst, Datacenters and Critical Infrastructure at 451, will discuss the need for power intelligence in the data center and how he envisions it will affect the industry.
    -Justin Blumling, Sales Engineer at Geist, will discuss how Geist’s customers are finding real value with their intelligent power implementations.
  • GDPR – being prepared and response-ready
    GDPR – being prepared and response-ready Stuart McKenzie, VP, Mandiant Consulting & Dan Wire, Sr. Director, Marketing Communications Recorded: Jun 15 2017 41 mins
    The new GDPR requires businesses to report data breaches within 72 hours – how will you manage the process?

    In a crisis, being organized and informed enough to provide an accurate notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with a mandatory incident response processes – identifying the cause, containing and remediating the vulnerability, and determining the extent of the damage, it makes the situation a lot more difficult and time sensitive.

    In this webinar we will tackle the importance of a having an effective and actionable incident response plan, and how to develop a crisis communications strategy that minimizes the impact of a data breach.
  • [VIDEO] WannaCry, GDPR and Protecting the Growing IoT
    [VIDEO] WannaCry, GDPR and Protecting the Growing IoT Josh Downs, Senior Community Manager, BrightTALK & Paul Edon, International Services Director, Tripwire Recorded: Jun 15 2017 10 mins
    BrightTALK caught up with Tripwire's Paul Edon for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry virus and what it means to the Ransomware landscape

    - The importance of a thorough backup

    - GDPR and the important steps that need to be taken

    - The explosive growth of the IoT and how to ensure that networks don't become vulnerable and get compromised

    - The ethical debate of hacking back