The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.
Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.
Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.
Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
- Current environment and challenges in building hybrid infrastructures that support traditional and object storage
- Five not-to-be-ignored trends ripe for adoption in 2018
- How compute and storage can mix in the new cloud-enabled world
As digitalization and the Internet of Things (IoT) become commonplace, big data has the potential to transform business processes and reshape entire industries. But antiquated and expensive data storage solutions stand in the way.
A new generation of cloud storage has arrived, bringing breakthrough pricing, performance and simplicity. Cloud Storage 2.0 delivers storage as an inexpensive and plentiful utility, so you no longer have to make difficult decisions about which data to collect, where to store it and how long to retain it. This talk takes a look into how you can cost-effectively store any type of data, for any purpose, for any length of time. Join us to learn about the next great global utility, Cloud Storage 2.0.
-The next biggest cloud storage trends and technologies that are shaping the industry
-How to embrace the era of digital transformation and IoT without breaking the bank
-Best practices for storing, analyzing and utilizing big data
As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?
During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.
You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
The EU General Data Protection Regulation (GDPR) is the most important new regulation involving individuals’ information to emerge over the last few decades: it provides the foundation for how multi-national organisations and government agencies must protect sensitive customer information, and also how they can derive value from enterprise data.
MAKE COMPLIANCE GOOD FOR YOUR BUSINESS
In order to prepare for the May 2018 deadline, organisations must interpret the GDPR requirements, map processes and technology to them to ensure compliance, and quickly identify the correct information to be tightly managed and protected. Information insight is the key to solving these challenges of large volumes of data and high levels of complexity. The risks are high - lost customer confidence, security breaches, fines, sanctions, and potential lawsuits.
DO YOU KNOW WHERE YOUR DATA AND STORAGE SHOULD BE?
Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with unprecedented elasticity, scale, resiliency and availability, on a consumption based economic model. However, the choice between public cloud and on-premises infrastructure is not a binary one.
Register to attend our webinar on Tuesday 17th October at 11:00 GMT to discover how HPE Pointnext GDPR Consulting services can provide the expertise and support to de-risk your journey to compliance. Plus learn how Commvault Hyperconverged Architecture can help you to overcome the complexities of GDPR through the consolidation of all roles performed by discrete servers in the traditional data protection architecture into a single software defined stack.
Are you tired of fork-lift upgrades every time you need to add more capacity or performance to your deduplication appliance? Caught in the expensive cycle of repurchasing software and hardware every time you upgrade your backup and recovery system? If this sounds like your environment, you may be running your backup and recovery on a legacy, scale-up infrastructure.
Your infrastructure is holding you and your organization back. What you need is a new solution that meets your business challenges today, and creates the foundation for future growth and greater services.
Learn how applying a scale-out infrastructure can deliver modern data protection and management;
•Eliminate complexity with simplicity and ease of use
•Deliver greater flexibility with cloud-like services
•Increase availability and resiliency
•Minimize operating expenditures with automation and self-service
•Optimize capital expenditures by utilizing x86 technology
Join us as we examine the 5 benefits of scale-out infrastructure for data protection and how it positions your organization for future success.
This is the first in a two-part series on governance, risk and automation.
In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.
Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
DRaaS is entering its second phase. No longer is it good enough to simply be able to recover applications in the cloud. Next generation DRaaS has to be able to backup faster, recover faster, include ransomware protection and be able to offer on-premises DRaaS, all while being very secure.
In this live webinar we will introduce you to “DRaaS - The Next Generation,” and show you the key elements a DRaaS solution must deliver in order to meet this challenge.
Chief Information Security Officer Reveals How With Arbor Spectrum.
Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.
Join us to hear:
- NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
- In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk.
Join CrowdStrike security experts for a webcast, "Understanding Fileless Attacks and How to Stop Them," where you'll learn why so many of today's adversaries are abandoning yesterday's malware and relying on an evolving array of fileless exploits. You'll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. You'll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks.
Join this webcast to learn:
-How a fileless attack is executed — see how an end-to-end attack unfolds -Why fileless attacks are having so much success evading legacy security solutions
-How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
As organization’s storage needs grow and expand geographies, they find that they do not have a comprehensive plan to rapidly recover from a natural disaster, cyberattack, or equipment failure. To make matters worse, companies that rely on traditional backup and recovery solutions are simply not able to keep up with the increasing data needs of today’s enterprise. These systems are overly complex, costly, and don’t scale well with the business.
A comprehensive answer to these data growth challenges is merging cloud backup with disaster recovery (DR). A unified solution that is cloud-native provides unlimited scalability, instant availability, long-term retention, and minimizes the impact on the business in case of a disaster. This seamless manageability and visibility of data across a range of locations and applications is crucial for long-term success.
Join Senior Analyst of Storage Technologies, Steven Hill of 451 Research and Druva’s Senior Product Marketing Manager, Seyi Verma, where they’ll highlight:
- The growing need for updating and improving disaster recovery and data backup
- What factors to consider when building a BCDR plan
- What to beware of when evaluating legacy and hybrid models for backup and DR
- How cloud‐native backup and DR provides immediate failover to minimize downtime and impact
- And more!
Ransomware has become a major concern for organizations around the globe. The U.S. Department of Justice reports that an average of 4,000 ransomware attacks occur daily. These ransomware attacks aren’t just targeting laptops and other end-user devices either. Servers are equally at risk of ransomware attacks as well. There’s good news though - your backup data can be the difference between being held hostage and easily recovering from an attack.
Join security experts, Andrew Nielsen, Chief Trust Officer from Druva and Jim Reavis, CEO of Cloud Security Alliance to learn:
- The top vulnerabilities exploited for endpoints and servers
- Proactive strategies to protect data before a malicious attack occurs
- How to avoid paying the ransom by leveraging your backup data
Does your storage disaster recovery plan or strategy need a tune-up? Would you like to leverage public cloud to augment your data protection strategy? Caringo Swarm Hybrid Cloud for Microsoft Azure makes it simple for organizations to move data to the Azure cloud securely and quickly. Caringo Product Manager Eric Dey will talk about Caringo's latest product feature and explain how organizations can get data protection and additional benefits by using a hybrid cloud strategy.
Join Storage Switzerland and HubStor for our live webinar, “Cloud Archiving - Amazon Glacier, Microsoft Azure or Something Else?” In this webinar you will learn the requirements of archiving in the cloud, how Amazon and Microsoft meet those requirements and what software needs to be added to complete the picture.
In over 400 interviews with IT decision makers, the Taneja Group learned that an increasing number of organizations want not just to store files in the cloud, but to easily move those files between the cloud and on-premise.
In response, the Taneja Group has identified an emerging set of storage products they call “multi-cloud primary storage” that can span multiple environments. One of the vendors at the forefront of this trend is Qumulo, whose “universal-scale storage” product, Qumulo File Fabric (QF2), allows cloud instances and computing nodes on standard hardware to work together to form a single, unified file fabric.
Join Taneja Group Senior Analysts Jeff Kato and Jeff Byrne as they discusses the research behind the Taneja Group’s Multi-Cloud Primary Storage report. They will be joined by Qumulo employee Justin Mahood, who will describe why the “universal-scale” of QF2 is the best way to store files in the cloud and on-premise.
General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.
Managing policies, procedures and guidelines in a cost effective and compliant way is becoming more and more difficult using office tools like word processors, spreadsheets and email. The process of drafting, approving, updating and creating awareness around these compliance documents as well as the complexity of keeping up with regulatory and contractual compliance requirements using these tools quickly creates chaos. To compound the problem, these office tools make internal audits more time consuming and costly and make regulatory audits and legal challenges difficult to defend.
This is why organizations large and small are turning to automated compliance and policy management to manage their compliance programs. In this webinar, LockPath’s Sam Abadir will discuss the latest trends and challenges in policy management and compliance, and how implementing GRC processes can bring order to all this chaos.
Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
Registrati al webinar per saperne di più!
Le Règlement Général sur la Protection des Données (RGPD) est le changement le plus important jamais apporté à la loi sur la protection des données en trois décennies. Il entrera en vigueur le 25 mai 2018 et s’appliquera de la même manière dans les 28 États membres qui connaissent aujourd’hui une forte disparité des régimes de protection des données.
Le RGPD va renforcer les exigences concernant la gestion des données personnelles : consentement à l’acquisition, rétention, sécurité, stockage et protection. Découvrez le RGPD dans les grandes lignes pour comprendre l’impact de ce nouveau règlement sur votre organisation. Quantum vous dévoilera également les bonnes pratiques à mettre en place en matière de stockage des données pour être conformes au RGPD qui entre en vigueur dès 2018 !
Data breaches make the headlines daily, and as a result, cyberattacks concern all business owners. Could I be next? And how can I prepare? As technology continues to evolve, so do the ever-present threats associated with these types of risks. You’re likely already taking steps towards protecting your organization from the possibility of a breach or cyberattack, but have you planned what you will do to continue operations and minimize damages in the event that your environment is compromised?
Join LockPath and KirkpatrickPrice as we discuss incident response best practices. In this 60-minute webinar, attendees will discover the six stages of a best-practice incident response program, lessons learned from high-profile breaches, and how the Keylight Platform can effectively implement this strategy.
Interested in hearing the top trends we’ve observed at Microsoft’ Ignite 2017?
We have you covered. Join us as we recap the top trends and highlights of the news and interesting tidbits from Microsoft Ignite. It’s the next best thing to being there! If you were able to attend the event, this is a good chance to compare notes with us.
Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.
During the webinar we will cover:
How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?
Who should attend.
People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.
Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.
Why you should attend.
- Reflect on how you got where you are as an organisation;
- What factors were critical to your success? What factors were the basis for your success?
- What held you back – prevented you from being even more successful?
- What could you have done differently
Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).
Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.
How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.
IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.
Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.
Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM.
Cloud and flash storage are still leading significant changes in today's data storage industry. With the amount of data and number of devices that organizations are experiencing, implementing a strategy that employs “cheap and deep” storage behind high performance flash is a must for 2018.
Join Kieran Maloney, Product Marketing Manager at Quantum as he discusses how today’s archive solutions complement flash storage by providing low cost, long-term data preservation and protection while maintaining data visibility and access.
You will learn:
- How companies deploy storage tiers to optimize performance, data preservation and cost
- A partner use case with Pure Storage that delivers a comprehensive tiered storage solution for large unstructured data sets
- Trends and predictions for the flash storage market in 2018
How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.
In this session we'll provide:
-Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
-How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
-Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.
PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
Wer sich mit der Frage beschäftigt, wie man ein effektives und effizientes Security Operations Center (SOC) aufbauen sollte, steht vor einer großen Herausforderung, denn neben den Investitionen der physischen Sicherheitsmaßnahmen, Hard- und Software ist besonderes Augenmerk auf die Analysten zu setzen, die hochkonzentriert – einem Mitarbeiter der Flugüberwachung ähnlich – das Geschehen beobachten und auf den „Ernstfall“ eines Angriffs vorbereitet sind.
Diese Mitarbeiter befinden sich persönlich als auch technisch kontinuierlich im "Alarmzustand", denn jede Anomalie ist für geübte IT-Sicherheitsspezialisten bereits eine potenzielle Cyberbedrohung, die es zu analysieren und abzuwehren gilt. Damit ein SOC wirksam sein kann, bedarf es eines soliden Fundaments aus:
• Schlanke Prozessabläufe und eindeutig festgelegte und vernünftige Befugnisse der Beteiligten
• Hocheffiziente und moderne Technologien und Technologiepartnerschaften mit eingespielten Eskalationsstufen
• Hochmotivierte und vertrauensvolle Mitarbeiter und vertraute Partner, die in Engpässen das eigene SOC Team unterstützen können
In diesem Seminar zum Thema SOC, wird der SOC grundlegend erläutert und diese Grundsäulen eines schlanken SOC beschrieben. Außerdem gibt das Webinar einen Ausblick darauf, was auf die Unternehmen zukommt und welche Herausforderungen die einzelnen (n>1) Phasen begleiten und welche Services man outsourcen kann.
This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.
Part 1 - Becoming The Brand & Selling YOU
You're not just selling your product anymore, you're selling YOU. More and more of your prospects are looking at your social media profiles and this will influence buying decisions. Find out the best personal branding tips and how to build a profile that will generate opportunities, not scare them away.
Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.
This webinar explains:
· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise
· The key requirements for establishing a cyber threat intelligence function
· Basic cyber threat intelligence workflows
· Resource and training requirements to support a Cyber Threat intelligence function
Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.
Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.
During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.
2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networks including the SDN and public cloud introduce new risks to organizations.
Join this webinar to learn how to avoid the headlines by making security policy continuously enforceable. Having served in network security roles at Wells Fargo, General Dynamics, St. Jude Medical, and the Army National Guard, Tufin's Senior Solutions Engineer, Christofer Sears, CISM, will share his insight garnered throughout 10 years of experience.
Key topics include how to:
• Develop and deploy an enforceable security policy
• Mitigate the inherent risk of DevOps’ CI/CD agility
• Contain malware outbreaks like WannaCry
• Effectively design implementation
• Create time for proactive security projects
Still running expensive legacy backups? Caringo Product Manager Glen Olsen explains how modern storage technology incorporates advanced data protection allowing businesses to reclaim wasted backup budget and resources.
Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:
- Is there command and control activity?
- Did lateral movement occur?
- What other systems were accessed?
- Et cetera…
This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.
After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.
Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.
In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
Join us to learn how you can achieve continuous replication at scale between multiple Big Data and Cloud environments with guaranteed data consistency and continuous availability.
Pranav Rastogi, Microsoft Program Manager, and Paul Scott-Murphy, WANdisco VP of Product Marketing, will discuss how Microsoft customers can achieve a truly hybrid architecture for on-demand data analytics and offsite disaster recovery via a single-click installation from the Azure marketplace.
During this webinar you will also learn:
- How to meet stringent data availability and compliance requirements whilst seamlessly moving production data at petabyte scale from on-premises Big Data deployments to MS Azure.
- How to save money and achieve greater ROI with no need for dedicated hardware or storage systems.
- How to enable data to span HDFS, object storage, and other systems.
- How to select subsets of content for replication with fine-grained control over where data resides.
- How to recover from intermittent network or system failures automatically.
Register now to learn how to get the most value from your data while also meeting strict service level agreements.
As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.
In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.
2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.
Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.
Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.
Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest technology disruptor to traditional backup: Application-Centric Data Management.
Developers, QA staff, database administrators and cloud service owners are demanding timely access to data and the ability to get copies without IT involvement. Thus, self-service and app-centric data management is now offered by leading data protection and storage vendors. Hear from three top vendors in this space as we unpack and explore how new capabilities, such as REST APIs, policy-based automation, role-based access control and cloud support combine to enable a simple, compliant and flexible self-service data management experience.
Many companies take advantage of virtual servers for the dual benefits of cost effectiveness and scalability. But when the time comes to move data to a virtual server—or between virtual environments—a lack of preparation can mean extra costs, or worse, lost data.
This webinar will cover best practices around managing data in a virtual environment, and offer key watchouts for those who are newer to virtual servers. We’ll also offer pro tips and expert advice for data migration involving virtual environments, with ways to keep the operation as simple as possible and avoid common pitfalls. And we’ll even show you how you can automate most of the process.
Join us and become a virtual expert on virtual environments and migrations.
When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.
These features include:
- Overlay capability over MPLS, Broadband and LTE
- Unified and centralized management of the infrastructure
- Network segmentation with per-segment topologies
- Predictable Application SLA with centralized policies and real-time traffic steering
- Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
- Robust zero-trust WAN security
When you hear the term Social Engineering, the first thing that pops into your mind will invariably be phishing emails. However, there are many aspects of social engineering that are, more often than not, completely overlooked. Identity impersonation, physical penetration, and various other means can just as easily be employed to breach company after company. While the ability to detect malware and other types of breaches get better by the day, these types of attacks are rarely discovered quickly, if at all. Enterprise level security accounts for many of these, but rarely all. Join the indepth discussion of how Social Engineering can be dangerous for an organization and what can be done about.
Previously, Mr. McCrory was one of the founding employees of PhishMe, Inc. where he developed and ran many social engineering engagements as a Managed Services Consultant, teaching management of various Fortune 500 and Global 100 comapnies how to deal with phishing and on occassion, various other forms of social engineering attacks.
Mr. McCrory is also currently working on his first book and working as an independent consultant.
A year ago, we predicted 2017 would bring difficult, messy hybrid cloud transformation, that “hybrid cloud” would become synonymous with “multi-cloud,” and that IoT and machine data would raise new questions related to security and data access.
Our crystal ball was crystal clear last year, and we’re breaking it out again to look forward to 2018.
In this webcast, we’ll cover the data storage trends most likely to make news in the New Year, including cloud vendors with on-prem-like strategies, security and the ransomware challenge, consolidation of secondary storage players and the comeback of captive cloud.
Cyber threats and natural disasters are increasing in frequency and severity. RTO’s and RPO’s are becoming more strict and difficult to achieve as the volume of business critical data grows. Having traditional backup alone is no longer an adequate data protection strategy. IT professionals must put a range of recoverability options in place that aligns costs and technology with application and data criticality. Join us for a complimentary webinar where we will discuss why and how a hybrid approach to data protection can help you reach IT Zen.
In this webinar, attendees will walk away with actionable advice on:
- Understanding risks and downtime
- Protection mechanisms and media (backup, replication, onsite/cloud)
- Choosing the right technology for broad support of business critical and legacy systems/data
View our webinar and ensure your BCDR strategy aligns with the needs of your business.