The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Storage Switzerland, KeepItSafe, VeeamRecorded: Jan 16 201956 mins
Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster strikes. DRaaS resolves these issues by creating an on-demand DR site where the cloud delivers IT resources as they are needed. IT planners though, may overlook some aspects of DRaaS solutions, especially when using the large public cloud providers.
In this webinar join Storage Switzerland, Veeam and KeepItSafe where we leverage a panel of backup and recovery veterans to identify common oversights seen in organizations’ DRaaS strategies and how to address them.
Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle ResearchRecorded: Jan 16 201944 mins
Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.
Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
Mor Cohen-Tal, CTO of Cloud at Turbonomic and Tom Reynolds, Director of Technology Solutions at Razor TechnologyRecorded: Jan 16 201958 mins
Are you tasked with transforming your data center to meet today’s Cloud Computing needs? If yes, you know a migration is easier said than done. From deciding what cloud is best for your environment to avoiding cloud cost-overruns and performance problems, these are just some of the headaches that IT Leaders are facing today.
Join Turbonomic CTO of Cloud, Mor Cohen and Razor Technology Director of Technology Solutions, Tom Reynolds on Wednesday, January 16th at 11am EST, as they reveal how an intelligent strategy paired with an AI driven solution can ensure a safer and faster cloud migration.
Our Executive Panel will Discuss:
- Managing Lift-and-Shift migrations while avoiding cost over-runs
- How to continuously optimize your hybrid cloud environment to assure performance & compliance at the lowest cost to the business
- Save up to 40% on your Cloud Bill
Kapil Chhabra, Principal Product Manager at Rubrik and Aaron Delp, Director of Technical Solutions at RubrikRecorded: Jan 16 201930 mins
Native replication in NoSQL databases such as MongoDB, Apache Cassandra, and Datastax, provides high scale and availability. However, does it provide protection of critical data against logical errors and data corruption? Is native replication a good substitute for disaster recovery and other enterprise backup needs? Is your database protected for compliance and governance use-cases?
Watch this 30 minute webinar to learn about the top fallacies of using only native NoSQL database replication and the consequences of this approach to enterprise backup and recovery.
Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, TufinRecorded: Jan 16 201952 mins
Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?
Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.
Tufin Orchestration Suite R18-3 GA delivers:
- New workflow support for Cisco and Palo Alto Networks NGFWs
- Policy-based routing automation for Cisco network devices
- New reporting options
- Methods to identify risk for non-zone included IPs for risk flows
Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
Gregory L. Schlegel, CPIMRecorded: Jan 15 201960 mins
Supply chains are becoming ever more complex, particularly with the increase in outsourcing and the advancement of multi-tiered global supply networks. More and more organisations are now faced with direct and continuously evolving operational and legislative risks as a result of global market disruption or malpractice in their supply chains.
“Supply chain risk management is the implementation of strategies to manage every day and exceptional risks along the supply chain, underpinned by continuous risk assessment with the objective of reducing vulnerability and ensuring continuity.” (Supply Chain Risk Management: An Emerging Discipline”)
This Supply Chain & Risk Management webinar provides participants with a glimpse of the global supply chain risk landscape. Definitions of risk management and new techniques and tactics to mitigate risk will be discussed, along with profiles of early adopters of Supply Chain Risk Management.
Attend this Supply Chain & Risk Management webinar and get a brief introduction on how to:
Identify global supply chain risks
Assess risks within your supply chain
Mitigate risks throughout your enterprise with new tools and tactics
Manage volatility, uncertainty, complexity, ambiguity and risk
Create a resilient supply chain
Sheila FitzPatrick President FitzPatrick & Associates, Patrick McGrath Digital Transformation Leader CommvaultRecorded: Jan 15 201952 mins
Companies raced to meet the May 2018 deadline to meet Europe’s General Data Protection Regulation with varying degrees of success, but if they learned anything since it is this: GDPR isn’t a one and done exercise. The GDPR might be the most eye-catching data privacy law on the books because of the outsized potential fine (up to 4% of revenue), but it is simply one of the first and most far-reaching such laws. Many more are emerging around the world and, indeed, in many US states. Some of the regulations overlap, while others conflict, meaning organizations face the ugly reality of having to deal with a patchwork quilt of laws.
In this webinar we’ll examine:
- Lessons learned to date
- The key differences between the new regulations
- Pain points companies are having (simply shutting off customers in
the EU is not a sustainable practice)
- Best approaches moving forward
Michael Osterman, President at Osterman ResearchRecorded: Jan 14 201948 mins
Real-time query and response solutions are revolutionizing cyber security by enabling Security and IT Operations teams to work together, speeding up analysis and response times and reducing risk in their organizations. While these SecOps products deliver a wide range of benefits, it can be difficult for your team to prioritize one set of functionality over another in this ever-evolving endpoint security landscape.
During this live webinar, Michael Osterman, President at Osterman Research, will provide his expert opinion on how to evaluate real-time, next-gen SecOps solutions so that you can find the right one for your organization.
You will learn:
- The benefits a strong SecOps strategy can provide
- What to consider when evaluating real-time SecOps products
- How to compare SecOps solutions to find the one that is best fit for your team
- How Cb LiveOps enables teams to better understand current state of endpoints in their environment
Learn how DFLabs’ Security Orchestration, Automation and Response solution, IncMan SOAR, integrates and performs seamlessly with Cisco’s security suite, including its latest integration with Cisco AMP for Endpoints.
As organizations are exposed to more advanced and frequent attacks, speed of detection and response is critical in reducing financial and reputational damage.
Cisco AMP for Endpoints leverages cloud-based analytics to detect and respond to advanced threats in real-time. Used with Cisco’s security suite, including Threat Grid, Umbrella and Umbrella Investigate, threats can be assessed, and assessments of the network performed; but this consumes valuable analyst time.
IncMan SOAR allows security teams to automate repeatable tasks, including enriching initial threat indicators, allowing more time to focus on tasks which require human intervention.
By combining these solutions, security teams can automate and orchestrate the process from initial alert, to containment and remediation, reducing actionable detection and response times from hours to seconds.
Storage Switzerland and IgneousRecorded: Jan 11 201917 mins
Join Storage Switzerland and Igneous for another Fifteen Minute Friday: Storage Tips for the Weekend. Most organizations are not satisfied with their ability to backup, recovery and correctly retain unstructured data. The combination of unprecedented growth and increased scrutiny caused by regulations like GDPR and CCPA is pushing organizations to the brink. It's time to stop the madness!
By joining this short webinar, you’ll learn tips to overcome:
- The Unstructured Data Backup Challenge
- The Archive Challenge
- The Data Privacy / Data Retention Challenge
Attendees to the webinar will also receive a copy of Storage Switzerland’s latest white paper “How to Evolve from Unstructured Data Protection to Unstructured Data Management.”
Larry Dietz, General Counsel, TAL Global and Stephen Twynam, Senior Sales Engineer, CitrixRecorded: Jan 9 201959 mins
The EU General Data Protection Regulation (GDPR) deadline was 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation. Whether you’ve prepared or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.
In this webinar, you will learn:
•What’s different with the current regulations
•How secure digital workspaces can help
•Scenarios organisations may encounter
Commvault - Gregg Ogden Sr Solutions Manager, Mark Rytwinski Sr Director Product Management, David Porco Sr Product ManagerRecorded: Jan 8 201930 mins
Today’s hybrid- or cloud-based enterprises are more complex than ever before – making management of data copies much harder, and more expensive.
To be effective, you have to know how to migrate applications to the cloud – or any other platform – without losing your shirt in the process. Solutions that provide advanced capabilities for application and database migration, copy data management and disaster recovery are a must.
In this webinar, you’ll learn how Commvault Orchestrate provides what you need to automate and orchestrate data copies – whether on-premises or in the cloud:
• Orchestrated migration to Cloud
• Self-service for DBAs or End-users
• Support for industry-leading applications
Copy Data Management (CDM)
• Dev/test support
• Instant virtual copies of databases and applications
Brian Golden, Daniela Caldararu from CUNA | Eric Greenstein from New York Life | Ahson Pai from EXLRecorded: Jan 8 201974 mins
Live webinar with: CUNA Mutual Financial Group & New York Life in partnership with EXL
Insurance companies have an opportunity to leapfrog generations of technology advancements and are driving end to end transformation impacting customer experience through back-end processes such as claims-processing, underwriting and providing policy quotes. Today, more and more businesses have turned to Robotic Process Automation (RPA) and a Digital Workforce to help streamline their processes in order to remain competitive while being able to delight their customers thanks to fast turnaround times and accurate information.
In this "Insurance Industry" special episode of our Blue Prism Café, we will be welcoming guests from Credit Union National Association (CUNA) and New York Life Insurance Company for a conversation around "why" and "how" to implement a Digital Workforce, and more importantly what best practices our guests can share to make RPA a long-term and scalable solution for your business, regardless of the industry.
Key takeaways will include:
• Specificities of the insurance industry for implementing RPA
• Real-life examples of implemented processes across various lines of businesses and their results
• Best practices and lessons learned from launching and scaling a Digital Workforce
• Brian Golden, Senior Manager Process Automation, CUNA Mutual Financial Group
• Daniela Caldararu, Director Intelligent Automation and Insight Services, CUNA Mutual Financial Group
• Eric Greenstein, Head of Strategic Portfolio Management & Process Automation, New York Life
• Ahson Pai, Global Head of Digital Consulting, EXL
• Xina Seaton, VP Customer Experience, Blue Prism
This 1-hour live webinar will include a live-audience Q&A, so make sure to pre-register and join us on the 8th of January. If you cannot make it on the day, a recording will be made available online afterwards.
Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, DruvaRecorded: Jan 8 201941 mins
Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.
Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.
Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.
Don't miss this informative webinar register today!
Orla Cox, Director Development SymantecRecorded: Jan 8 201935 mins
From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.
Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:
- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats
Are you looking at implementing a new risk reporting framework or update one that you have already? In this webinar we will explore some of the options that are available. Learn how to get the most from tools such as risk registers, risk and control indicators and risk matrices. Consider the options available when designing reports and identify the limitations of common risk reporting practices.
Risk reporting is an important output from the risk management process and should be a key input into both strategic and operational decision making. But if the wrong tools are used or reports are poorly designed then reporting can do more harm than good. Are your reporting arrangements adding value to management decision making and promoting intelligent conversations about risk tasking and control or are they little more than a procedural exercise?
Justin Falck, Senior Product Manager & Gun Akkor, Director of Technical Product ManagementRecorded: Jan 3 201958 mins
As the pioneer in the endpoint detection and response market, year after year Carbon Black has continued to innovate and deliver mission-critical incident response and threat hunting capabilities to advanced security operations teams worldwide. Join us for a look back at where we’ve been, what we’re doing, and what the future holds for Cb Response and our latest offering on to the Cb Predictive Security Cloud, Cb ThreatHunter.
Jessica Gulick, CEO, KatzcyRecorded: Dec 21 201842 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe
Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, CitrixRecorded: Dec 20 201855 mins
In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.
In this webinar you will learn:
• More about GDPR and how it will impact you
• How you can work towards GDPR compliance
Michael D. Osterman, Principal Analyst, Osterman Research & Michael Madon, SVP & GM of Security Awareness Programs, MimecastRecorded: Dec 20 201844 mins
More than 90% of security breaches involve human error. These acts are not always malicious, but often careless and preventable. To change security behavior effectively, employees must know what to do, care enough to improve, and then do what’s right when it matters.
An effective – and we stress effective – security awareness program is proven to change organizational behavior and lower risk. Join Michael Osterman, President, Osterman Research Inc. and Michael Madon, SVP & GM, Mimecast Security Awareness Products to learn more about the state of the industry and best practices for implementing an effective security awareness training program to change employee behavior and make your company more secure.
Michael D. Osterman, Principal Analyst, Osterman Research
Osterman Research was founded by Michael Osterman in 2001. Since that time, the company has become one of the leading analyst firms in the messaging and collaboration space, providing research, analysis, white papers and other services to global technology companies.
Michael Madon, Senior Vice President & GM of Security Awareness Products, Mimecast
Michael currently serves as the Senior Vice President and General Manager of Security Awareness Products at Mimecast. Prior to joining Mimecast, he was an early member of RedOwl, a software security company that was acquired by Raytheon. Michael also served on the Board of Directors of TeleCommunication Systems (NASDAQ: TSYS), a world leader in secure and highly reliable wireless communication technology which was acquired by Comtech Telecommunications Corp. in 2016.
Vamsi Ponnekanti, Director, Systems Engineering, SymantecRecorded: Dec 20 201860 mins
Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.
Are you Responsible for:
- Setting security objectives and strategies for your IT department
- Identifying, controlling and reporting security incidents
- Developing enterprise wide security programs
- Driving security or compliance or regulatory initiates
Then this webinar is for you!
What will the webinar address?
- How to plan for security in the move to the cloud?
- How to protect your users from an evolving threat landscape?
- How to make sure your data is secured and maintains compliance with legal regulations?
- How to effectively manage new types of devices and your mobile/remote users?
Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, ProductRecorded: Dec 19 201864 mins
What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, and what can you do now to prepare for them? Nyotron’s team of security experts will have the answers for you during our December 19th live webinar.
Making informed predictions first requires thinking back on 2018 with a critical eye. We will review a few of the most significant vulnerabilities and data breaches that made national headlines, from the City of Atlanta to Meltdown and Spectre, to the Marriott debacle and why the healthcare industry appears unable to defend itself. Our panel will also discuss the issues and trends they expect will dominate 2019, including adversarial artificial intelligence (AI) and destructive attacks on ICS.
We will wrap up with ideas on how you can make an effective case for additional security budget and how to educate yourself about the changing threat landscape (and to get those CPE’s before the year’s end).
Storage Switzerland, Axellio Inc.Jan 17 20196:00 pmUTC60 mins
Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.Jan 17 20196:00 pmUTC75 mins
With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:
- Implement security analytics for incident detection and response.
- Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
- Leverage AI to autonomously respond to emerging threats before they can do serious damage.
- Understand key information that needs to be communicated to various stakeholders in the event of a breach.
- Apply a “standard of due care” in order to prove compliance to regulatory agencies.
Cody Hosterman, Pure Storage; Jason Massae, VMware; J Metz, CiscoJan 17 20196:00 pmUTC75 mins
With all the different storage arrays and connectivity protocols available today, knowing the best practices can help improve operational efficiency and ensure resilient operations. VMware’s storage global service has reported many of the common service calls they receive. In this webcast, we will share those insights and lessons learned by discussing:
- Common mistakes when setting up storage arrays
- Why iSCSI is the number one storage configuration problem
- Configuring adapters for iSCSI or iSER
- How to verify your PSP matches your array requirements
- NFS best practices
- How to maximize the value of your array and virtualization
- Troubleshooting recommendations
Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP ComplianceJan 21 201910:00 pmUTC47 mins
What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.
Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.
This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.
Here's what they'll discuss:
-How to get executives and users to care about security and compliance
-Top of mind security or compliance issues (and tackling them)
-The toughest challenges they faced
Jon Gery International IT Manager, GameStop and Seyi Verma Product Marketing Director, DruvaJan 22 201910:00 amUTC52 mins
GameStop, a global Fortune 500 company (NYSE: GME), needed an efficient cloud backup and recovery solution to meet business continuity requirements across its 7,200 retail stores in 14 different countries. The company had a myriad of virtualized environments with over 250TB of data but its on-premises backup infrastructure and procedures were so complex and inefficient, that GameStop was unable to meet business continuity SLAs.
GameStop turned to Druva, and secured its data in enterprise server workloads and virtual environments through Druva Phoenix. Register for this webinar with special guest speaker Jon Gery, International IT Manager at GameStop, to hear how the company was able to:
Unify global data protection requirements within a single system
Increase the backup footprint of virtual machines by 20%
Easily achieve their business continuity SLAs
Reduce backup and recovery operating expenses by 70%
Don't miss this informative webinar — Register today!
Aaron Cockerill, Chief Strategy OfficerJan 22 201911:00 amUTC29 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & SullivanJan 22 20194:00 pmUTC60 mins
In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.
With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.
• Do perceptions of customers in the business community align with consumer reality?
• What makes (or breaks) consumer digital confidence in organizations?
• Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
Donna Johnson, Vice President of Product and Solution Marketing, CradlepointJan 22 20195:00 pmUTC60 mins
With the arrival of Gigabit-Class LTE network solutions for enterprises and public safety agencies, the era of wireless WAN is here — and enterprise networking will never be the same. Utilizing Elastic Wideband technology, Cradlepoint’s new cloud-managed routers featuring built-in Gigabit-Class LTE modems provide the speeds, reliability, and flexibility necessary to drastically improve existing use cases, and to enable new ones that have never been possible in branch or vehicle settings.
With game-changing Gigabit-Class LTE, which leverages technologies that are foundational pieces of 5G, wireless now meets or exceeds other broadband networks, but with the added value of mobility, immediate deployment, and standardized billing on a single nationwide carrier.
Join Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore how the world’s first Gigabit-Class LTE solutions for enterprise networking can revolutionize wireless WAN and put organizations on the Pathway to 5G.
John Bell, Sr. Consultant & Brian Guetzlaff, Engineering ManagerJan 22 20197:00 pmUTC60 mins
In this webinar, John Bell and Brian Guetzlaff will explore the advanced capabilities of Caringo Swarm’s Content Management API, including managing user access, usage and content (using collections and metadata). They will provide a live demonstration and show you how to use the Swarm Object Storage Content Portal User Interface (UI). Attendees will also have the opportunity to ask questions throughout the webinar.
Tony Liau, Veritas & Matt Sirbu, SoftchoiceJan 22 20198:00 pmUTC75 mins
Digital transformation is causing infrastructure to evolve faster than ever and managing data must be the top priority for any modern enterprise. Most organizations are working towards transforming their IT infrastructure and its associated capabilities, but traditional environments are being disrupted by cloud, virtualization, open source and hyper converged infrastructure. The need for holistic modern data management remains as crucial as ever to navigate this complexity and leverage information for strategic advantage.
Join us on this webinar as Tony Liau, Director, Product & Solutions Marketing at Veritas Technologies and Matt Sirbu, Director of Data Management & Data Center Infrastructure at Softchoice discuss how the most important barrier to adopting hybrid IT is to have an intuitive data management solution.
Attendees of this webinar will learn how you navigate through these IT obstacles to build an agile solution that extends across on-prem and off-prem architectures.
About the speakers:
Tony brings over 15 years of enterprise experience to Veritas, taking innovative data management solutions to market. In his current role as Director and Head of Product & Solutions Marketing for Data Protection and management, he leads product launch, go-to-market and global campaign strategy. Before joining Veritas, Tony held senior roles at other data protection and security companies such as Barracuda Networks, Symantec and Cisco.
Matt Sirbu has spent over two decades in Information Management; focusing on Data Center Optimization, Protection, Availability and Data Intelligence solutions. Having covered most market segments across North America, he has demonstrated an ability to enter new industries, learn their unique requirements, and develop comprehensive strategic direction with exceptional results. He joined Softchoice in July of 2015, coming from Dell where he was the Director of Storage Strategy for North America.
David Hines, Vice President of Architecture and Engineering - TierPointJan 22 20199:00 pmUTC60 mins
As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.
A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.
Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
Marco Riboli, VP Southern Europe di FireEyeJan 23 20191:30 pmUTC45 mins
Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.
Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:
•Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
•Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
•Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa
Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
Andy Lawrence, Executive Director of Research; Chris Brown, CTO; Todd Traver, VP IT Optimization & StrategyJan 23 20195:00 pmUTC60 mins
Members of Uptime Institute’s executive team discuss the newest findings about data center outages, including trends in causes and types, along with strategies for reducing the number and impact of outages.
Analyse des données :
Depuis les sauvegardes et les données de production
Content Indexing :
Détection de type de données (RGPD)
Recherche conformité : eDiscovery, legal hold
Gestion des données sensibles
Patrick Smith, Pure StorageJan 24 201910:00 amUTC45 mins
The increasingly competitive climate within Financial Services means that enhancing business outcomes by leveraging AI is essential. Data has never been more important to business success and a key aspect to optimising its value is in conjunction with AI.
In this session we will discuss the areas in which Financial Services are looking to leverage their data together with AI and some of the considerations for successful implementation of an AI infrastructure that accelerates time to value for these projects.
Richard Pauly, Head of DX | Bart Peluso, Head of Product Marketing | Chieng Moua, Solutions Engineering ManagerJan 24 20194:00 pmUTC60 mins
Following the launch of the Blue Prism Digital Exchange, come and join us for our inaugural Pulse Online Webinar to see the platform in action, as well as a demo of the new features of Blue Prism's v6.4.
-= What is the Blue Prism Digital Exchange? =-
The Digital Exchange (DX) is a “shop window” for finding & consuming pre-built AI, cognitive & disruptive technologies. The DX gives global enterprise customers direct access to technologies from Blue Prism and its technology partners as downloadable connectors, reusable Visual Business Objects (VBOs) or via referrals to the partner via an easy-to-use storefront. Thanks to a robust ecosystem of partners, Blue Prism customers can instantly execute their choice of AI, Machine Learning, Analytics, OCR & more through open API’s.
-= What's new in v6.4? =-
* Integrated ‘Skills’ (Toolbar) in the product
* Simple drag & drop functionality.
* New Web API Services (‘API Configurator’) facilitates easier integration of APIs.
* Simplifies web services within a process flow.
-= Speakers =-
* Richard Pauly, Global Head of the Digital Exchange, Blue Prism
* Chieng Moua, Solutions Engineering Manager, Blue Prism
* Bart Peluso, Global Head of Product Marketing, Blue Prism
Our panel of Blue Prism experts will be taking questions from the audience during the webinar, so make sure to join us for the live webinar.
Pulse Online is Blue Prism’s product and technology focused webinar series. Every last Thursday of the month, get hands-on demos, tactical insight and best practices for taking your Digital Workforce to the next level.
Mike Harding, Product Manager - Microsoft Storage Solutions, HPEJan 24 20194:00 pmUTC60 mins
Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product MarkeJan 24 20195:00 pmUTC58 mins
IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
Storage Switzerland, Infinite IOJan 24 20196:00 pmUTC60 mins
Most organization’s use of public cloud storage resources is the hybrid use case. A hybrid cloud strategy enables organizations to leverage the location and resources that make the most sense for the given workload. A hybrid cloud strategy though requires a free-flow of information between on-premises and cloud storage. The problem is that most of the information exchange is metadata, not actual data and most cloud solutions don’t specifically address metadata acceleration.
- A clear understanding of why lack of metadata management breaks hybrid cloud
- Why most cloud solutions don’t solve the metadata problem
- How to finally fix the hybrid cloud meta problem and create the ideal hybrid cloud infrastructure
Andrew Klein, BackblazeJan 24 20196:00 pmUTC60 mins
At the end of 2018 Backblaze had over 750 petabytes of data storage on over 100,000 hard drives. We’ll examine the quarterly, yearly and lifetime failure rates for the hard drive models in service in our data centers. We’ll get our first look at the new 14 TB drives we started using in Q4 and get updates on the 8, 10, and 12 TB drives currently in service. In addition, we will:
•Take a look at the SMART stats we are collecting and what they are telling us.
•Compare the failure rates of consumer hard drives versus enterprise hard drives
•Compare the failure rates of helium-filled versus air-filled hard-drives
Дмитрий Иванюк, эксперт по решениям CommvaultJan 29 20198:00 amUTC90 mins
Приглашаем Вас и ваших коллег принять участие в техническом вебинаре "Защита gmail & gdrive"
В ходе вебинара вы сможете узнать:
- принципы работы Commvault Complete Backup & recovery
- методы защиты облачных решений от Google
- задать вопросы техническому консультанту Commvault
Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth SchneiderJan 29 20198:30 amUTC60 mins
Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.
Join security experts as they discuss:
- New on the threat landscape
- Notable cyber attack methods and strategies and how to protect against them
- Areas for improvement
- Solutions for network visibility, breach detection and response
- Recommendations for improving security and steps to take today
Elad Schulman, CEO, Segasec
Yoram Salinger, CEO, Perception Point
Mille Gandelsman, CTO and co-founder, Indegy
Guy Dagan, Cofounder and Partner, Consienta
Kenneth Schneider, VP Fellow, Symantec
Mike Hart, VP of Sales, Central EuropeJan 29 201910:00 amUTC45 mins
In der Cybersicherheitsbranche sind wir häufig so beschäftigt, dass der Jahreswechsel fast unbemerkt bleibt. Dies gibt Anlass, über die Entwicklungen und Erfahrungen aus den vergangenen zwölf Monate zu reflektieren und Strategien zur Bewältigung von Herausforderungen zu entwickeln.
In der IT-Sicherheits-Branche ist es zudem wichtig, neue und potenzielle Trends zu erkennen, die in Zukunft eine Rolle spielen könnten. Mike Hart, VP Central Europe bei FireEye, gibt Einblick zur Cybersicherheit im Jahr 2019.
Erfahren Sie mehr über:
- Bedrohungen für die Luftfahrtindustrie, einschließlich Cyberspionage und Cyberkriminalität.
- Was Sie von Angreifern aus etablierten und aufstrebenden Schwellenländern erwarten können.
- Wie Bedrohungsakteure ihre Taktiken ändern, um ihrem Gegenüber immer einen Schritt voraus zu sein.
In diesem Webinar erfahren Sie, wie Sie Cybersicherheitsbedrohungen immer einen Schritt voraus sein können.
Iain Sinnott – Sales and Marketing director – VanillaIPJan 29 201911:00 amUTC30 mins
Technology is constantly evolving, and businesses are becoming more and more dependent on technology to run their businesses efficiently.
Technology is transforming businesses and disrupting entire industries. One of those industries that has been heavily affected is sales.
From prospecting to closing, today’s mobile, social, big data, and cloud technologies are revamping the sales process in ways that would have been unthinkable only a few decades ago.
As a result, many sales organizations are embracing new technologies to drive productivity, profitability, and competitive advantage to revamp the sales process.
With that in mind, here’s a look at some of the technological tools organizations are using to streamline the selling process:
-Sales Force Automation Systems
-Cloud-based CRM Technology
Reasons to Attend:
-Why individuals need to be involved in the choice of business productivity tools
-The different benefits different users derive
-Why learning to work with salespeople is the best way for buyers to avoid white elephants
Technology is constantly reinventing and improving, and the world is being constantly reinvented around it.
Moshe Shlisel, Hal Lonas, Itai Tevet, Guy DaganJan 29 201911:00 amUTC60 mins
The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.
Join IoT and security experts to learn more about:
- Unique challenges of securing IoT systems
- IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
- Proactive security strategies to stave off the threat of IoT cyber attacks
Hal Lonas, CTO, Webroot
Itai Tevet, CEO, Intezer
Moshe Shlisel, CEO and Co-Founder, GuardKnox
Guy Dagan, Cofounder and Partner, Consienta