Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Endpoint Security with Dell Technologies
    Endpoint Security with Dell Technologies
    CJ Breaux - Systems Engineer, Dell EMC Recorded: May 24 2019 50 mins
    On average, it takes an organization 108 days to detect a security breach. Endpoint security solutions must work with the way employees work today. They not only need to do the job of protecting data and preventing threats, but they should also enable worker productivity – not hinder it. Join us to learn how you can prevent, detect, and respond to threats faster and more efficiently with Dell SafeGuard and Response.
  • Gain immunity against high-profile threats with APT Intelligence Reporting
    Gain immunity against high-profile threats with APT Intelligence Reporting
    Vicente Diaz, Artem Karasev Recorded: May 24 2019 55 mins
    Counteracting modern cyberthreats requires a 360-degree view of the tactics and techniques used by threat actors. While the C&Cs and tools cybercriminals use change frequently, it’s extremely difficult for attackers to change their behavior and methods during an attack execution. Identifying and exposing these patterns quickly helps deploy effective defensive mechanisms in advance, disarming cybercriminals and disrupting the kill chain.

    Kaspersky Lab's APT Intelligence Reporting now tracks 100+ threat actors, uncovering the most sophisticated and dangerous targeted attacks, cyber-espionage campaigns, major malware, ransomware and underground cybercriminal trends in 85 countries. Join our webinar and learn how to use our unique expertise and knowledge to enable bulletproof protection from the most damaging threats.
  • Changing the Risk Conversation
    Changing the Risk Conversation
    Dennis Keglovits Recorded: May 24 2019 56 mins
    Does your organization successfully communicate risk across departments? Or does essential information get lost in translation? Effective communication is the ‘glue’ for a successful risk management program. Making sure every part of an organization is on the same page can be challenging when language changes from department to department.

    In this can’t miss webinar, Lockpath’s, Dennis Keglovits will share his experience with communicating risk successfully across an organization, from the IT department to the executive suite.

    As an attendee you’ll learn:

    • Key concepts for standardizing your risk language
    • Options for establishing better lines of communications
    • Better communication leads to better collaboration
  • A Year In Review - 2018 Disaster Landscape
    A Year In Review - 2018 Disaster Landscape
    Oliver Lomer, Senior Marketing Manager - Sungard AS Recorded: May 24 2019 17 mins
    When people think of disasters that disrupt business operations they often think of the extreme – major weather incidents, cyber-attacks or terrorist incidents for example – but are these really the main causes of disruption? Should businesses be focused on other threats to their operations? In this webinar Oliver Lomer dives into Sungard AS’ invocation statistics from 2018 to uncover the truth of the Disaster Landscape.
  • Der sichere Weg in die Cloud - wie man die Nutzer von ihrem Netzwerk abkoppelt
    Der sichere Weg in die Cloud - wie man die Nutzer von ihrem Netzwerk abkoppelt
    Arno Edelmann and Nathan Howe Recorded: May 24 2019 46 mins
    Die Herausforderung der netzwerkzentrierten Sicherheit

    30 Jahre lang haben Unternehmen auf netzwerkzentrierte Methoden gesetzt, um User mit dem Netzwerk und den Anwendungen darauf zu verbinden. Doch die Arbeitsweise der User hat sich gewandelt; mit dem Verlagern von Apps in die Cloud wurde das Netzwerk auf das Internet ausgeweitet. Dies macht netzwerkzentrierte Lösungen wie Remote-Access-VPN überflüssig.

    Wir zeigen eine Möglichkeit, den Übergang zu User- und App-zentrierter Sicherheit mithilfe von Zscaler Private Access (ZPA) zu schaffen.
  • HIPAA Compliance
    HIPAA Compliance
    Lockpath Recorded: May 23 2019 2 mins
    HIPAA Compliance has many healthcare organizations struggling to keep up. Learn how the Keylight Platform is the solution you need for HIPAA compliance.
  • Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Marc Mombourquette and Michael Carcerano, Dell EMC Recorded: May 23 2019 50 mins
    Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400

    Existing data protection solutions targeted at the mid-size orgs sacrifice comprehensive coverage, efficiency, and support in the name of simplicity. The IDPA DP4400, including the new 8-24TB option, delivers a converged data protection solution that is the perfect mix of simplicity and power for SMB organizations and remote office/branch office (ROBO) environments. In addition, it offers the lowest cost-to-protect and is guaranteed under the Future-Proof Loyalty program.

    In this webinar, you’ll learn how Dell EMC’s IDPA DP4400 is not only receiving plaudits from industry experts, but also winning the trust of new and existing customers. According to IDC, both IDPA revenue and unit shipments have grown by more than 10x from 2017 to 2018 with an annual run rate exceeding $100 million in just six quarters in the market.

    The IDPA DP4400 is a turnkey data protection appliance tailor-made for mid-size organizations. It offers complete backup, deduplication, replication, recovery, search & analytics, system management—plus, cloud readiness with disaster recovery and long-term retention to the cloud—all in a convenient 2U appliance.

    Come learn how your organization can benefit from all that IDPA DP4400 has to offer.

    Presented by:
    Marc Mombourquette - Product Marketing, Dell EMC
    Michael Carcerano – Product Management, Dell EMC
  • 5 Reasons to Take a Multi-Cloud Approach to File Storage
    5 Reasons to Take a Multi-Cloud Approach to File Storage
    Andy Hardy, VP of EMEA at Nasuni | Anne Blanchard, Sr. Dir of Product Marketing at Nasuni Recorded: May 23 2019 18 mins
    In this video webinar, we take a look at the 5 reasons why large enterprises need a multi-cloud file infrastructure. GDPR, data sovereignty, regional cloud strategies, and the need for global productivity are driving enterprises to think more broadly about where and how they store and share files. With these changing requirements, taking a multi-cloud approach to file storage is becoming an integral part of an organization's cloud-first initiative.

    Tune in and learn:

    - Why file solutions offered by object storage vendors are not meeting the challenge
    - How GDPR is impacting the requirement for multi-cloud
    - How moving to a multi-cloud solution can increase overall productivity
  • Getting more from Azure Part 1: Virtual Machines
    Getting more from Azure Part 1: Virtual Machines
    John Noakes and James Wilson Recorded: May 23 2019 19 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    This webinar shares best practice for operating, managing and securing virtual machines through the Azure platform.

    Please visit uk.insight.com/azurewebinars to learn how Insight can help you optimise your Azure workloads or to speak to your Insight Account Manager today.
  • Ransomware, awarie, kradzieże - jak kompleksowo ochronić stacje robocze?
    Ransomware, awarie, kradzieże - jak kompleksowo ochronić stacje robocze?
    Piotr Łukasiewicz, System Engineer, Commvault Recorded: May 23 2019 54 mins
    W nowoczesnym przedsiębiorstwie pracownicy coraz szerzej wykorzystują możliwości, które daje praca zdalna z wykorzystaniem urządzeń mobilnych - nie tylko tych należących do pracodawcy. Dowiedz się, jak kompleksowo zabezpieczyć dane na wypadek awarii, kradzieży czy ataku ransomware - za pomocą jednego narzędzia - Commvault Data Platform.
  • Architectures innovantes avec Commvault & CISCO
    Architectures innovantes avec Commvault & CISCO
    Dominique Renard Recorded: May 23 2019 24 mins
    Architectures innovantes avec Commvault & CISCO, autour de Commvault HyperScale basée sur Cisco UCS, comment protéger vos données et workload stockées dans Cisco HyperFlex et AzureStack
  • Webinar: 5 klare Zeichen für die Automatisierung von Netzwerksicherheitsvorgänge
    Webinar: 5 klare Zeichen für die Automatisierung von Netzwerksicherheitsvorgänge
    Christian Giebner & Joachim Nossek, EMEA Sales Engineering Recorded: May 23 2019 35 mins
    Warum automatisieren? Warum jetzt? Automatisierung ist für die digitale Transformation von entscheidender Bedeutung, da sie für die Reduzierung der Angriffsfläche unerlässlich und für die Gewährleistung einer kontinuierlichen Compliance unabdingbar ist.

    Besuchen Sie uns am Dienstag, den 21. Mai, für unseren Webcast "5 eindeutige Anzeichen für die Automatisierung von Netzwerksicherheitsvorgängen", um Folgendes zu erfahren:

    - So beschleunigen Sie den Netzwerkänderungsprozess sicher
    - Best Practices für den Einstieg in die Automatisierung
    - Richtlinien zur Erreichung des Ziels der Zero-Touch-Automatisierung

    Machen Sie es zu einem Ihrer Ziele für 2019, die Automatisierung zu übernehmen und den Zeit- und Arbeitsaufwand für manuelle Aufgaben rund um Firewall-Vorgänge zu reduzieren. Mithilfe der fünf eindeutigen Zeichen können Sie den Business Case erstellen und das Management-Buy-in für die Maximierung von Flexibilität und Sicherheit mit Tufin Security Policy Automation and Orchestration erzielen.

    Kannst du die Live Session nicht machen? Registrieren Sie sich und die On-Demand-Aufzeichnung wird an Sie gesendet.
  • Defensive Security Techniques You Can Use Now
    Defensive Security Techniques You Can Use Now
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant Recorded: May 22 2019 60 mins
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • How to Migrate Legacy Backups to the Cloud with Commvault
    How to Migrate Legacy Backups to the Cloud with Commvault
    Matt Tyrer and Paolo Iacoviello - Commvault Recorded: May 22 2019 33 mins
    Time to turn off your legacy backup! Commvault moves that old data to the cloud.

    Are you still paying maintenance on old backup systems just because you aren’t sure what to do with those backup and archive data sets that still need to be kept for compliance or retention requirements? What if you could migrate those backups and archives directly to the cloud while preserving the important metadata such as the original retention date stamps and times?

    Join Commvault to learn how to move backups and archives out of legacy systems – and store those datasets and workloads directly in cloud storage.

    Our technical subject matter experts will explain how the Commvault platform can automatically capture legacy backups and archives for cloud migration. Learn how to move backups to the cloud from any of these systems:

    Veritas NetBackup
    Veritas BackupExec
    IBM Spectrum Protect, previously called Tivoli Storage Manager (TSM)
    Dell EMC NetWorker
    Dell EMC Avamar
    Microsoft Data Protection Manager (DPM)
    Microfocus Data Protector, previously HP Data Protector

    You don’t need to keep that old system running in the corner “just in case.” Learn how to streamline your IT workload, provide better data availability, and include your legacy backups in enterprise search.
  • GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital Risk Recorded: May 22 2019 44 mins
    According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.

    However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?

    Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
  • A Day in the Life - Tips and Best Practices from 3 CISSPs
    A Day in the Life - Tips and Best Practices from 3 CISSPs
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator) Recorded: May 21 2019 60 mins
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² and CISSPs from around the world as we discuss pain points and challenges encountered in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • Achieve 70% Cheaper Cloud Architectures for Retail
    Achieve 70% Cheaper Cloud Architectures for Retail
    Adam Dagnall, SE, Cloudian Recorded: May 21 2019 51 mins
    Learn how UK retailers save 70% of Data Storage costs w/ Cloudian feat. an exclusive Intel keynote.

    Slash Backup & Data Protection costs and eliminate ingress/egress charges by:

    • Repatriating workloads from AWS
    • Re-optimising Hadoop Big Data workloads
    • Saving 70% – 80% of storage costs for Splunk with Splunk SmartStore
    • Tiering data from Pure Storage Flash array to free up capacity trapped with Snaps

    Join our webinar on 21 May at 14:00.
  • Webinar: 5 segni chiari che è necessario automatizzare le operazioni di sicurezz
    Webinar: 5 segni chiari che è necessario automatizzare le operazioni di sicurezz
    Flavio Di Cosmo, SEMEA Sales Engineer Recorded: May 21 2019 31 mins
    Perché automatizzare? Perché ora? L'automazione è fondamentale per la trasformazione digitale, essenziale per ridurre la superficie di attacco e obbligatoria per garantire la conformità continua.

    - Come accelerare in modo sicuro il processo di modifica della rete
    - Best practice per iniziare con l'automazione
    - Linee guida per raggiungere l'obiettivo di Zero-Touch Automation

    Rendilo uno dei tuoi obiettivi del 2019 per adottare l'automazione e ridurre il tempo e gli sforzi da dedicare alle attività manuali relative alle operazioni del firewall. I cinque segni chiari possono aiutarti a costruire il business case e ottenere il buy-in di gestione per massimizzare l'agilità e la sicurezza con Tufin Security Policy Automation and Orchestration.
  • Webinaire: 5 signes clairs dont vous avez besoin pour automatiser les opérations
    Webinaire: 5 signes clairs dont vous avez besoin pour automatiser les opérations
    Anthony Le Pipe, WEMEA Sales Engineer Recorded: May 21 2019 32 mins
    Pourquoi automatiser? Pourquoi maintenant? L'automatisation est essentielle à la transformation numérique, essentielle pour réduire la surface d'attaque et obligatoire pour garantir la conformité continue. Rejoignez-nous le mardi 21 mai pour notre diffusion Web "5 signes clairs dont vous avez besoin pour automatiser les opérations de sécurité réseau" pour apprendre:

    - Comment accélérer en toute sécurité le processus de changement de réseau
    - Meilleures pratiques pour démarrer avec l'automatisation
    - Lignes directrices pour atteindre l'objectif de l'automatisation Zero-Touch

    Faites de l’automatisation l’un de vos objectifs pour 2019 et réduisez le temps et les efforts consacrés aux tâches manuelles liées aux opérations de pare-feu. Les cinq indicateurs clairs peuvent vous aider à élaborer une analyse de rentabilisation et à obtenir l'adhésion de la direction à l'optimisation de l'agilité et de la sécurité avec l'automatisation et l'orchestration des stratégies de sécurité de Tufin.
  • Building a Data Strategy for GDPR Compliance
    Building a Data Strategy for GDPR Compliance
    Ray Ford, GDPR Institut and Nigel Tozer, Commvault Recorded: May 20 2019 69 mins
    A year on from the start date, many organisations are quietly admitting they still don’t consider themselves to be compliant with GDPR. Surveys are coming out that confirm this, all at a time when the regulators seem to be getting serious about enforcing this regulation. The question is this – are GDPR plans failing, or is gaining control of data the real challenge?

    In many organisations the main challenge is still data:

    Avoiding a breach and dealing with its consequences
    Dealing with data on laptops and in the cloud
    Finding and erasing data

    This webinar will help you build a data strategy for GDPR and beyond, and as well as dealing with the topics above, we will also take a look at how good data controls can provide financial and business benefits beyond mere compliance. The session is suitable for Chief Data Officers, Data Protection Officers and IT teams responsible for data management.
  • GDPR One year later: Is a Risk-Based Approach to Data Privacy possible?
    GDPR One year later: Is a Risk-Based Approach to Data Privacy possible?
    Simon Rycroft, Principal Consultant, ISF and Kashif Barlas, Senior Consultant, ISF Recorded: May 20 2019 45 mins
    With businesses streamlining processes and automating customer service through outsourced arrangements, the volume and content of electronically transmitted personal data records has increased beyond all previous estimates. The sharing of special categories of data between businesses and their suppliers has become the norm, sometimes without adequate protection for the individual’s privacy in breach of the GDPR. Where there are hundreds of supplier contracts, it is not pragmatic for an organisation to review and tighten all these contracts immediately in the wake of the GDPR, however a risk-based approach can certainly reduce the compliance burden upon existing teams.

    In this seminar, we introduce the concept of a minimum viable product for this aspect of data privacy and describe how it can be aligned with an organisation’s risk appetite and agreed before prioritising and mitigating data privacy risks.
  • How to Protect NAS Data at Scale with Rubrik and Pure Storage FlashBlade
    How to Protect NAS Data at Scale with Rubrik and Pure Storage FlashBlade
    Adam Fox & David Huskisson Recorded: May 20 2019 47 mins
    NAS data is growing at a rapid rate, but many customers are facing challenges in wrangling this data with costly, slow, legacy solutions. Rubrik and Pure Storage have developed a compelling solution to help protect your NAS data at scale. Rubrik NAS Direct Archive to Pure FlashBlade allows our customers to manage, protect, and store their NAS data in a cost-effective, scalable and high-performing environment.

    In this on-demand webinar, experts from Rubrik and Pure Storage present a technical deep dive on how to leverage Rubrik for NAS Direct Archive to Pure FlashBlade and the performance implications of this joint solution.

    Join this on-demand webinar to learn how to:

    Maximize backup and restore performance for any NAS host while reducing costs

    Achieve fast search and near-zero RTO with cataloged metadata

    Modernize your data center with Rubrik and Pure FlashBlade by simplifying management and providing the world's first datahub.

    Adam Fox, Sr. Solutions Architect, Rubrik
    David Huskisson, Rapid Restore Solutions Manager, Pure Storage
  • Fraud Prevention - IT ain’t what you do (it’s the way that you do it)
    Fraud Prevention - IT ain’t what you do (it’s the way that you do it)
    Tim Ayling, Global Head of Fraud Prevention Solutions Recorded: May 20 2019 42 mins
    Isn’t it funny how biometrics, a science that has been around for centuries, did not enter the public consciousness until Apple launched Touch ID with the iPhone 5S in September 2013? Now it is seen by many as the solution to our fraud concerns. Of course, this technology, like any other, whilst offering tremendous potential, is not the be-all and end-all of fraud and cybercrime prevention. In this presentation we will look at why Artificial Intelligence and behavioural biometrics, on their own, are not the answer to all your cybersecurity woes.
  • IT security vulnerabilities in healthcare. How to avoid losing patient records?
    IT security vulnerabilities in healthcare. How to avoid losing patient records?
    Denis Makrushin, Security researcher, Kaspersky Lab; Vitaly Mzokov, Solution Business Lead, Kaspersky Lab Recorded: May 20 2019 57 mins
    Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.

    Please find more by the link – https://securelist.com/time-of-death-%D1%81onnected-medicine/84315/

    Want to know more about underground financial threats? Join our next webinar:
  • Cloud Computing and Cloud Security
    Cloud Computing and Cloud Security
    Sapna Singh, cyber SME and advocate for women in cyber Recorded: May 18 2019 53 mins
    Join WSC and Sapna Singh, May 18th at 11 AM EST for a discussion on Cloud Computing and Cloud Security. Hear from cyber professional and advocated for women in cyber in the Middle East as she Dives into what the cloud is and how it works. After which she gets into AWS and breaks down a few of the major areas of the platform.

    This is a primer for our hands-on cloud workshop to be hosted later in the year!
  • Webinar: Capgemini talks Gaining Operational Efficiency in Network Operations
    Webinar: Capgemini talks Gaining Operational Efficiency in Network Operations
    Geoffrey Hughes, Capgemini, Former CISO, Architect, Compliance Officer, Karen Crowley, Sr. Product Marketing Manager, Tufin May 28 2019 6:00 am UTC 51 mins
    Join us on May 28th at 2pm SGT/4pm AEST to hear Capgemini talk about the challenges of improving operational efficiency in the age of increasing network complexity and digital transformation.

    Former CISO, Security Architect and Compliance Officer, Geoff Hughes of Capgemini will address:

    Why organisations struggle to deploy automation at scale
    Best practices for getting started with automation
    The role application security plays in digital transformation
    Register now for this 30-minute discussion to learn how you can improve operations and meet business agility goals with automation.
  • Redefining Enterprise Security in an Era of Digital Transformation
    Redefining Enterprise Security in an Era of Digital Transformation
    Kaspersky Lab and guests May 28 2019 1:00 pm UTC 68 mins
    In the digital world, effective information security is now a key business success factor. As attackers find new ways to attack digital assets, the ability of the organization to maintain continuity, and the security of the information circulating in it, may be called into question. New attack methods and threat vectors require fundamentally new approaches to corporate protection.

    As part of the World Cyber Security Congress in London on March 27, Kaspersky Lab will be conducting a seminar exploring ways to solve the problem of protection in the digital world, where the risks are so high, and where the only sure defense lies a comprehensive security approach.

    Join us there to:

    • Find out about the threats organizations like yours are currently facing

    • Learn how to build reliable protection in the era of digital transformation

    • See how leading-edge global corporation has built its security on proven technologies

    • Put your questions to our experts

    During the seminar, our Principal Security Researcher in the Global Research and Analysis Team David Emm will talk about contemporary threats in ‘The Top Cyber-threats Facing Your Digital Business’.

    Next, in ‘Cybersecurity as Part of Your Digital Transformation Strategy’, Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland will outline how to build a cybersecurity system able to respond to highly complex threats.

    The seminar will end in conversation - CTO one of our customer talks about their success story in fighting today’s cyberthreats.
  • What Your Storage Vendor Isn’t Telling You About S3
    What Your Storage Vendor Isn’t Telling You About S3
    John Bell, Sr. Consultant & Eric Dey, Director of Product May 28 2019 6:00 pm UTC 60 mins
    While the S3 protocol has become the de facto choice for cloud and object storage, there can be important details that your storage vendor isn’t telling you. Are there bottlenecks or scaling problems waiting for you in a year or two? Should you be asking for more than "just S3" for unlocking value from your data? Our experts discuss these secret details and explain how Caringo’s storage solution gives you S3 along with the other pieces necessary to meet your evolving storage needs.
  • 제로 트러스트 시대, 웹 보안의 新 패러다임 시만텍 웹 위협 격리 (Web Isolation)
    제로 트러스트 시대, 웹 보안의 新 패러다임 시만텍 웹 위협 격리 (Web Isolation)
    고재훈 부장, 시만텍코리아 SE본부 May 29 2019 5:00 am UTC 60 mins
    디지털 트랜스포메이션(Digital Transformation)이 기업 혁신의 화두가 된 오늘 날, 웹은 비즈니스 활동에 핵심적인요소로 자리잡고 있으며 이를 노린 웹 공격 또한 점점 더 지능화되고 있습니다.

    글로벌 사이버 보안 분야를 선도하는 시만텍은 이와 같은 흐름에 발맞춰 새로운 보안 과제로 떠오르고 있는 웹 보안관리 전략에 새로운 방향점을 제시하고자 합니다.

    이에 이번 웨비나에서는 최근 주목받고 있는 웹 위협 격리 기술에 대한 소개와 격리 기술이 주는 기술적인 혜택 및 웹 필터 기능과의 연동을 통한 시너지 효과를 소개하고자 합니다.
    웨비나에 참석하시어 시만텍의 웹 위협 격리 기술을 통해 웹 보안을 더 정교하고 스마트하게 제어함과 동시에 사용자의 웹 경험을 헤치지 않는 기술 구현을 확인해 보시기 바랍니다.

  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE May 29 2019 10:00 am UTC 45 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.
  • Withstanding the world’s no. 1 attack vector
    Withstanding the world’s no. 1 attack vector
    Oleg Gorobets, senior global product marketing manager at Kaspersky Lab May 29 2019 2:00 pm UTC 60 mins
    Email offers cybercriminals an multitude of potential attack scenarios. Join our webinar to find out what to expect, and how to protect your business against the world’s no. 1 attack vector.
  • Meet the CEO: Quantum’s Jamie Lerner
    Meet the CEO: Quantum’s Jamie Lerner
    Storage Switzerland, Quantum May 29 2019 4:00 pm UTC 30 mins
    Quantum’s CEO, President and Chairman of the Board, Jamie Lerner, will be joining Storage Switzerland Senior Analyst Krista Macomber to talk about how his company is helping its customers more efficiently edit, render, process and store video content and other large unstructured data sets. Quantum has built strong footing in video and rich media infrastructure, from its roots in high-performance shared storage and data protection and archive solutions. Don’t miss this chance to hear Mr. Lerner’s take on the state of the market, where the market is heading, and how Quantum uniquely fits in.
  • 5 Ways LTE & 5G are Changing the Branch
    5 Ways LTE & 5G are Changing the Branch
    Anthony Lawson, Technical Marketing Engineering Manager, Cradlepoint May 29 2019 4:00 pm UTC 60 mins
    From large retailers and restaurant chains to financial service companies and many others, most organizations with lots of locations understand that LTE has become a crucial part of branch networking. But where is LTE’s “sweet spot” in branch settings?

    Join Cradlepoint’s Anthony Lawson, Technical Marketing Engineering Manager, for a live webinar exploring the best ways to maximize the benefits of LTE within branch network architecture. You’ll learn how other companies are winning with wireless WAN and and getting on the pathway to 5G.
  • Uptime Institute 2019 Data Center Industry Survey Results
    Uptime Institute 2019 Data Center Industry Survey Results
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer May 29 2019 4:00 pm UTC 60 mins
    The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
  • What the WAF?  Understanding and augmenting what the WAF cannot see
    What the WAF? Understanding and augmenting what the WAF cannot see
    Erik Costlow, Principal Product Evangelist, Contrast Security May 29 2019 5:00 pm UTC 60 mins
    In this webinar we will uncover why WAFs exist and go through architectures of a WAF, Cloud Native vs. On-Premise and of Self-Defending Applications. We’ll highlight what WAF’s can and cannot see and why they require augmentation to function to their fullest. We’ll also investigate into the three types of WAFs and highlight their similarities and differences:

    - Traditional WAF
    - “Next-Gen” WAF
    - Cloud WAF

    We will also discuss the commonalities and disparities of Cloud and on-premise WAF’s and present some best practices, deployment strategies and management for each. Additionally we’ll highlight WAF augmentation and underscore why you need to secure within the application instead of just in front and how Contrast’s platform can see things that are “invisible” to WAFs and comparing the different approaches to application protection.

    The webinar will illustrate how Runtime Application Self-Protection (RASP) works from within the application via instrumentation in production environments and show how easy it is to deploy in for DevOps, Cloud and Container environments. We will also illustrate why RASP is more accurate than a WAF, so you can block attacks out-of-the-box quickly, economically and effectively.
  • RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    Alan Kerr, Senior Solutions Architect at StablePath & Jim Barnes, Director of IT at RSD May 29 2019 6:00 pm UTC 60 mins
    REGISTER NOW to hear the Storage Success Story of RSD, Refrigeration Supplies Distributor and DataCore partner, StablePath.

    The webinar is on May 29th at 2 pm EST. Learn More.

    Meet Refrigeration Supplies Distributor, the largest independently owned refrigeration parts and HVAC equipment wholesaler in the western United States. RSD recently celebrated 112 years in business.

    Meet DataCore partner, StablePath. This California based DataCore reseller has nearly two decades of experience in the IT industry. They have built their solid reputation leveraging best-of-breed technology and services.

    With the help of StablePath, RSD strives to set the mark for customer service. Having a world-class IT infrastructure is a critical element in achieving 100% customer satisfaction!

    ​​The RSD Challenge. Before implementing DataCore software-defined storage, RSD was running production data, including its business-critical ERP system on EMC storage and Veeam backups on tape. However, having a dual-controller single-disk array configuration would cause IT to run into problems, slowness and experience failures continually. They needed a faster solution.

    The StablePath Solution for RSD. A large part of the RSD infrastructure upgrade involved virtualizing the ERP system among others, and a key consideration was the performance needed to power this business-critical asset. The ERP provider ran initial tests with DataCore software-defined storage for RSD, and the results were shocking—not only did it meet the existing performance needs, but it also sped up the system significantly. Plus, their Veeam backups ran 3X faster than before. As a result, RSD experienced:

    Increased Performance, Zero Downtime
    Faster Backups and Comprehensive Disaster Recovery

    Also, remember, all attendees will have the chance to win a $200 gift card.

    See you on the webinar!
    -DataCore Team

    If you have any questions, reach out to us at Info@DataCore.com or +1.954.377.6000.
  • 15 Minutes: Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra
    15 Minutes: Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra
    Storage Switzerland and DriveScale May 29 2019 8:00 pm UTC 30 mins
    Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra to Drive Down Cloud Data Center Costs

    Hyperscale applications like Elastic, Hadoop, Kafka and Cassandra typically use a shared nothing design where each node in the compute cluster operates on its data. Hyperscale architectures, to maximize storage IO performance, keep data local to the compute node processing the job. The problem is that the organization loses the efficiency of shared storage infrastructure. As the hyperscale architecture scales, overprovisioned and underutilized compute, GPU and storage resources cost the organization money!

    Join Storage Switzerland and DriveScale for our 15 minute webinar to learn how composable infrastructure can provide both high performance and high efficiency.

    In 15 minutes learn:
    - The challenges facing hyperscale architectures
    - The true cost of underutilized compute and storage
    - Why fast Ethernet networks are good for your data
    - How a composable architecture brings scale, performance and cost efficiency to your data center
  • Hiperkonwergencja - jak ją zabezpieczyć? Commvault i Nutanix
    Hiperkonwergencja - jak ją zabezpieczyć? Commvault i Nutanix
    Grzegorz Szostak, Presales rozwiązań Commvault, S4E May 30 2019 8:00 am UTC 75 mins
    Systemy hiperkonwergetne integrują w jeden organizm, serwery, pamięć masową oraz funkcje sieciową. Tak inteligetne systemy należy odpowiednio zabezpieczyć. Podczas webinarium zaprezentujemy jak dwaj liderzy swoich rynków integrują i uzupełniają się
  • Control Room: everything you need to know (and more)
    Control Room: everything you need to know (and more)
    Christian Wells, Senior Product Consultant and Denis Dennehy, Customer Success Director, Blue Prism May 30 2019 3:00 pm UTC 75 mins
    The Control Room is Blue Prism’s command center: it provides a centralised administration console for controlling, monitoring, executing and scheduling automated processes to the Digital Workforce as well as an overall hub for resource management.

    Often underutilized, understanding the Control Room is critical to reaching the full potential of your Connected- RPA Digital Workforce.

    But why getting the best out of your Control Room so important?

    - Scheduling allows for time critical processes to be completed within defined SLAs even during peak volumes without the need to recruit for overtime or out-of-hours human workers.

    - Digital Workers can be allocated to certain processes or can put to work across all processes like a multiskilled worker dependant on volumes. This allows for you to be reactive according to business needs.

    - You have access to all run data and run logs that can tell you exactly what actions have completed by your Digital Workforce; this can be more transparent than actions completed by the human workforce and ensures full auditability of processes automated.

    - It is a real time view of what your Digital Workforce is currently working on, at what speed and how effective it is.

    In this webinar, we’ll be helping you get to the next level with your usage of the Control Room, covering everything you need to know (and more), including:

    - Delivery Methodology

    - Service Model definition of Business as Usual activities and the role of the Controller

    - Controller's Collateral - Operation Handbook and Contingency Planning

    - Control Room Overview

    - Filters

    - Logs

    - Reports

    - Staffing Model: Difference between the Controller (monitoring) and Lead Controller (Scheduling, Resource Management)

    - Christian Wells, Senior Product Consultant, Blue Prism
    - Denis Dennehy, Customer Success Director, Blue Prism
  • Demonstration of How to Enable On-Demand Workflows
    Demonstration of How to Enable On-Demand Workflows
    Adrian "AJ" Herrera, VP Marketing, and Jose Juan Gonzalez Marcos, Sales Engineer May 30 2019 4:00 pm UTC 60 mins
    Organizations across all industries are struggling with enabling instant on-demand access to archived video. Workflows relied upon for years, based on tape, are becoming too difficult to manage and video assets are taking longer and longer to recall. The cloud is an option but compounding recurring costs, bandwidth limitations and asset security are valid concerns. The solution is on-prem object storage. In this webinar, you will learn how to plug object storage into digital asset management solutions via the Amazon S3 interface. You will also learn how to consolidate video archives, enable private streaming and provide video-on-demand (VOD) directly from the archive layer.
  • Dell EMC Midrange Storage
    Dell EMC Midrange Storage
    Brian Summers - Storage Field Marketing Manager, Dell EMC May 30 2019 4:00 pm UTC 60 mins
    We will briefly discuss the evolution of storage to understand how the industry has arrived at the modern storage solutions we see today. Then we will take a close look at Dell EMC midrange storage offerings to better understand where these products fit in the overall Dell EMC storage portfolio.

    Presented by: Brian Summers - Storage Field Marketing Manager, Dell EMC
  • [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    Colin Whittaker, IRD; Richard Bird, Ping Identity; Teju Shyamsundar, Okta, Jerrod Chong, Yubico; and Andy Smith, Centrify. May 30 2019 5:00 pm UTC 75 mins
    The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

    To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:

    - Securing access at all points across applications, devices, users and environments.
    - Sharing insights across security systems to strengthen security.
    - Collecting and analyzing information to stop attacks.
    - How MFA can transform secure access—to any application, from any device, anywhere, at any time.
    - Strengthening identity assurance with privileged users.
  • Work at Full Speed with Our New Latitudes
    Work at Full Speed with Our New Latitudes
    Craig Richardson - Client Solutions Management, Dell EMC May 30 2019 6:00 pm UTC 32 mins
    Small, stylish and light products designed with the latest advances in engineering including Express technology for increased performance, and future-ready connectivity. Our systems ensure users can work faster anywhere.

    Not only do our machines have intelligent manageability and security features that are trusted by IT, but they are designed for long life-cycles, thereby reducing waste and recycling costs.

    With a choice of form factors workers will be proud to carry, we offer total solutions of laptops, 2-in-1s and ecosystem products for the many ways users work.

    Presented by: Craig Richardson - Client Solutions Management, Dell EMC
  • Ищем проблемные точки в инфраструктуре клиента
    Ищем проблемные точки в инфраструктуре клиента
    Дмитрий Иванюк, эксперт по решениям Commvault May 31 2019 8:00 am UTC 60 mins
    Уважаемые коллеги!

    Приглашаем Вас и ваших коллег принять участие в вебинаре для представителей Sales-департамента «Ищем проблемные точки в инфраструктуре клиента».

    Дата: 31 мая
    Время проведения: 11.00-12.00
    Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.

    Курс предназначен для BDM, менеджеров по продажам, руководителей проектов, руководителей продаж.

    Посетите вебинар и вы узнаете:
    •как заинтересовать в решении Сommvault
    •определить необходимость выбора решения Сommvault
    •подробнее о миграции и битве с конкурентами
    •Важная проблема Клиента- «защита информации»
    •портрет потенциального заказчика
    •обзор различных сценариев продаж
  • 15 Minute Webinar: What Are Composable Infrastructures?
    15 Minute Webinar: What Are Composable Infrastructures?
    Storage Switzerland, Kaminario May 31 2019 5:15 pm UTC 15 mins
    IT professionals are hearing a lot about composable infrastructures and many vendors are claiming to offer a solution, but only a few have truly composable solutions ready for deployment today. The goal of composability is to bring the cloud like infrastructure experience to the on-premises data center so that mission-critical workloads can benefit.Join Storage Switzerland and Kaminario for our next 15 minute webinar. During this webinar listen in as our panel of experts discuss what composable infrastructures are, how they have evolved and most importantly what to look for in a composable solution.

    Register to receive an exclusive copy of Storage Switzerland’s latest eBook “Developing a Cloud-Like Experience for Mission Critical Data.”
  • Identity Verification and Authentication: Balancing Compliance and Convenience
    Identity Verification and Authentication: Balancing Compliance and Convenience
    Melisande Mual | The Paypers, Berit Svendsen, Vipps | Husayn Kassai, Onfido Jun 3 2019 11:00 am UTC 75 mins
    Organisations are often challenged with finding the right balance between innovating and staying secure. How are cutting-edge advancements revolutionising the way we look at identity and authentication?

    Join the panel to hear about:

    -Understanding the digital identity landscape
    -How to avoid drop-off during the verification process
    -How developments like biometrics, AI, blockchain can impact identity and data management
    -How to adapt and respond to new regulations like PSD2, Open Banking, and GDPR

    Panel moderated by: Melisande Mual, Founder at The Paypers,
    Berit Svendsen, EVP International Business at Vipps
    Husayn Kassai, CEO & Founder, Onfido
    Panelist to be announced
  • The Office 365 Dilemma – How Secure is Secure?
    The Office 365 Dilemma – How Secure is Secure?
    Sunil Choudrie, Senior Strategist, Symantec Jun 4 2019 5:00 am UTC 31 mins
    Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.

    The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.

    Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.

    Register Today
  • Fraud beyond finance: multi-industrial approach to prevention
    Fraud beyond finance: multi-industrial approach to prevention
    Tim Ayling, Global Head of Fraud Prevention Solutions, Kaspersky Lab Jun 4 2019 5:00 am UTC 29 mins
    When it comes to discussions related to fraud, we think about the finance first. Financial institutions historically have suffered the most being the targets of various criminal schemes, malware, social engineering, money laundering and other fraud vectors.

    However, nowadays we see that organizations across different industries are suffering reputational, financial and other damages caused by fraud. Government agencies, healthcare organizations, retail and e-commerce, loyalty schemes, gaming industry and gambling rooms report cases of account takeover, new account fraud, even money laundering related attacks. Most of them have fraud prevention measures in place to fight or at least to monitor this. But fraud has evolved into a form of organizational crime and attackers offer training and knowledge sharing to help find a way past well-known fraud management solutions.

    At the webinar we are going to cover the most up-to-date threat landscape for different types of businesses and share some real cases of success.
  • ​Email-alapú támadások: nincs minden veszve!
    ​Email-alapú támadások: nincs minden veszve!
    ​Istvan Nemeth, CTO Biztributor Jun 4 2019 8:00 am UTC 45 mins
    Folyamatosan emelkedik a célzott phishing támadások száma – mert működnek. A közelmúltban gyors és drámai váltást láthattunk a hagyományos széles spam támadások felől a célzott, email-alapú phishing támadások felé. E támadások már jelentős pénzügyi, működési és márka-károkat okoznak a szervezetnek világszerte.

    A közelmúlt leghírhedtebb kibertámadásai – beleértve a múlt heti Binance-támadást is – úgy kezdődtek, hogy valaki egy spear-phishing emailre kattintott. A sikeres spear-phishing támadások átlagos költsége: 1,6 millió dollar.

    Nézd meg az elő webinart, amelyben a biztributor CTO-ja, Német István veszi át a támadási vektor főbb jellemzőit és a modern védelmi mechanizumusokat. A témából:
    -email-alapú támadások trendjei
    -új típusú fenyegetések
    -a FireEye Email Security egyedi megközelítése
    -best practice-ek, tanulságok éstapasztalatok
  • Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A
    Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies Jun 4 2019 8:30 am UTC 30 mins
    Any merger or acquisition poses daunting challenges to IT leaders. Not only are they tasked with integrating people, processes and technology in the shortest possible time frame, they must also remain vigilant about addressing the added cybersecurity risks.

    Join this interactive 1-2-1 discussion where systems engineering expert, Wallace Sann will share how to minimise the cybersecurity risk factor in M&A including;

    Who are the key decision makers in the M&A process and what are the different/new challenges they’re facing?
    What has historically been the risk focus for acquiring companies, and how is that focus changing?
    How can companies as a whole minimize cyber risk and protect themselves during the M&A process?
    Are there any opportunities for IT teams to reduce cyber risk during an M&A?
    What does Forescout recommend companies do in order to enhance their cybersecurity posture when preparing for an acquisition?
    With the explosion of IoT devices across industries, should there be more concern around connected devices during an acquisition?