Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Are you ready for GDPR?
    Are you ready for GDPR? Lockpath Recorded: Nov 22 2017 1 min
    Visit https://lockpath.com/gdpr-checklist for more information on GDPR.

    Gophers Dance Practically Right?

    Giant Dinosaurs Prance Righteously?

    NO!

    General Data Protection Regulation. An EU data protection regulation that probably affects you and your business.
  • Kaspersky Lab’s Industry and Technology Threat Predictions for 2018
    Kaspersky Lab’s Industry and Technology Threat Predictions for 2018 David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab Recorded: Nov 22 2017 52 mins
    Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
    The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
    The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
  • Organizing and Optimizing ITSM Toolsets
    Organizing and Optimizing ITSM Toolsets Manish Kalra, Director of Product Marketing, PagerDuty Recorded: Nov 22 2017 29 mins
    Service Management (ITSM) is an approach for designing, delivering, managing and improving the way IT is used within an organization. To make that approach a reality, a core requirement is having the right strategic toolset for your unique organizational needs.

    But are the right tools to choose to help you deliver optimal services and keep your application and critical infrastructure available? How do you organize all the information these tools are feeding your organization everyday?

    Join PagerDuty as they take you through what it takes to:

    ●Consolidate multiple ITSM services into one hub
    ●Support a 2-speed IT infrastructure and multiple ITSM processes within a single organization
    ●Evaluate integrations and flexibility of potential toolsets
  • Bringing Order to the Chaos of Audit Management
    Bringing Order to the Chaos of Audit Management Sam Abadir, Director of Product Management, LockPath Recorded: Nov 21 2017 56 mins
    Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.

    This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.

    In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
  • Streamline Your Audit Process With Lockpath Keylight
    Streamline Your Audit Process With Lockpath Keylight Lockpath Recorded: Nov 21 2017 2 mins
    Manage Internal Audits Effortlessly & Effectively with the Lockpath Keylight Platform.

    Visit Lockpath.com/solutions/audit-management for more info.
  • Digital Transformation Enablers: IoT Analytics and Autonomic Actuation
    Digital Transformation Enablers: IoT Analytics and Autonomic Actuation Kevin Curtis, Distinguished IoT Architect - Connected Cities, Verizon Enterprise Solutions (VES) Recorded: Nov 21 2017 25 mins
    Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
  • The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks
    The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks Daniel Disney Recorded: Nov 21 2017 46 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 3 - Social Selling Top Tips & Tricks

    From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
  • Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet
    Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet Alexander Peters, Symantec (Deutschland) GmbH; Sven von Kreyfeld, Symantec (Deutschland) GmbH Recorded: Nov 21 2017 52 mins
    Im Webinar erfahren Sie:
    •Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
    •Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
    •Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
    •Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
    Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Hintergrund:
    Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
    Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.

    Wir freuen uns auf Sie!
  • Анонс Commvault HyperScale  и HyperScale Appliance
    Анонс Commvault HyperScale и HyperScale Appliance Денис Корнеев, технический консультант Commvault Recorded: Nov 21 2017 31 mins
    Встерчайте мощное горизонтально-масштабируемое инфраструктурное решение для корпоративных дата-центров!

    Современные потребности в хранении вторичных данных и повышении эффективности их использования заставляют искать альтернативу традиционным специализированным устройствам с вертикальным масштабированием. Альтернативу, способную обеспечить новые подходы к управлению постоянно увеличивающимися объемами данных. Продолжая традицию инноваций в защите данных, мы рады представить два уникальных инфраструктурных решения, способных заменить устаревшую архитектуру вертикального масштабирования простой, эффективной, гибкой и отказоустойчивой платформой.

    В рамках вебинара вы узнаете:
    • Как защитить и обеспечить безопасность перемещения рабочих нагрузок между инфраструктурами разных типов
    • Как сократить расходы и увеличить масштабируемость и динамичность ИТ
    • Как повысить доступность и скорость послеаварийного восстановления данных
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Recorded: Nov 21 2017 44 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • AI and the Scientific Method for Cyber Investigation Automation
    AI and the Scientific Method for Cyber Investigation Automation Shawn Riley, Chief Data Officer | Cybersecurity Scientist at DarkLight Recorded: Nov 16 2017 48 mins
    "Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.
  • Digital GRC: Innovations for Early Identification and Management of Risk
    Digital GRC: Innovations for Early Identification and Management of Risk Moderated by Colin Whittaker; Yo Delmar, MetricStream; Jason Ford, Contegix; and Cameron Jackson, Riskonnect Recorded: Nov 16 2017 62 mins
    Attendees can earn 1 CPE credit on this session.

    Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.

    The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • Why you need to stop copying data forever.
    Why you need to stop copying data forever. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Nov 16 2017 56 mins
    Whether you keep your enterprise data in the cloud, on-prem or in a hybrid environment, chances are, you’re making more copies than you’d like to.
    Of course, you must meet data protection requirements. Unfortunately, what sounds like a two-step process – store the data and back it up – often multiplies into many more steps with many more copies. And every time you duplicate your data, you increase your costs.

    In this webcast, we’ll look at why this is and what your options are to stop copying data and start accessing it.
  • NetCloud Manager Enterprise: New Capabilities for an Elastic Edge
    NetCloud Manager Enterprise: New Capabilities for an Elastic Edge Cradlepoint's Mike Hagman, Bryan Embrey and Mack Lyons Recorded: Nov 16 2017 50 mins
    Join the Cradlepoint team for a live webinar on November 16, 2017, at 9am PT for an introduction to Cradlepoint's new tier, NetCloud Manager Enterprise, and new features available within NetCloud.
     
    Webinar attendees will learn about:
    — New tier and features in NetCloud Manager Enterprise
    — How Cradlepoint NetCloud Manager Enterprise enhances branch office and in-vehicle networking
    — New naming and features in NetCloud Perimeter (formerly NetCloud Engine)
  • Hedvig Introduction with CEO & Founder Avinash Lakshman
    Hedvig Introduction with CEO & Founder Avinash Lakshman Avinash Lakshman, Eric Carter Recorded: Nov 16 2017 51 mins
    Intro webinar and demo featuring Hedvig CEO and co-founder Avinash Lakshman. Learn how software-defined storage transforms your data center and delivers more agile and lower cost data management for VMware and Docker, spanning on premises and public cloud.
  • Cyber Security Is Dead
    Cyber Security Is Dead Chris Vickery, Director of CyberRisk Research at UpGuard Recorded: Nov 15 2017 44 mins
    The data is in: cybersecurity is dead. Even as global cybersecurity spending is expected to balloon to over $100 billion by 2020, the frequency and severity of cyberattacks continue to grow, with seemingly no end in sight.

    While exploits and hacking tools become even more widely available and simple to deploy, there has been little commensurate progress in beating back attackers, who continue to find success striking at persistent, common weak points. How is this possible?

    The answer is one that must chagrin any CISO spending exorbitant amounts of money on cybersecurity programs: The entire conception upon which cybersecurity rests -- of constructing a castle, against which any marauding attackers stand little chance of breaching -- is barely of use.

    Join UpGuard’s Director of Cyber Risk Research Chris Vickery in conversation to learn:

    - Why silver bullet security solutions that are stacked around the perimeter don’t protect against breaches
    - How data exposures occur, and how they can be prevented
    - Why vendor risk should be an integral part of the cyber risk assessment
    - What steps to take to become cyber resilient
    - How UpGuard can help
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Recorded: Nov 15 2017 48 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
  • Multi-cloud Primary Storage: Avoid lock-in while shifting apps to the cloud
    Multi-cloud Primary Storage: Avoid lock-in while shifting apps to the cloud Senior Analysts Jeff Kato and Jeff Byrne Recorded: Nov 15 2017 54 mins
    As the result of extensive primary end-user and multi-vendor research, including responses from 700+ IT decision makers, Taneja Group has learned that an increasing number of organizations are more motivated than ever before to move their applications in the cloud. However, they prefer to easily move those applications between on-premises and multiple clouds without having to modify the underlying storage infrastructure.

    Join us as we unpack this emerging market category along with SoftNAS, one of the vendors at the forefront of this trend.

    In this webinar we’ll cover:

    • How multi-cloud primary storage can span multiple cloud environments and mitigate the risk of moving to the public cloud

    • Lifting and shifting applications to a single public cloud or multiple public clouds without re-engineering the applications

    • Why the SoftNAS Cloud Data Platform enables enterprise on-premises file services to be collocated in public clouds

    About your hosts:
    Taneja Group’s Senior Analysts Jeff Kato and Jeff Byrne will discuss the research behind the Taneja Group’s Multi-Cloud Primary Storage market category. They will be joined by Rick Braddy, Founder, CEO and CTO at SoftNAS, who will describe how the SoftNAS Cloud Data Platform provides the best pathway to shift applications among on-premises, AWS, and Azure clouds.
  • Amazon re:Invent for Storage Professionals - Three Capabilities to Look For
    Amazon re:Invent for Storage Professionals - Three Capabilities to Look For George Crump (Storage Switzerland), Mark Eastman (Avere Systems), Erik Pounds (Swiftstack) Recorded: Nov 15 2017 64 mins
    The sixth year of Amazon RE:Invent is almost upon us (November 27 to December 1 in Las Vegas). In this webinar join Storage Switzerland, Avere Systems and SwiftStack for a storage professional’s guide to the event.


    Learn about:
    - The different tiers of the Amazon storage offering
    - How to create hybrid cloud storage combining private and public offerings
    - Learn how to interconnect multiple cloud providers
  • Amazon RE:Invent for Storage Professionals - Three Capabilities to Look For
    Amazon RE:Invent for Storage Professionals - Three Capabilities to Look For Storage Switzerland, Avere Systems, SwiftStack Recorded: Nov 15 2017 64 mins
    The sixth year of Amazon RE:Invent is almost upon us (November 27 to December 1 in Las Vegas). In this webinar join Storage Switzerland, Avere Systems and SwiftStack for a storage professional’s guide to the event.

    Learn about:
    - The different tiers of the Amazon storage offering
    - How to create hybrid cloud storage combining private and public offerings
    - Learn how to interconnect multiple cloud providers
  • Mitigating Risk in Security Operations through Policy-based Automation
    Mitigating Risk in Security Operations through Policy-based Automation Karen Crowley, Sr. Product Marketing Manager, Tufin & Erez Tadmor, Sr. Product Manager, Tufin Recorded: Nov 15 2017 40 mins
    Come along with us as we embark on the journey to policy-based automation.

    Manual policy changes are time-consuming, error-prone and can lead to network vulnerabilities. Automation holds the key to reducing errors, increasing performance, and improving security and continuous compliance, but it must be approached in the right way.

    Register now to learn how to automate your network security policy processes and make policy changes in minutes instead of days (or even weeks).

    We will address how to:

    Perform proactive risk analysis to avoid security policy violations
    Increase control and support of hybrid enterprise platforms – including traditional networks and firewalls, SDN & cloud platforms
    Provide automated provisioning and end-to-end orchestration for multi-vendor environments to reduce complexity and human error
    Reduce time and effort required for audit readiness by up to 70% through continuous compliance and an automated audit trail
    Join us. Whether your goal is to just get started, or to partially or fully automate your processes, we will show you how to plan your journey towards policy-based automation.

    Maya Malevich
    Director of Product Marketing, Tufin
  • Kaspersky Lab’s Advanced Targeted Threat Predictions for 2018
    Kaspersky Lab’s Advanced Targeted Threat Predictions for 2018 Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab Recorded: Nov 15 2017 64 mins
    Kaspersky Lab will share its predictions for what the world’s most dangerous threat actors could have planned over the coming year.
    The session will provide unique intelligence on the tools and techniques likely to be deployed by attackers against government organizations, enterprises, critical infrastructure, society at large, and more – and what this means for organizations, the security community and international cyberspace.
    The aim of the webinar is to stimulate debate among IT security professionals in all industries, and to increase awareness and understanding that will help them to defend their organization against these threats.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 23 2017 5:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait Nov 23 2017 3:30 pm UTC 45 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Nov 28 2017 5:00 am UTC 60 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • Les 5  conseils essentiels sur la restauration des données du cloud
    Les 5 conseils essentiels sur la restauration des données du cloud Bruno Gauthier Nov 28 2017 8:30 am UTC 45 mins
    « Votre cloud a un problème ! » : c’est l’appel que redoute tout service informatique, qu’est-ce que vous pouvez faire, quand est-ce qu’il sera de nouveau disponible ?
    De ce fait, vous avez absolument besoin d’une protection et d’un plan de reprise de vos données dans le cloud, car chaque indisponibilité se traduit par une baisse de votre activité et/ou de votre chiffre d’affaire. La majorité des organisations ont mis en place des politiques de sauvegarde efficaces on-premises, mais la plupart n’étendent pas ces politiques au cloud.
    Que vous ayez des données critiques à travers différents clouds ou seulement quelques informations, il est essentiel pour un service informatique de comprendre les mécanismes de récupération des données du cloud.
    Participez au webinaire Commvault présentant les 5 conseils essentiels sur la restauration du cloud, pour vous permettre de mieux contrôler la disponibilité de vos données depuis les environnements clouds et on-premises.
  • The Race for 5G
    The Race for 5G Peter Jarich, Chief Analyst, Global Data Nov 28 2017 6:00 pm UTC 30 mins
    Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
  • Webinar in italiano - The Next Level of Smarter Endpoint Protection
    Webinar in italiano - The Next Level of Smarter Endpoint Protection Marco Rottigni, Senior Manager, Product Marketing, FireEye Nov 29 2017 1:30 pm UTC 45 mins
    Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
     
    Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
    • Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
    • Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
    -AV con Threat Intelligence
    -Detection e Response
    -Behaviour e Exploit
    -Visibilità e automazione
    • Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
     
    Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
  • Data Breach Under GDPR: How threat intelligence can reduce your liabilities
    Data Breach Under GDPR: How threat intelligence can reduce your liabilities Nahim Fazal and Pedro López Nov 29 2017 3:00 pm UTC 45 mins
    There has been an important clarification around what constitutes a data breach listen in to update yourselves and ensure you don’t fall foul of the regulation.

    When the legislation comes into effect in May 2018, compromised data will be among the most seriously regulated and highly penalized issues a company can face, so a practical and coherent understanding of the regulation is critical to mitigating any penalties your organization will face.

    In our latest webinar, Blueliv’s Head of Cyber Threat Intelligence, Nahim Fazal, and Legal Expert Pedro López will be providing specialist insight and guidance around aspects of GDPR specifically relating to a data breach. Building on our recent whitepaper, they will explain how to plan and manage the impact of the incoming updated legislation on your business.

    Pedro López is an expert in legislation relating to cybersecurity. When it comes to GDPR, the devil is truly in the detail, and he’ll be explaining how to ensure compliance without getting lost in jargon.

    Nahim Fazal’s experience in the industry enables him to explain not just how to mitigate the consequences of a data breach, but how to reduce the risk of exposure and ensure that any losses – from customers to financial to reputational – are minimal.

    The webinar will be followed by a short Q&A and demonstration of how threat intelligence can shield your organization from the worst impact of the updated GDPR.

    Presenters:
    Pedro López, Legal Advisor and GDPR expert at Martin Andino Law firm
    Nahim Fazal, Cyber Security Development Manager at Blueliv
  • Protection des Endpoint, dotez-vous de l'expertise nécessaire
    Protection des Endpoint, dotez-vous de l'expertise nécessaire Lluis Coma, Systems Engineer, FireEye Nov 30 2017 1:00 pm UTC 45 mins
    La protection Antivirus a été l’une des fondations de la sécurité des Endpoints depuis des années, on sait aujourd’hui que celle-ci est nécessaire mais non suffisante.
    L’évolution de la menace oblige à repenser la sécurisation des Endpoints en mettant en place différents moteurs de protections capables de répondre à différents types de menaces.
    Cette évolution force aussi le constat « que 100% de sécurité n’existe pas » et qu’il faut donc se doter de solution d’investigations et de réponses à incidents aux niveaux des Endpoints en support de ces moteurs de protections.

    Jeudi 30 Novembre, Lluis Coma, Ingénieur FireEye, détaillera :

    - Les enjeux sur les Endpoints aujourd’hui
    - Les fonctionnalités de protections nécessaires pour une améioration de sa posture de sécurité
    - Les fonctionnalités d’investigations et d’analyses permettant une réaction rapide et une limitation des impacts
    - Les modifications de processus et d’organisations pour mettre en place une approche de « Hunting » proactive.

    Un webinar vous permettant de béneficier de l’experience FireEye appliquée au Endpoint.
  • Making Your Move Part 3 : Keeping Your Head in the Clouds
    Making Your Move Part 3 : Keeping Your Head in the Clouds Lilac Shoenbeck & John Mutchek Nov 30 2017 6:00 pm UTC 60 mins
    This hour-long presentation will cover the basics of ground-to-cloud and cloud-to-cloud data migrations. We’ll show you the best ways to avoid the most common pitfalls associated with each type of move. You’ll learn how simple it can be to sidestep the dreaded problem of vendor lock-in, and you’ll see how to use automation to your greatest possible advantage.
  • What does it mean to be hybrid and multi-cloud in 2018?
    What does it mean to be hybrid and multi-cloud in 2018? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Nov 30 2017 6:00 pm UTC 60 mins
    As 2018 approaches, the era of multi-cloud has arrived. With virtually all the tech leaders and innovators offering robust cloud solutions, there have never been more options for organizations looking to move workloads to the cloud. That makes it easier than ever for companies to avoid vendor lock-in and provision the exact services they want, from whomever they want.

    In this webcast, we’ll discuss how application concerns, cost savings and security will make 2018 the year of multi-cloud and what it will mean for enterprises.
  • Extending the Enterprise WAN into AWS
    Extending the Enterprise WAN into AWS David Klebanov, Director of Technical Marketing at Viptela Nov 30 2017 6:00 pm UTC 45 mins
    As companies shift towards the cloud for their application environments, IT organizations are tasked with finding the most effective methods and solutions to quickly and securely connect their corporate networks to external cloud environments while maintaining the integrity of their corporate security models. Digital transformation and software-defined options are driving IT teams to re-think the existing direction of their WAN to cost-effectively connect to multiple and geographically diverse VPCs. In this session, we outline a solution we’ve recently implemented which includes the adoption of an SDN methodology when securely connecting to geographically diverse VPCs with AWS Direct Connect and transit VPCs.
  • Leading through adversity and burnout to create a high performing security team
    Leading through adversity and burnout to create a high performing security team Sharon Smith, CISSP ITPG Secure Compliance VP, Cybersecurity Strategy and Advisory Services Nov 30 2017 6:00 pm UTC 60 mins
    Security professionals are constantly in a state of adversity, always trying to battle the unseen advisory with little resources and lack of understanding from leadership. Often there is little to no recognition of a job well done, because no one can see the results of a good security team, no breach. It is only when there is an issue that the lights shine on the security team and that is when everyone asks why is it going wrong? This makes leadership within security that much harder, how do you help a team that is up against constant adversity from burning out and leaving. In this webinar, Sharon Smith will discuss the Five Pillars of a high performance security team and how you as a leader can tap into these to help your team achieve more and get better results.
  • Breaking the Mould - New competencies to meet the needs of a changing landscape
    Breaking the Mould - New competencies to meet the needs of a changing landscape Mark Erskine Dec 5 2017 11:00 am UTC 60 mins
    Attendees will learn that in complex selling traditional sales competencies are no longer enough and they need to be recruiting and developing their people using a new set of sales competencies
  • Tech Demo: API Security with Imperva SecureSphere
    Tech Demo: API Security with Imperva SecureSphere Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert Dec 5 2017 6:00 pm UTC 45 mins
    APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
  • Weaving the Digital Threads:  Product Development Transforming Tech & Aerospace
    Weaving the Digital Threads: Product Development Transforming Tech & Aerospace Ajay Chavali, Managing Director| John Giubileo, Managing Director| Jeffrey Wheless, Research Senior Principal Dec 5 2017 7:00 pm UTC 60 mins
    Join a spirited webcast on how new trends in the high-tech & aerospace industries are transforming product development. With an increased emphasis on new connected products and services, a core priority for high-tech & aerospace companies today is the delivery of customer centric experiences powered by digital transformation. And, to be successful, they must master the “Digital Thread”—the flow of data fueling the insights behind these new customer experiences. Drawing on findings from a recent global survey of high-level executives in the aerospace & high-tech industries, Accenture will review how companies are leveraging Digital Thread and Digital Twin initiatives with enabling technologies and processes. Accenture will further present recommendations on essential components that organizations should employ to realize their Digital Thread strategic objectives.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Haluk Ulubay, Senior Dir., Marketing DataCore Software Dec 5 2017 7:00 pm UTC 60 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Artificial Intelligence and Machine Learning Get Real
    Artificial Intelligence and Machine Learning Get Real Dominic Marion, Operations Support and Release Manager, NBC News & Lilia Gutnik, Product Manager, Data Experience, PagerDuty Dec 6 2017 8:00 pm UTC 60 mins
    Too often the terms machine learning and AI are associated with complex black box algorithms and models that no one seems to understand. PagerDuty is taking a more applied approach to machine learning – specifically focusing on real-life problems that users face. In this session, we'll talk about our recent release and future plans.

    You'll hear how we have delivered real, tangible value to some of our early customers using machine learning, advanced statistics, and sometimes, just simple math. No magic black boxes or unicorns and rainbows allowed.
  • Enabling Government to Deliver Digital Transformation
    Enabling Government to Deliver Digital Transformation Chris Ducker and Bill Shepard - Sungard AS Dec 7 2017 10:00 am UTC 45 mins
    This webinar takes a look at digital transformation for the Public Sector - how can you succeed and what challenges will you face? We also give a real world example of how digital transformation has worked for one of our clients.
  • Bereitstellung erweiterter Sicherheitsfunktionen für Unternehmen jeder Größe
    Bereitstellung erweiterter Sicherheitsfunktionen für Unternehmen jeder Größe Ruediger Weyrauch, Director, Central Europe System Engineering; Kai Kudlek, Senior Systems Engineer Dec 7 2017 2:00 pm UTC 45 mins
    Bereitstellung erweiterter Sicherheitsfunktionen für Unternehmen jeder Größe: FireEye Helix

    Bereits etablierte Sicherheitsmaßnahmen sind selten miteinander verknüpft und werden durch eingeschränkte Sichtbarkeit und Fehlalarme beeinträchtigt. Das Resultat: Unternehmen sind nicht in der Lage, schnell Prioritäten zu setzen und effizent auf Bedrohungen zu reagieren. FireEye kann jedem Unternehmen dabei helfen, fortschrittliche Sicherheitsmaßnahmen zu etablieren und gleichzeitig die Kosteneffizienz der IT-Sicherheit zu verbessern.
    In diesem Live-Webinar erfahren Sie, wie eine zentralisierte Sicherheitsplattform:
    o die Transparenz Ihrer gesamten Cyber-Sicherheitsinfrastruktur verbessert
    o Kontext für die kritischsten Alarme anbietet und
    o die Verkürzung der Zeit von der Erkennung bis zur Reaktion durch eine bessere Entscheidungsfindung maßgeblich unterstützt.

    Erleben Sie zudem in einer Demo, wie Helix Alarme identifiziert und darauf reagiert.
  • Transforming the Digital Customer Experience
    Transforming the Digital Customer Experience Danny Johnson Director of Strategic Enterprise Networks, Verizon Enterprise Solutions Product Marketing Dec 7 2017 2:00 pm UTC 60 mins
    Digital transformation. It’s disrupting every industry and impacting how you deliver a great customer experience. Companies that ignore it risk their very survival; but those that embrace it can dramatically improve customer satisfaction and drive greater value. The truth is, keeping up with bandwidth demands and continuing innovation, while transitioning from manual processes to end-to-end digital processes, is extremely difficult on their own. Plus your customers have an expectation of your brand to be available 24x7 and deliver at any time of the day or night that they desire.

    Join our live webinar and learn:
    · Why digital transformation will only be successful if you begin with the customer in mind.
    · What digital technologies are being used by top companies to maximize customer satisfaction and drive revenues.
    · How to define the best approach to transforming the customer experience for your industry/organization.

    HOST
    Danny Johnson
    Director of Strategic Enterprise Networks, Verizon Enterprise Solutions Product Marketing

    PANEL
    Tim Stevens
    Global Lead for Vertical Marketing

    Forrest Carr
    Director of Business Innovation & Digital Experience
  • Exploring the Use Cases for Dell EMC VPLEX
    Exploring the Use Cases for Dell EMC VPLEX Bindu Tuli Dec 7 2017 5:00 pm UTC 75 mins
    This webinar will highlight the current use cases for VPLEX which include data mobility for technology refresh, availability within the data center and across distance, data center consolidation and relocation. In addition, we’ll touch on Storage Monitoring and Reporting for VPLEX which is included with every VPLEX system.
  • Enterprise Risk Assessments for Immediate Value and Results
    Enterprise Risk Assessments for Immediate Value and Results Yvette Connor & Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockPath Dec 7 2017 5:00 pm UTC 60 mins
    Enterprise-level risk assessments are a business necessity today in light of data breaches, global outsourcing, and regulatory compliance challenges like GDPR. In this webinar, LockPath and Focal-Point will discuss strategies and best practices for creating and leveraging enterprise risk assessments. Attendees will learn:

    • Common goals and objectives for enterprise risk assessments
    • How to define assessment metrics
    • When to determine if a risk assessment is needed
    • When to use an integrated assessment vs. an individual assessment

    This is a can’t miss webinar for anyone responsible for enterprise-level risk and concerned about threats to business operations.
  • FCIP (Extension): Data Protection and Business Continuity
    FCIP (Extension): Data Protection and Business Continuity Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade Dec 7 2017 6:00 pm UTC 75 mins
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions