Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • ChalkTalk Video - Primary Storage Should Protect Itself
    ChalkTalk Video - Primary Storage Should Protect Itself George Crump Recorded: Mar 23 2017 4 mins
    Storage that is protects itself aids in the data protection and disaster recovery processes without compromising traditional primary storage performance and features. It does this through a combination of its own capabilities (snapshots, basic replication as well as multi-site and synchronous replication) and by complementing or enhancing existing backup solutions – but not replacing them. While many storage systems have replication capabilities, self-protecting primary storage differs in the implementation of those replication tasks, the number of locations that can be a part of that task and the monitoring of those tasks to ensure successful completion.
  • RSA 2017 — Security and Availability
    RSA 2017 — Security and Availability Bryan Embrey, Senior Product Marketing Manager, Cradlepoint Recorded: Mar 23 2017 1 min
    At RSA 2017, Cradlepoint Senior Product Marketing Manager Bryan Embrey discusses security and five-nines availability that is cloud-monitored and cloud-managed through a single pane of glass.
  • RSA 2017 — All-in-One Solutions in Branches & Vehicles
    RSA 2017 — All-in-One Solutions in Branches & Vehicles Kevin Johnson, Solution Architect, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint Solution Architect Kevin Johnson talks about all-in-one network connectivity and security through Cradlepoint routers — both at the branch and in vehicles.
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience
    How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 37 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud
    Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Proving the Business Value of Network Transformation
    Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't)
    Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Recorded: Mar 23 2017 59 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore
    Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Uniting a global development workforce with Juniper
    Uniting a global development workforce with Juniper Dave Uebele, Juniper Networks, SCM Engineer and Russ Hill, WANdisco, SCM Specialist Recorded: Mar 23 2017 58 mins
    Join us to learn how Juniper Networks relies on WANdisco to unite a globally distributed development workforce within Subversion, delivering results such as:
    - A 24/7 Continuous Integration environment with zero Subversion downtime
    - Increased productivity and maximized valuable engineering time and efficiency
    - Eliminated the effects of network failures and the dependency on legacy backup procedures
  • BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare
    BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK Recorded: Mar 23 2017 11 mins
    BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo Breach and some of her suspected reasons why
    - The influence of the supposed Russian US election hack and what it means for cyber warfare
    - Diversity in the cyber industry and how it can be improved
    - AI & Machine learning and use cases for security
    - The key vulnerabilities in IoT networks that we should be thinking about
  • What does the European GDPR mean for businesses in Asia Pacific?
    What does the European GDPR mean for businesses in Asia Pacific? Brian Fletcher, Director - Government Affairs, Symantec and Thio Tse Gan, Practice Lead - Cyber Risk Services, Deloitte SEA Recorded: Mar 23 2017 55 mins
    With the advent of Big Data came not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data. This gave rise to the General Data Protection Regulation (GDPR), a modernisation and harmonisation of data protection laws in the European Economic Area.

    The GDPR gives individuals greater control over their personal data, while also streamlining regulation and fostering consumer trust in businesses. However, with implementation just around the corner in 2018, over 90% of businesses are still underprepared for compliance within the next two years(1).

    Join this webinar to learn about:
    •What GDPR entails and what the timelines are
    •Who's who in the protection of personal data
    •Business concerns with the GDPR
    •Key steps of the journey towards GDPR compliance
    •How Symantec Control Compliance Suite Assessment Manager (CCS AM) can help your organisation with GDPR compliance

    (1) Vanson Bourne Survey, 2016
  • Object Storage for Digital Evidence & Security
    Object Storage for Digital Evidence & Security Ryan Meek, Product Manager Recorded: Mar 22 2017 46 mins
    Caringo Product Manager Ryan Meek explains how object storage can be used for storing digital evidence and the benefits of using it as a secure, compliant repository for use in law enforcement, government, and health IT use cases.
  • 20/20 vision into your cloud security: CISO interview and case study
    20/20 vision into your cloud security: CISO interview and case study Maurice Stebila, CISO, IT Security, HARMAN International & Ralf Buchroth, RWE Supply and Trading Recorded: Mar 22 2017 55 mins
    With the growing adoption of private and public cloud platforms, many security teams feel that they are losing visibility and control. From the very basics of identifying which cloud services are being used, to the monitoring of security policies and potential violations, new solutions and procedures are required to regain control.

    Join us for this discussion of cloud security challenges and how they can be addressed. The webinar will feature an expert interview with Maurice Stebila, CISO at HARMAN International, who will share his insights and experience around security challenges in the cloud, much like he did recently at RSA conference in San Francisco.

    In the second half of the webinar, you will learn how one of Tufin’s customers, Ralf Buchroth, IT Infrastructure and Provider Management at RWE Supply and Trading, has deployed Tufin to address challenges of visibility and control in the cloud and across a hybrid network environment.
  • 3 Proven Workflows for A Successful Windows 10 Migration
    3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • The 5 Disaster Recovery Questions You’re Not Asking
    The 5 Disaster Recovery Questions You’re Not Asking Curtis Preston, Storage Switzerland Recorded: Mar 21 2017 62 mins
    Disaster Recovery as a Service (DRaaS) is changing the way data center administrators think about disaster recovery. A DR site and equipment no longer need to be bought in advance. DRaaS instead enables DR to be on-demand. The concept is so appealing that vendors are racing into the market claiming to offer DRaaS capabilities. But DRaaS is more than a simple check mark for a DR requirement. Organizations need to realize that how well the service performs is critical to successfully surviving a disaster.
  • BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization
    BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK Recorded: Mar 21 2017 10 mins
    BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and where companies are more vulnerable
    - DDoS and why it's still a key threat to businesses
    - The increased vulnerability of the IoT
    - Challenges for Donald Trump and his new cyber team
    - How to boost equality and diversity in the information security industry
    - How cloud and virtualization are changing the security game

    About the Speaker:
    Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
  • Top Ways Your All-Flash Array Can Save the Day
    Top Ways Your All-Flash Array Can Save the Day Caitlin Gordon and Scott Delandy Recorded: Mar 16 2017 61 mins
    Are you confident that your All-Flash Array is designed for resiliency and availability? Moving to an All-Flash Array does not mean risking your mission critical applications like Oracle, SAP and VMware. In this webcast, we’ll dive into how Dell EMC VMAX All Flash provides unparalleled availability with an architecture designed for your most demanding environments.
  • CTO PoV: Enterprise Networks (Part 2)
    CTO PoV: Enterprise Networks (Part 2) Khalid Raza, CTO & Co-Founder, Viptela & Danny Johnson, Director, Product Marketing: Network Services, Verizon Recorded: Mar 16 2017 45 mins
    In Part 2, the CTO PoV will focus on Security for IoT and Cloud in Enterprise Networks.

    IoT, Cloud and Mobile devices are stretching the traditional limits of IT security. As enterprise applications change and technology advances, the fundamental network infrastructure needs to support a robust security framework.

    Khalid Raza (CTO, Viptela) & Danny Johnson (Director, Verizon) share their Point of View on why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging security approaches designed around segmentation and policy can help organizations adapt to these changes. Enterprises can protect their Cloud and enterprise against attacks and data leaks while migrating to a cost-effective Hybrid architecture.

    In this webinar, we will cover:

    - The security threats around Cloud and IoT
    - Applications that are stressing enterprise network security requirements

    View Part 1 On-Demand: https://www.brighttalk.com/webcast/14779/247749
  • Real Life Use Cases for Object Storage, Media & Entertainment
    Real Life Use Cases for Object Storage, Media & Entertainment Adrian Herrera, VP of Marketing & Tony Barbagallo, VP of Product Recorded: Mar 16 2017 45 mins
    Caringo VP of Marketing Adrian Herrera & VP of Product Tony Barbagallo and explore how object storage is being used in the Media & Entertainment sector. They will present real-life use cases including how NEP The Netherlands is using the Caringo Swarm Cloud and Object Storage Platform for Content Delivery.
  • Operationalizing Threat Intelligence
    Operationalizing Threat Intelligence Igors Konovalovs, Sales Director, EMEA, FireEye iSIGHT Intelligence Recorded: Mar 16 2017 45 mins
    Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.

    Amongst other things this webinar will provide insight into:
    1. Importance of visibility over an entire attack lifecycle
    2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
    3. Key Threat Hunting skills and requirements
  • Une approche proactive et intelligente de la sécurité
    Une approche proactive et intelligente de la sécurité David Grout, Director, Southern Europe Systems Engineering, FireEye; Antonin Hily, MSSP Director, Sopra Steria Recorded: Mar 16 2017 41 mins
    La multiplication et la complexification des cyberattaques sur le marché français nécessitent de repenser la sécurité et passer d’un mode réactif à un mode proactif.
    Apporter de l’automatisation, de la contextualisation et de l’intelligence dans les process de détection et de réaction est clef pour gagner en vitesse et en précision et permettre ainsi une sécurité efficiente, capable d’anticiper et non plus de subir les cybermenaces.
  • [Live Panel] Threat Hunters in Action
    [Live Panel] Threat Hunters in Action Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance Recorded: Mar 16 2017 59 mins
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration
    BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration Chris Roberts, Chief Security Architect at Acalvio Technologies and Josh Downs, Community Manager at BrightTALK Recorded: Mar 16 2017 17 mins
    BrightTALK caught up with Acalvio Technologies security expert Chris Roberts for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and steps to take to avoid it happening to other companies
    - Communication between the techies and senior management
    - Cyber security lessons that the Trump administration could learn
    - The Russian hack of the US election
    - AI & Machine learning in Cyber Security
    - The need for regulation in the growing world of the IoT
    - Improving equality in the cyber security industry

    About the Speaker:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • Top Trends in Critical Infrastructure Threats & Security
    Top Trends in Critical Infrastructure Threats & Security Mari Galloway, VM Analyst & Pentester at Sands Corporation Recorded: Mar 15 2017 56 mins
    Critical infrastructure is the backbone of our nation's economy, security and health. As IoT/connected devices are becoming an integral element in our critical infrastructure, the risk of cyber attack and its impact increases by orders of magnitude.

    Join Mari Galloway, Vulnerability Management Analyst & Penetration Tester at Sands Corp to stay up to date on the latest trends in critical infrastructure exploitation and threats, and how to protect against them.

    Viewers will learn about:
    - National stance on securing critical infrastructure
    - Critical Infrastructure Protection (CIP)
    - Recommendations on improving security of critical infrastructure and control systems
    - Resources & organizations
  • Why Hackers Keep Winning
    Why Hackers Keep Winning Jon Hendren, Senior Security Researcher, UpGuard Recorded: Mar 15 2017 31 mins
    IDC predicts that one of every four people on Earth will be affected by a data breach by 2020. Yet a recent Nasdaq report found that “91% of Board Members at the most vulnerable companies can't interpret a cybersecurity report.” Given that breaches doubled in 2016, the knowledge gap between executives and IT must be bridged.

    Companies have responded to these attacks with various tools, such as anti-virus, malware and other endpoint protection, intrusion detection and prevention systems, and others. But despite these additions, data breaches have been increasing steadily over the past five years. This means that either the attackers are improving faster than multibillion dollar security vendors, or that traditional security mechanisms aren’t enough to protect enterprise data. Without direct visibility into the IT environment, non-technical executives can only trust in their technical leadership, who in turn must trust their technicians, who in turn must trust the technology itself, a trust that without hard data is at best an educated guess.

    About the presenter:

    Jon is an IT security and cyber risk evangelist at UpGuard. He doesn't *like* like risk, he just likes talking about it. More importantly, he likes talking about how it intersects with business risk, and how an accurate picture of cyber risk is one of the most important steps organizations can take toward proper cyber resilience.
  • BCI Horizon Scan 2017
    BCI Horizon Scan 2017 Patrick Alcantara (BCI) & John DiMaria (BSI) Mar 27 2017 1:00 pm UTC 60 mins
    What are the threats facing your organization? The Business Continuity Institute's annual Horizon Scan Report, in collaboration with BSI, outlines what the main threats are according to business continuity and resilience professionals worldwide, segmented by region, sector and size of organization. Read the report, and if you have questions or want a better understanding of what it means, then makes sure you tune into this webinar.
  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace
    7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Mar 28 2017 9:30 am UTC 45 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
    Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Charlie Hodges, Storage Switzerland Mar 28 2017 3:30 pm UTC 60 mins
    For most enterprises, optimizing your Windows fileserver means buying a new, bigger server with more capacity and better network connections. Or it means buying a dedicated Network Attached Storage (NAS) system. Then they feel they need to add new ransomware and data protection software. All of these "solutions" are expensive, involve a costly data migration and don't really increase IT efficiency. In this webinar, experts from Storage Switzerland and Caringo will teach you how data management can eliminate the need for additional Windows file servers, capacity and protection.
  • How to Automate Protection with Azure Cloud Backup and DRaaS
    How to Automate Protection with Azure Cloud Backup and DRaaS Dustin Sawicki & Jordan Pfingsten, Technical Solutions Professionals, Microsoft Mar 28 2017 6:00 pm UTC 60 mins
    Learn the ins and outs of Disaster Recovery as a Service with simple, automated protection and disaster recovery in the cloud.

    Your environment can be protected by automating the replication of the virtual machines based on policies that you set and control.

    Join this webcast to:
    - Learn how Site Recovery can protect Hyper-V, VMware, and physical servers, and how you can use Azure or your secondary datacenter as your recovery site
    - See how Site Recovery coordinates and manages the ongoing replication of data by integrating with existing technologies including System Center and SQL Server AlwaysOn
    - Understand the total picture of Disaster Recovery as a service (DRaaS)

    This webcast is part of our Think Tank Thursdays – DOE & DHS Dialogue webcast series. Sign up for this session, or the entire series today!
  • Getting Started with Hyperconverged
    Getting Started with Hyperconverged Sushant Rao, Senior Director of Product Marketing Mar 29 2017 2:00 pm UTC 60 mins
    If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability
    SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Mar 29 2017 3:00 pm UTC 45 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Identity & Access Management in Healthcare: Strengthening IT Security
    Identity & Access Management in Healthcare: Strengthening IT Security Craig Eidelman & Alfred Ojukwu, US Health and Life Sciences, Microsoft Corporation Mar 29 2017 6:00 pm UTC 60 mins
    Help strengthen security through effective identity management, monitoring, and protection

    Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.

    Join this webcast to learn how to:
    • Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
    • Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
    • Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service

    This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale?
    The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • Block The Risk Of Ransomware
    Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A Mar 30 2017 10:00 am UTC 30 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Stroke of genius; The only known way to fully protect against keystroke loggers
    Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • FireEye in 2017
    FireEye in 2017 Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • Building a truly hybrid cloud with Google Cloud
    Building a truly hybrid cloud with Google Cloud James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management Mar 30 2017 5:00 pm UTC 60 mins
    Join James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management, as they explain how to address the challenges of operating hybrid environments that span Google and on-premises services, showing how active data replication that guarantees consistency can work at scale. Register now to learn how to provide local speed of access to data across all environments, allowing hybrid solutions to leverage the power of Google Cloud.
  • Businesses Held Hostage: Are You Ready for a Ransomware Attack?
    Businesses Held Hostage: Are You Ready for a Ransomware Attack? Scott Crawford, Research Director at 451 Research & Matthew Gardiner, Senior Product Marketing Manager at Mimecast Mar 30 2017 5:00 pm UTC 60 mins
    No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.

    How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:

    -The impact of ransomware: Just how serious a threat is it?
    -How could ransomware get into your organization?
    -Why is ransomware happening more now than ever before?
    -How can you best defend against a ransomware attack…before it locks up your critical information assets?
  • Security: It's Not a Privilege, It's a Right
    Security: It's Not a Privilege, It's a Right Alex Shteynberg, Technology Architect, Microsoft Corporation Mar 30 2017 6:00 pm UTC 60 mins
    Control and manage your data with the confidence. Microsoft Office 365 helps keep your data safe, maintaining privacy, and meeting compliance requirements at all times.

    Join this session to learn:
    - How Office 365 gives you the control to log and manage data access workflows directly with datacenter engineers
    - Security, compliance, and privacy approach to help ensure that your data is protected
    - Leading global compliance standards, such as HIPAA, FISMA, and ISO 27001
    - Best practices in data center design, data loss prevention, zero-day advanced threat protection and threat intelligence
  • Making the Case for Lithium-Ion Batteries in the Data Center
    Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • How To Actually Leverage The New World of Low-Cost Commodity Storage
    How To Actually Leverage The New World of Low-Cost Commodity Storage Peter McCallum & Gavin McLaughlin Apr 4 2017 2:30 pm UTC 30 mins
    Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
  • Zero breach Tolerance: Earliest protection across the attack lifecycle
    Zero breach Tolerance: Earliest protection across the attack lifecycle Adrian Sanabria, Senior Analyst at 451 Research, & Mike Nichols, Director of Products at Endgame Apr 4 2017 5:00 pm UTC 60 mins
    Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.

    Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest protection can change the shape and outcome of an enterprise security program.
    This talk will outline strategies for:
    •Prioritizing the alerts and events that really matter
    •Identifying parts of the investigation workflow that can be automated
    •Building a detection methodology that creates confidence and continuously improves defenses
  • There Will Be Attacks - Prepare Your Email Defenses Today
    There Will Be Attacks - Prepare Your Email Defenses Today Steven Malone, Director of Product Management - Mimecast Apr 4 2017 5:00 pm UTC 60 mins
    Email threats are evolving. Today, a whopping 91% of cyberattacks start with an email. Join this session and learn about latest trends in email attacks and how to protect against them.

    - Discover how your email could be hacked by any number of threats
    - Examine the damaging impact attacks have on businesses
    - Learn why your employees could be the weakest link in email security
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Colin Whittaker, Moderator; Vibhav Agarwal, MetricStream, Mark Bower, HPE Security - Data Security, and Brian Kelley, IDERA. Apr 4 2017 5:00 pm UTC 60 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.

    On this webinar our panel of experts will discuss the key points to streamline your data-security program and meet regulatory change.
  • Azure Weekly Webcast: Disaster Recovery & Cloud Backup
    Azure Weekly Webcast: Disaster Recovery & Cloud Backup Mack Ratcliffe, Christian Booth & Allan Inayat Allana Apr 5 2017 6:00 pm UTC 60 mins
    Here's a technical deep dive on Disaster Recovery and cloud backup when it counts.

    Get ready for a technical deep dive into common customer scenarios enabled by Azure and Operations Management Suite (OMS).

    Join this webcast to:

    - Learn about orchestrated replication of on-premises VMs and physical servers
    - See how to test failover and DR drills without impacting production
    - Learn how to integrate Microsoft and 3rd party backup solutions with Azure for long-term backup

    This webcast is part of our Explore weekly hot topics on Microsoft Azure webcast series. Sign up for this session, or the entire series today!
  • Everything You Need To Know About Protecting OpenStack Workloads
    Everything You Need To Know About Protecting OpenStack Workloads Chris Dyer, Senior Systems Engineer Apr 6 2017 9:00 am UTC 60 mins
    As virtualization evolves, the next generation of private cloud is looming on the horizon. Now is the time to look at how you can reduce the cost of cloud by leveraging Open Source technology, to provide an elastic web-scale environment and develop a new generation of applications.

    Join Commvault’s Senior Systems Engineer, Chris Dyer, as he discusses:

    • The key design and implementation considerations for OpenStack private cloud environments

    • How to ensure you have an effective protection and recovery strategy of OpenStack instances

    • The impact of choices around storage and compute architecture of the OpenStack Cloud

    • Best practices for effective management of both traditional and next generation workloads
  • Trends Behind Today's Breaches & Cyber Attacks in EMEA
    Trends Behind Today's Breaches & Cyber Attacks in EMEA Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Apr 6 2017 12:30 pm UTC 45 mins
    Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
    Register today and get insights into:
    •New phishing trends breaching today’s companies
    •Changes in modern attack telemetry and methodology
    •Intelligence-led insights into emerging global threats
    •Modern defensive strategies to better protect your organisation
    •How GDPR is changing business in EMEA
  • Third Party Risk: Gaining certainty amid a web of global relationships
    Third Party Risk: Gaining certainty amid a web of global relationships Michael Rasmussen, GRC Analyst at GRC 20/20 and SureCloud's COO, Nick Rafferty Apr 6 2017 2:00 pm UTC 60 mins
    In today’s interconnected world, organizations struggle to adequately govern risk in third party business relationships. Over half of the organization’s insiders are no longer traditional employees. Insiders now include suppliers, vendors, outsourcers, service providers, contractors, subcontractors, consultants, temporary workers, agents, brokers, dealers, intermediaries, and more. Third party problems are the organization’s problems that directly impact brand, reputation, compliance, strategy, and risk to the organization.

    Join Michael Rasmussen, The GRC Pundit of GRC 20/20, and Nick Rafferty, SureCloud COO, to get an expert view of the challenges companies face and how to gain certainty amid an uncertain web of complex, global relationships.

    In this webinar you will learn:

    Why fragmented approaches to third party governance are doomed to fail

    How inadequate resources can’t keep up with growing risk and regulations

    How document, spreadsheet and email-centric approaches lack current-state analyses and audit trails

    Amid a challenging environment, what to do today by defining a strategy and adopting a single-version-of-the-truth software solution.

    How SureCloud's unique GRC Platform and its Third Party Risk Manager Application can strengthen your assessment process

    Agenda includes plenty of time to address your questions.

    Time: 10 am Central U.S. time (8 am Pacific, 11 am Eastern)
  • How to Replace Your Legacy Antivirus Solution
    How to Replace Your Legacy Antivirus Solution Dan Larson, Sr. Director of Technical Marketing, Apr 6 2017 3:00 pm UTC 60 mins
    Legacy AV products are failing to stop modern threats. That’s why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterday’s AV solutions. Defending against today’s sophisticated polymorphic threats requires new weapons and that’s just what the CrowdStrike Falcon Platform delivers.

    The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service – all cloud-delivered with a single lightweight agent.

    In this CrowdCast, Dan Larson, Sr. Director of Technical Marketing, will discuss:

    • The typical challenges with legacy antivirus, from efficacy to complexity & bulky architecture

    • How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning

    • How Falcon’s lightweight sensor and cloud architecture dramatically reduces operational burden

    • How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon

    • Why CrowdStrike was positioned as a “Visionary” in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement
  • CEO PoV: IT Infrastructure for the Cloud Era
    CEO PoV: IT Infrastructure for the Cloud Era TBD Apr 6 2017 5:00 pm UTC 60 mins
    Enterprises face major hurdles as they transform their IT infrastructure in the era of IoT, Cloud, and mobile. Viptela's CEO defines how simplification and abstraction of sophisticated underlying technology is imperative to reimagining today's connectivity; an architecture that fundamentally changes the way networks are built and consumed. We invite you to join the discussion as we break down the essential areas behind how some Fortune-500 enterprises are taking the lead in jump-starting IT innovation.

    SD-WAN is the first step in transforming enterprise infrastructure. However, depending on the solution, organizations could still be stuck with an operationally complex model. Implementing separate infrastructure solutions for Cloud, IoT, mobile, security, etc. compounds the problem. It is crucial to think of integrated strategies on addressing security vulnerabilities, application performance, and long provisioning times for new services.

    The right SD-WAN solution is just the beginning.