Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Recorded: Feb 21 2017 43 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Recorded: Feb 21 2017 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • Security Myths Debunked: Running Your Business In the Cloud Security Myths Debunked: Running Your Business In the Cloud Adrian Sanabria, Senior Analyst, Information Security at 451 Research & Aaron Newman, CEO & Founder at CloudCheckr Recorded: Feb 21 2017 57 mins
    Organizational efficiency and convenience were the initial appeal of the cloud: add servers when you need them, get rid of them when you don't. Offering businesses the ability to automatically scale with workload and application needs, the cloud offers endless potential to grow at scale. As cloud technology continues to evolve and diversify—from public to private, hybrid to multi-cloud—the use cases and potential benefits have also expanded. And, unlike traditional IT, cloud performance and capacity drivers also tend to improve infrastructure security. During this webinar, we'll explore:

    *Using cloud security as a competitive advantage for your business
    *How focus on performance, agility, and efficiency in cloud mutually benefits security
    *The changes in thinking and design necessary to unlock the cloud’s potential for improving security
    *Practical strategies for automation, monitoring, mitigation and incident response

    Join 451 Research and CloudCheckr for an exclusive webinar to discuss trends, challenges, and opportunities for organizations looking to leverage the true potential of the cloud.

    About CloudCheckr:
    CloudCheckr is a unified cost and security automation platform that gives you visibility, insight, and automation for your AWS environment. CloudCheckr delivers a suite of products for cloud operations, security and finance teams for Cost Management, Security and Compliance, Utilization and Inventory.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Recorded: Feb 21 2017 64 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Kangwarn Chinthammit, Director of Deployment, VeloCloud Networks Recorded: Feb 21 2017 32 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    - Challenges enterprises face during SD-WAN migration
    - Key considerations for a successful SD-WAN deployment
    - Step-by-step guide to transition from a traditional WAN to SD-WAN

    Kangwarn Chinthammit uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment.
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Recorded: Feb 21 2017 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Recorded: Feb 21 2017 52 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Microservices with OpenShift: Experience from the fields Microservices with OpenShift: Experience from the fields Sébastien Pasche, Security Architect Recorded: Feb 21 2017 63 mins
    Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.
  • Podcast - Scale-out NAS vs. Distributed Storage Podcast - Scale-out NAS vs. Distributed Storage Charlie Hodges, Storage Switzerland Recorded: Feb 20 2017 13 mins
    They seem to solve the same problem – meeting the constantly growing performance and capacity demands of the enterprise. But Scale-out NAS and Distributed Storage are different. Join our next LIVE podcast to learn what Scale-out NAS and Distributed Storage are, how they are different and which one is right for you. Attendees to the live podcast will be able to ask questions and get answers in real-time. NO REGISTRATION REQUIRED!
  • Hitachi HCP Removes Data Silos Hitachi HCP Removes Data Silos Ray Ford – CTO, Accident Exchange Recorded: Feb 20 2017 4 mins
    Accident Exchange, part of the AIS group, is a provider of mobility services for people that experienced a car accident. With large volumes of data in various formats to maintain the company recognized the potential compliance challenges ahead. Accident Exchange in partnership with Hitachi Data Systems implemented Hitachi Content Platform (HCP) providing them the capability to more securely store and abstract data.

    Learn how Accident Exchange can now prove authenticity, automate and abstract data from different sources in multiple files and formats all within one platform to achieve greater compliance. HCP is the key to removing data silos.
  • Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Todd Furst and Rich Ross, Technical Solutions Professionals, Microsoft Recorded: Feb 17 2017 44 mins
    Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.

    Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.

    Join this webcast to learn how to:
    - Implement disaster recovery for all your major IT systems
    - Unify data management, security, and protection
    - Provide protection for your data and applications, no matter where they reside
    - Extend on-premises backups storage and data archiving solutions to the cloud
  • Understanding IT Governance & Security in your Dev, Test & Cloud Environments Understanding IT Governance & Security in your Dev, Test & Cloud Environments Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Recorded: Feb 17 2017 66 mins
    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Storage Made Easy and Red Hat Storage Storage Made Easy and Red Hat Storage Steven Sweeting, Director, Product Management, Storage Made Easy Recorded: Feb 17 2017 15 mins
    Many modern enterprises seeking increased agility and lowered costs have adopted open source, software-defined cloud and storage solutions such as OpenStack® with Swift and/or Ceph because those solutions provide easy scale-up and scale-out with significant return on investment (ROI) benefits. Enterprises want to both satisfy corporate use cases and give their end users storage entry points. Red Hat® Ceph Storage with Storage Made Easy (SME) Enterprise File Share and Sync is an enterprise solution for secure file share and sync, corporate drop box, and home drive replacement.
  • Analyzing Data in Google BigQuery with Tableau Analyzing Data in Google BigQuery with Tableau Babu Elumalai, Big Data Technical Lead, Google; Ross Perez, Sr. Product Marketing Manager, Tableau Recorded: Feb 17 2017 45 mins
    Customers have been using Tableau and BigQuery to store and analyze large volumes of data for years, but BigQuery has recently released significant updates that will help Tableau customers find even more insight in their data.

    Watch this webinar to learn:

    - How expanded standard SQL support can help you work more efficiently
    - Best practices for efficiency with Tableau and BigQuery
    - How to connect to BigQuery and create a visualization with Tableau
  • Nowości w backupie Dell EMC. Nowości w backupie Dell EMC. Daniel Olkowski, Dell EMC Recorded: Feb 17 2017 49 mins
    W grudniu Dell EMC ogłosił nowych wersję kluczowych rozwiązań w obszarze backupu/odtwarzania:
    1.NetWorker
    2.Avamar
    3.Boost for Applications
    Zapraszam na 30 minutową sesję w czasie której dotkniemy najważniejszych zmian i najciekawszych funkcjonalności.
  • Big Data, Predictive Analytics & Sales Performance: The 3 Keys to Success Big Data, Predictive Analytics & Sales Performance: The 3 Keys to Success Barbara Giamanco, Social Centered Selling, Peter Mollins, Knowledge Tree, & Melissa Treier, Information Builders Recorded: Feb 16 2017 58 mins
    The era of big data and predictive analytics is clearly upon sales and marketing professionals, representing a transformative paradigm shift for sales and marketing teams. No longer can salespeople rely on relationships and other soft factors to target and close business. Marketing has to move beyond one-off campaigns and brand advertising.

    Big data and predictive analytics technologies represent the opportunity to turn the tables. In other words, sales and marketing can finally become more about math than magic.

    Join this discussion with Barbara Giamanco, CEO of Social Centered Selling, Peter Mollins, VP Marketing, Knowledge Tree, and Melissa Treier, VP Product Sales, Information Builders. You will learn how to:

    - Justify big data and predictive analytics as part of your organization's sales and marketing strategy
    - Leverage insights from big data to accurately target high-value prospects in marketing campaigns, keep existing customers on board through account-based marketing strategies, and expand existing opportunities
    - Improve sales forecasting accuracy using more than "gut feel," relying on real-time sales data visualizations
  • Deliver Real Value with Open Source Business Optimization Technology Deliver Real Value with Open Source Business Optimization Technology Geoffrey De Smet, founder and project lead, OptaPlanner Recorded: Feb 16 2017 63 mins
    The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.

    Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.

    Watch this webcast with the OptaPlanner to:
    - Work through some actual examples and use cases whose solutions demonstrate business benefits.
    - Leave equipped with tools and resources to start solving your own business planning problems.
    - Discover how digital transformation and open source are changing the face of business and IT operations
  • Apache Hadoop: The New Enterprise Data Platform for Big Data Apache Hadoop: The New Enterprise Data Platform for Big Data Jennifer Wu, Director of Product Management, Cloudera and Daniel Karuppiah Director of Product Marketing Microsoft Recorded: Feb 16 2017 66 mins
    The emergence of Big Data has driven the need for a new data platform within the enterprise. Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.

    Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.

    Join this webcast to:
    - See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
    - Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
    - Review common use cases for Cloudera on Azure
    - Discover customer benefits and success stories
    - Learn how to deploy and start recognizing value with Cloudera on Azure
  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • From Node to Node: How to Optimize Cassandra Database Performance From Node to Node: How to Optimize Cassandra Database Performance Mike Kelly, CTO, SelectStar Recorded: Feb 16 2017 30 mins
    Because of its high performance, availability and scalability, Apache Casssandra has quickly become a preferred NoSQL open-source database of choice. Even though it’s highly reliable, there are some issues that can arise and cause major issues to your environment – such as running out of node space or dealing with latency issues. Gaining visibility into key metrics with the option to drill-down to root-cause issues can offer the visibility that you need to keep Cassandra operating at peak performance.

    In this 30-minute webinar, SelectStar’s Mike Kelly will highlight:
    · How you can optimize the performance of your nodes
    · Key metrics to track within your Cassandra environment
    · Top methods to optimize your Cassandra database performance
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Disaster Recovery as-a-Service, the Killer App in the Cloud! Disaster Recovery as-a-Service, the Killer App in the Cloud! Swen Conrad, ocean9 | David Torres, SUSE Recorded: Feb 16 2017 58 mins
    A group of researchers from the University of Massachusetts Amherst and AT&T Labs stated: “… [that] running DR services using public cloud shown[ed] cost reductions of up to 85% … .”

    Join this webinar by SUSE and Ocean9 to understand how to leverage public cloud like Amazon Web Services or Microsoft Azure for delivering Disaster Recovery as-a-Service (DRaaS) and achieving such infrastructure cost savings. We will cover both DRaaS concepts as well as show an actual cloud service implementation for a demanding enterprise class workload with SAP HANA.

    8 years after this quote was published by the team of researchers, now it is prime time to leverage leading public cloud capabilities in the enterprise.
  • Synchronizing with HPE ALM for Traceability Across Toolsets Synchronizing with HPE ALM for Traceability Across Toolsets Mark Ford, TIAA Recorded: Feb 16 2017 50 mins
    If your Dev teams are storing their requirements as User Stories in one tool and your QA teams are storing their Test Cases in HPE ALM, then chances are you have no traceability between the two. And what about Test Defects created in HPE ALM? How can you trace those back to the original User Story requirement? I’ll show you how we solved this dilemma using Tasktop to synchronize User Stories to HPE ALM Requirements, pass the User Story id throughout the HPE ALM lifecycle from Requirement to traced Test Case to linked Defect, and how we will synchronize the Test Defects back to our Dev tool and link them back to the User Story for full round trip traceability.

    This session is suitable for all levels including VPs, Directors, Dev and QA managers, practitioners, and technical resources. I will cover the following:
    Why Requirement and Defect traceability is important to us
    The challenges faced that prompted our solution
    Detailed explanation of how we implemented the solution
    The benefits realized
  • Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Feb 22 2017 6:00 pm UTC 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud John Meadows - Talligent, Frank Rego - SUSE Feb 22 2017 6:00 pm UTC 60 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Feb 22 2017 6:00 pm UTC 45 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Feb 22 2017 6:00 pm UTC 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Feb 22 2017 7:00 pm UTC 60 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Sensible Daten überall absichern, schützen und überwachen Sensible Daten überall absichern, schützen und überwachen Thomas Hemker, Matthias Senft Feb 23 2017 2:00 pm UTC 60 mins
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic Feb 23 2017 3:00 pm UTC 75 mins
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • Reduce the Complexity of OpenStack Neutron Reduce the Complexity of OpenStack Neutron Charlie Gutierrez - Midokura, Frank Rego - SUSE Feb 23 2017 6:00 pm UTC 45 mins
    Midokura’s award-winning Midokura Enterprise Management (MEM) technology provides a software layer directly within existing physical network hardware, turning physical machines into a virtual platform that can scale to hundreds of thousands of virtual ports. The MidoNet integration with SUSE OpenStack Cloud provides an integrated solution for rapid OpenStack deployment. Now, customers can enjoy the very best possible deployment experience with leading technology from Midokura and SUSE, built to scale right out of the box.
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Varun Santosh, Manager, Technical Marketing at VeloCloud Networks Feb 23 2017 6:00 pm UTC 45 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • How Smartsheet operationalized Apache Spark with Databricks How Smartsheet operationalized Apache Spark with Databricks Francis Lau, Senior Director, Product Intelligence at Smartsheet Feb 23 2017 6:00 pm UTC 60 mins
    Apache Spark is red hot, but without the compulsory skillsets, it can be a challenge to operationalize — making it difficult to build a robust production data pipeline that business users and data scientists across your company can use to unearth insights.

    Smartsheet is the world’s leading SaaS platform for managing and automating collaborative work. With over 90,000 companies and millions of users, it helps teams get work done ranging from managing simple task lists to orchestrating the largest sporting events and construction projects.

    In this webinar, you will learn how Smartsheet uses Databricks to overcome the complexities of Spark to build their own analysis platform that enables self-service insights at will, scale, and speed to better understand their customers’ diverse use cases. They will share valuable patterns and lessons learned in both technical and adoption areas to show how they achieved this, including:

    How to build a robust metadata-driven data pipeline that processes application and business systems data to provide a 360 view of customers and to drive smarter business systems integrations.
    How to provide an intuitive and valuable “pyramid” of datasets usable by both technical and business users.
    Their roll-out approach and materials used for company-wide adoption allowing users to go from zero to insights with Spark and Databricks in minutes.
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Feb 23 2017 6:00 pm UTC 60 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Feb 23 2017 6:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    •What are your options if you’re a victim of ransomware
    •Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    •How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Brandon Dunlap (Moderator) Feb 23 2017 6:00 pm UTC 75 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Feb 23 2017 7:00 pm UTC 45 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Feb 23 2017 8:00 pm UTC 60 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • Cloud Security: From Strategy to Incident Response Cloud Security: From Strategy to Incident Response Ondrej Krehel, CEO/Founder, LIFARS and Michael Landewe, Co-Founder, Avanan Feb 23 2017 9:00 pm UTC 60 mins
    Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure.

    You might think your organization's cloud security posture is strong, but are there gaps you just don't know about? And if there were, how you would identify and remediate them? As companies continue to move to the cloud, it's becoming ever more important to have a multi-layered cybersecurity program in place.

    This webinar will address some of the most important trends in SaaS security, what it takes to be successful, and what you must do now to secure your cloud infrastructure and applications.

    Attendees will learn about:
    · The challenges in protecting users and data in the cloud.
    · How the cloud makes it difficult to identify and remediate security events.
    · What it takes to implement a successful SaaS security program.
    · How a multi-vendor, defense-in-depth approach can further secure their operations.
    · Why having an incident response plan for cloud security incidents is so important.
    · A new cloud security assessment solution to combat the SaaS security issues within their organization.
  • IT Analytics: How a Data Company uses Analytics to Improve IT IT Analytics: How a Data Company uses Analytics to Improve IT Brian Smith - VP, Technical Operations, Tableau Feb 24 2017 10:00 am UTC 45 mins
    Today’s IT departments can’t simply provide IT solutions to other departments. Passively processing other departments’ requests is no longer sufficient to meet modern business needs, power company growth, and excel in a constantly changing marketplace. Instead, IT must strive to be the leading force and early adopters for information technology themselves.

    Join this live webinar to see how Tableau’s IT department uses analytics on a daily basis to analyse their own performance and improve their own efficiency.
  • Comment protéger et surveiller vos données sensibles en tous lieux Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Feb 24 2017 10:00 am UTC 60 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Going Global with In-Memory Data Going Global with In-Memory Data Viktor Gamov, Senior Solution Architect Hazelcast, Michael Hilmen,Solutions Architect, Solace Feb 28 2017 3:00 pm UTC 60 mins
    Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
    This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
    In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.