Cloud Computing

Community information
Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.

Webinars and videos

  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Präsentiert von:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderiert von:
    Ashwin Viswanath, Informatica Cloud
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Join us to hear from product expert Rob Singh to learn more about Mocana Atlas Certificate Enrollment
  • As more and more software product companies are looking to migrate their traditional on-premise software to a Software as a Service (SaaS) offering they are discovering it takes longer than first expected and comes with many challenges.

    Platform as a Service (PaaS) provides a great way to create highly scalable applications. PaaS accelerates application development, testing, deployment and maintenance of your SaaS application.

    Join Mark Eisenberg, a thought leader in cloud and mobile, and Motifworks’ Nitin Agarwal to learn how to accelerate your migration to SaaS using PaaS. This webinar will feature a review of the Windows Azure PaaS platform and Motifworks SaaS development framework to further reduce your time-to-market.

    Attendees will learn:
    * The benefits of Platform as a Service over Infrastructure as a Service (IaaS)
    * How PaaS accelerates development and delivery of SaaS
    * Azure Cloud Services (PaaS) overview
    * Best practices for great cloud application on Azure PaaS
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • Dopo avere ampliato con successo la capacità del data center con Amazon Web Services per gli ambienti di sviluppo e testing, il team IT deve affrontare un nuovo problema di capacità: come archiviare i crescenti volumi di dati generati dalle applicazioni aziendali senza aumentare i costi? Inoltre, come è possibile assicurare un backup appropriato di questi dati?

    In questo episodio, verranno risolti entrambi i problemi grazie ad Amazon S3 e Amazon Glacier.

    Funzionalità e servizi illustrati
    •Amazon S3
    •Amazon Glacier
    •AWS Storage Gateway
    •AWS Import / Export

    Demo
    •Panoramica di AWS Storage Gateway
    •Trasferimento dei dati di Amazon S3 in Amazon Glacier
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Décrouvrez les solutions Networking Dell, Convergence, 10Gb et administration centralisée
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Dell Présente lors du CRIP une approche concrète des PRA/PCA en 90 secondes
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Software-defined networking offers the potential for an open network platform, hosting diverse applications, running over multiple technologies and vendors’ equipment. Openness is arguably the key to widespread SDN adoption, and the elusive goal of multi-vendor interoperability.

    This session will address the implications of Openness on SDN, including the evolving role of standards and OpenSource Software, including an examination of why the Open Networking Foundation, Network Functions Virtualization, and OpenDaylight are indicative of the future of networking.
  • Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Hailing from Eastern Europe and North America, organized criminals have a penchant for using brute-force hacking and multiple strands of malware to target financial and retail organizations for monetary gain, according to the Verizon DBIR. It is common for these cybercriminals to directly access databases and extract payment cards, credentials, and bank account information. Join (ISC)2 and Oracle as we discuss tactics employed by these cybercriminals and how organizations should implement a defense in depth database security strategy to help mitigate the threat.
  • In this session, we’ll introduce our cloud desktop offering and discuss how businesses are using this technology to drive down support costs, improve security, and create business agility. Additionally, we will discuss some best practices around planning and implementing a cloud desktop strategy.
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • How is PaaS transforming the way companies develop apps? Run the numbers with IDC and see how any size company can benefit from moving to a cloud platform.

    Join us on April 24th to hear how IDC interviewed Salesforce customers and measured the speed of app development on the Salesforce1 Platform. What they found is that by allowing IT staff to focus on app innovation—instead of infrastructure maintenance—the Salesforce1 Platform delivers:

    · 70% accelerated time to market
    · 80% more applications launched per year
    · 44% increase in app dev capacity while reducing IT costs
    · 75% reduction in infrastructure costs
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Deploy your own cloud based business fully supported by the industry leaders - Dell, OnApp and Peer1
  • The growth of cloud applications means that your data increasingly fragmented across your on-prem and cloud applications and repositories. And for the foreseeable future, most organizations will be dealing with hybrid architectures to manage their enterprise data. Do you have a plan to manage your data whether it is in the cloud or on-premise?

    This webinar will cover specific solution patterns for dealing with common hybrid data management issues. The discussion will include the 4 solution patterns, best practices and tips & tricks.
  • Dopo avere creato un prototipo iniziale funzionante dell'applicazione per la limited preview, è il momento per il team di consolidare l'architettura, rendendola più robusta e fault-tolerant. Poi potranno passare al lancio della versione finale.

    In questo episodio vengono descritti concetti relativi all’infrastruttura di AWS come le Region e le Availability Zone, illustrando come utilizzare queste funzionalità per migliorare la fault-tolerance di un'applicazione.

    Funzionalità e servizi illustrati
    •Principali concetti relativi all'infrastruttura (Region, Availability Zone)
    •Elastic Load Balancer
    •Amazon RDS

    Demo
    •Creazione di un AMI partendo da un'istanza in esecuzione
    •Creazione e configurazione di un Elastic Load Balancer
    •Amazon RDS Multi-Availability Zone
    •Avvisi di Amazon CloudWatch
  • Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware presents a hatful of challenges that your infrastructure team might not have thought about.

    In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:

    (a) Introduction to scalability techniques: clouds from a hardware perspective.
    Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.

    (b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.

    Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.

    You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware.
  • Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

    Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
  • The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • Today in order to remain competitive, there is a tremendous demand on lines of business to be able to analyze more aspects of business data and do this very quickly. There is a control shift to the business analyst so they can analyze what they need to, NOW!

    Big Data requirements are also emerging, even as everyone is being asked to accomplish more with less. Join us to learn how the combination of DB2 10.5 with BLU Acceleration and Cognos BI 10.2 can help bring sanity to satisfying these ever increasing demands.

    We will provide an overview and technical deep dive of DB2 10.5 with BLU Acceleration, Cognos BI 10.2 and Dynamic Cubes. Join experts from the DB2 and the Cognos BI teams who will also explain how these two offerings fit together and the benefits they have provided to clients already. See the value that DB2 with BLU Acceleration can bring to Cognos BI, and ask these experts your questions, so you can understand how this solution helps solve business challenges.
  • The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.

    1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
    2)Leverage McAfee ePO to automate DLP policies based on situational awareness
    3)See how McAfee DLP and ESM work together to provide real-time data protection
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Aaron Landgraf, Product Marketing, MuleSoft and DJ Deng, Enterprise Mobility Leader, Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.