Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Live 60 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Recorded: Feb 21 2017 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • Security Myths Debunked: Running Your Business In the Cloud Security Myths Debunked: Running Your Business In the Cloud Adrian Sanabria, Senior Analyst, Information Security at 451 Research & Aaron Newman, CEO & Founder at CloudCheckr Recorded: Feb 21 2017 57 mins
    Organizational efficiency and convenience were the initial appeal of the cloud: add servers when you need them, get rid of them when you don't. Offering businesses the ability to automatically scale with workload and application needs, the cloud offers endless potential to grow at scale. As cloud technology continues to evolve and diversify—from public to private, hybrid to multi-cloud—the use cases and potential benefits have also expanded. And, unlike traditional IT, cloud performance and capacity drivers also tend to improve infrastructure security. During this webinar, we'll explore:

    *Using cloud security as a competitive advantage for your business
    *How focus on performance, agility, and efficiency in cloud mutually benefits security
    *The changes in thinking and design necessary to unlock the cloud’s potential for improving security
    *Practical strategies for automation, monitoring, mitigation and incident response

    Join 451 Research and CloudCheckr for an exclusive webinar to discuss trends, challenges, and opportunities for organizations looking to leverage the true potential of the cloud.

    About CloudCheckr:
    CloudCheckr is a unified cost and security automation platform that gives you visibility, insight, and automation for your AWS environment. CloudCheckr delivers a suite of products for cloud operations, security and finance teams for Cost Management, Security and Compliance, Utilization and Inventory.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Recorded: Feb 21 2017 64 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Recorded: Feb 21 2017 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Kangwarn Chinthammit, Director of Deployment, VeloCloud Networks Recorded: Feb 21 2017 32 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    - Challenges enterprises face during SD-WAN migration
    - Key considerations for a successful SD-WAN deployment
    - Step-by-step guide to transition from a traditional WAN to SD-WAN

    Kangwarn Chinthammit uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Recorded: Feb 21 2017 52 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Microservices with OpenShift: Experience from the fields Microservices with OpenShift: Experience from the fields Sébastien Pasche, Security Architect Recorded: Feb 21 2017 63 mins
    Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.
  • Nowości w backupie Dell EMC. Nowości w backupie Dell EMC. Daniel Olkowski, Dell EMC Recorded: Feb 17 2017 49 mins
    W grudniu Dell EMC ogłosił nowych wersję kluczowych rozwiązań w obszarze backupu/odtwarzania:
    1.NetWorker
    2.Avamar
    3.Boost for Applications
    Zapraszam na 30 minutową sesję w czasie której dotkniemy najważniejszych zmian i najciekawszych funkcjonalności.
  • Deliver Real Value with Open Source Business Optimization Technology Deliver Real Value with Open Source Business Optimization Technology Geoffrey De Smet, founder and project lead, OptaPlanner Recorded: Feb 16 2017 63 mins
    The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.

    Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.

    Watch this webcast with the OptaPlanner to:
    - Work through some actual examples and use cases whose solutions demonstrate business benefits.
    - Leave equipped with tools and resources to start solving your own business planning problems.
    - Discover how digital transformation and open source are changing the face of business and IT operations
  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Machine Learning: The what, how, and why you need it now Machine Learning: The what, how, and why you need it now Stewart Rogers, Dir. of Marketing Technology, VentureBeat Apr 5 2017 5:00 pm UTC 60 mins
    The short answer is that machine learning is the enemy of a post-truth world: Set loose on large data sets, it’s used to uncover patterns and deliver key insights that help predict how things will unfold in the future. The long answer is that from the transformation of forecasting and predictive analytics to the development of self-driving cars to Microsoft working to prevent blindness in children, machine learning has quickly become the kind of technology that transforms the world, from impactful business use cases to powerful social change.

    McKinsey’s 2016 data and analytics study found 120 potential machine learning applications in 12 industries—and the evolution is accelerating. Join our latest VB Live interactive event for a deep dive into how to measure, understand, and mobilize the data that matters the most for your business using machine learning.

    In this webinar you’ll:

    * Learn how cognitive technologies scale across mobile devices (including cars)
    * Evaluate the value of a machine learning product to your organization
    * Tailor your data structure to optimize for future machine learning initiatives


    Speakers:


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • From Node to Node: How to Optimize Cassandra Database Performance From Node to Node: How to Optimize Cassandra Database Performance Mike Kelly, CTO, SelectStar Recorded: Feb 16 2017 30 mins
    Because of its high performance, availability and scalability, Apache Casssandra has quickly become a preferred NoSQL open-source database of choice. Even though it’s highly reliable, there are some issues that can arise and cause major issues to your environment – such as running out of node space or dealing with latency issues. Gaining visibility into key metrics with the option to drill-down to root-cause issues can offer the visibility that you need to keep Cassandra operating at peak performance.

    In this 30-minute webinar, SelectStar’s Mike Kelly will highlight:
    · How you can optimize the performance of your nodes
    · Key metrics to track within your Cassandra environment
    · Top methods to optimize your Cassandra database performance
  • Disaster Recovery as-a-Service, the Killer App in the Cloud! Disaster Recovery as-a-Service, the Killer App in the Cloud! Swen Conrad, ocean9 | David Torres, SUSE Recorded: Feb 16 2017 58 mins
    A group of researchers from the University of Massachusetts Amherst and AT&T Labs stated: “… [that] running DR services using public cloud shown[ed] cost reductions of up to 85% … .”

    Join this webinar by SUSE and Ocean9 to understand how to leverage public cloud like Amazon Web Services or Microsoft Azure for delivering Disaster Recovery as-a-Service (DRaaS) and achieving such infrastructure cost savings. We will cover both DRaaS concepts as well as show an actual cloud service implementation for a demanding enterprise class workload with SAP HANA.

    8 years after this quote was published by the team of researchers, now it is prime time to leverage leading public cloud capabilities in the enterprise.
  • Shift-Left Security: How to Automate Security into Your Pipeline Shift-Left Security: How to Automate Security into Your Pipeline Benjy Portnoy, Aqua Security Recorded: Feb 16 2017 37 mins
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Best Practices for Protecting Your Applications on Azure Best Practices for Protecting Your Applications on Azure Vince Bryant, Cloud Platform Partner Executive Recorded: Feb 15 2017 35 mins
    Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

    Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

    • Five things you must consider when securing applications running on Azure or multi-cloud deployments 
    • Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
    • Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments
  • Introduction to SQL Server on SUSE Linux Enterprise Server Introduction to SQL Server on SUSE Linux Enterprise Server Travis Wright, Eamonn Colman, David Rocha, Jeff Lindholm Recorded: Feb 15 2017 58 mins
    The next version of Microsoft SQL Server is coming to Linux and is already in preview. In this session, Travis Wright, Principal Program Manager from Microsoft, will provide an introduction to SQL Server and how it runs on SUSE Linux Enterprise Server and container platforms. The scope of the first release on Linux and schedule will be covered and deployment, configuration, high availability, storage, and performance/scale will be topics for a more technical drill in.
  • Chasing Shadows: Session 2 - Ansible Tower Chasing Shadows: Session 2 - Ansible Tower Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 15 2017 33 mins
    Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.

    Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
  • How Healthy is Your Storage System? How Healthy is Your Storage System? Neil Hopwood, Sr. Systems Engineer All Flash Technologies Feb 22 2017 11:00 am UTC 60 mins
    Join this webinar to see how your existing environment performs and what the potential improvements could be.

    Topics:
    • Flash Assessment including the VTV follow-up
    • The new Unity All-Flash platform overview
    • How this overlays the current VNX range
    • Use cases and application integration
    • iCDM overview and how it differentiates Dell EMC from the rest of the market
  • Spotlight on EMEA:Unlock the full potential of BitLocker – with SecureDoc On Top Spotlight on EMEA:Unlock the full potential of BitLocker – with SecureDoc On Top Ben Thirlby, Corporate Account Manager Recorded: Feb 15 2017 33 mins
    As the simplest way to mitigate risks, many organisations are opting to deploy the Full Disk Encryption (FDE) capabilities built into their operating systems as an enterprise standard. For enterprises dominated by the Windows OS, experts highly recommend that to get the most out of BitLocker, organisations should consider a third party BitLocker management solution. So take 30 minutes with WinMagic’s Corporate Account Manager, Ben Thirlby, and learn how to achieve more robust security from your BitLocker deployment.

    Key Learnings:
    1.Why you should support a multi-OS or BYOD environment within one solution
    2.How you can reduce the current pressures on your help desk and IT Admins
    3.Discover how an intelligent key management solution can simplify your encryption needs, from deployment to compliance
  • DDoS Threats of Past, Present and Future DDoS Threats of Past, Present and Future John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai Recorded: Feb 15 2017 62 mins
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Chaitanya Singh Rathore, Pre Sales Engineer Feb 22 2017 9:30 am UTC 60 mins
    Economies hit annually with billions through cybercrime & implications of cybercrime within the pharmaceutical and healthcare industry go beyond the obvious financial damage because of the:

    •Intellectual property
    •Lack of right Data Security strategy to protect against cyber-attacks
    •Insiders rather than external hackers who hold large amounts of valuable IP and trade secrets (DuPont breach in 2012)

    Key learnings:
    •The best way to protect sensitive information, including Patent Files, Legal filings, Prescription Records, Insurance Records, and Sales Details from breaches
    •How to secure private data from theft or loss to reduce liability
    •How to manage a multi-device complex IT environment with ease
  • How Healthy is Your Storage System? How Healthy is Your Storage System? Neil Hopwood, Sr. Systems Engineer All Flash Technologies Feb 22 2017 11:00 am UTC 60 mins
    Join this webinar to see how your existing environment performs and what the potential improvements could be.

    Topics:
    • Flash Assessment including the VTV follow-up
    • The new Unity All-Flash platform overview
    • How this overlays the current VNX range
    • Use cases and application integration
    • iCDM overview and how it differentiates Dell EMC from the rest of the market
  • Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Feb 22 2017 6:00 pm UTC 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Feb 22 2017 6:00 pm UTC 45 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud John Meadows - Talligent, Frank Rego - SUSE Feb 22 2017 6:00 pm UTC 60 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Feb 22 2017 6:00 pm UTC 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Feb 22 2017 7:00 pm UTC 60 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • The Data Warehouse in the Age of Digital Transformation The Data Warehouse in the Age of Digital Transformation Neil Raden, Principal Analyst, Hired Brains Research Feb 22 2017 7:00 pm UTC 60 mins
    In the past years of Big Data and digital transformation “euphoria”, Hadoop and Spark received most of the attention as platforms for large-scale data management and analytics. Data warehouses based on relational database technology, for a variety of reasons, came under scrutiny as perhaps no longer needed.

    However, if there is anything users have learned recently it’s that the mission of data warehouses is as vital as ever. Cost and operational deficiencies can be overcome with a combination of cloud computing and open source software, and by leveraging the same economics of traditional big data projects - scale-up and scale-out at commodity pricing.

    In this webinar, Neil Raden from Hired Brains Research makes the case that an evolved data warehouse implementation continues to play a vital role in the enterprise, providing unique business value that actually aids digital transformation. Attendees will learn:

    - How the role of the data warehouse has evolved over time
    - Why Hadoop and Spark are not replacements for the data warehouse
    - How the data warehouse supports digital transformation initiatives
    - Real-life examples of data warehousing in digital transformation scenarios
    - Advice and best practices for evolving your own data warehouse practice
  • SQL Server 2016: Just a Few of Our DBA's Favorite Things SQL Server 2016: Just a Few of Our DBA's Favorite Things Rodney Landrum, Consulting Services Manager, Ntirety Feb 22 2017 8:00 pm UTC 60 mins
    Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates his favorite new features of the latest Microsoft SQL Server 2016 Service Pack 1.

    During the webinar, Rodney will touch on the following:

    • A demo of his favorite new features in SQL Server 2016 and SP1 including:
    o Query Store
    o Database Cloning
    o Dynamic Data Masking
    o Create or Alter
    • A review of Enterprise features that are now available in standard edition
    • New information in Dynamic Management Views and SQL Error Log that will make your DBAs job easier.
  • Best Practices for Combining DevOps, Cloud and IaaS on Azure Best Practices for Combining DevOps, Cloud and IaaS on Azure David Hansford, Technical Solutions Professional, Microsoft Feb 22 2017 9:00 pm UTC 60 mins
    In today's day and age, it's more important than ever to work at the forefront of cutting edge cloud technologies and continue to inspire and empower your IT organizations.

    Microsoft Azure IaaS (Infrastructure-as-a-Service) empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

    Join this webcast to learn how to:
    - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
    - Develop cutting edge “born in the cloud” applications
    - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Sensible Daten überall absichern, schützen und überwachen Sensible Daten überall absichern, schützen und überwachen Thomas Hemker, Matthias Senft Feb 23 2017 2:00 pm UTC 60 mins
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Thomas Corvaisier (Greenspector), Frédéric Croisson (Deloitte), Karen Robinson (Save@Work) Feb 23 2017 2:00 pm UTC 60 mins
    The 4th ICTFOOTPRINT free webinar has crucial information on ICT Calculation tools and Sustainable ICT insights on energy savings, on 23rd February 2017, 15:00 CET.

    Thomas Corvaisier (CEO of GREENSPECTOR) will introduce the concept of software eco-design, and tell us how it may help lowering the consumption of IT resources while preserving performance and user experience.

    Frédéric Croisson, from Deloitte Sustainability, will showcase the ICTFOOTPRINT.eu Self-Assessment Tool for Services (SAT-S), a useful, quick and easy-to-use tool that calculates the carbon footprint of your ICT services. The tool helps users not only to make informed decisions about how to make an ICT service sustainable, but also discover the impact of ICT devices & activities in terms of Green House Gas emissions and primary energy consumption. (SAT-S will be launched very soon).

    Karen Robinson will share some sustainable ICT practices and introduce the save@work initiative, which encourages public sector employee’s to come together in teams to reduce the energy consumption of their building by making small changes to their everyday energy consuming behaviours. Adding an element of competition to the project has been a significant driver in encouraging teams to really examine and challenge those unconscious energy consuming behaviours. The scale of working in a large office has also highlighted those practices that on their own seem to make almost insignificant savings but when applied across an office of over 300 people, have a very different impact.

    The webinar will be moderated by Silvana Muscella, Project Coordinator of ICTFOOTPRINT.eu and CEO of Trust-IT Services. Silvana has a broad experience in ICT sector, focusing on high-level strategy building, the delivery of multichannel platforms, business acquisition & development & strategic marketing for international clients.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic Feb 23 2017 3:00 pm UTC 75 mins
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • Evaluating Skype for Business Evaluating Skype for Business John Hand - Global Microsoft Alliance Director | Dave Bottomley - UC Solutions Engineer Feb 23 2017 4:00 pm UTC 30 mins
    Skype for Business is transforming the UC landscape, but how can organizations effectively evaluate Microsoft's UC offering? This session will look at the key steps to make an effective evaluation of Skype for Business.
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Feb 23 2017 5:00 pm UTC 60 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Feb 23 2017 6:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    •What are your options if you’re a victim of ransomware
    •Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    •How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Varun Santosh, Manager, Technical Marketing at VeloCloud Networks Feb 23 2017 6:00 pm UTC 45 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security