Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • The Advantages of Open Source for Enterprise
    The Advantages of Open Source for Enterprise Adam Zegelin, SVP of Engineering and Co-Founder, Instaclustr Recorded: Jan 18 2018 43 mins
    This webinar series will focus on a few of the key benefits of open source software for enterprise.

    Adoption of open source software (OSS) at the enterprise level has flourished, as more businesses discover the considerable advantages that open source solutions hold over their proprietary counterparts, and as the enterprise mentality around open source continues to shift.

    You will discover:
    - How to make smart use of open source software
    - Why Cassandra is a smart business decision
    - How to ensure your applications run smoothly on Cassandra
    - Why open source is the new norm
    - How to leverage the power of the open source community
  • Bitcoin, Blockchain and The Cloud, for Fun And/Or Profit
    Bitcoin, Blockchain and The Cloud, for Fun And/Or Profit Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jan 18 2018 9 mins
    Have you heard about Bitcoin? And Blockchain? They are NOT the same thing, but both are interesting. Ever since Bitcoin arrived on the scene, people have tried creative schemes to profit from the cryptocurrency.

    In this webinar, attendees will learn the difference between Bitcoin and Blockchain, and understand the Economics of Bitcoin including if it makes sense to use Cloud Computing to mine for coins.
  • Elasticity, Portability, and Intelligence from the Smart Load Balancer
    Elasticity, Portability, and Intelligence from the Smart Load Balancer Ashish Shah Recorded: Jan 18 2018 42 mins
    A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:

    • Learn differences between Smart Load Balancers and Legacy Load Balancers.
    • Understand the value of Smart Load Balancers in traditional and modern use cases.
    • See a live demonstration of Avi Networks’ Smart Load Balancer in action.
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Recorded: Jan 18 2018 47 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • The Shift to Digital Business
    The Shift to Digital Business Mike Wittig, VP of Infrastructure Engineering, Nike Recorded: Jan 18 2018 41 mins
    Digital transformation requires transformational leaders. In this session, Mike Wittig, VP of Infrastructure Engineering at Nike, shares first-hand how his team evolved its business models, its organizational culture and its practices to be like a software company and transform the way it engages its customers.
  • A Simple Plan for a Motivated & Engaged Development Team
    A Simple Plan for a Motivated & Engaged Development Team Rick Tywoniak, Sr. Director, Cisco Recorded: Jan 18 2018 45 mins
    Every manager wants to lead a team that is engaged and motivated, but not every manager knows how to create the environment that a happy dev team needs. Developers are lifelong self-learners, easily frustrated when stuck in a role with no opportunity to learn new technologies and broaden their skill set. Leveraging automation and tools within a DevOps culture is one way to help free up time for us to focus on work that is more interesting and also allow us to continue to build our skill set.

    In this session, Rick Tywoniak will share his own experience as a developer and now a team leader, providing insight into how you can help your manager better understand what you need in order to stay motivated, engaged and happy.
  • Panel: Closing the Culture & Skills Gap for DevOps
    Panel: Closing the Culture & Skills Gap for DevOps Petersen Allen, SysAd / Engineer, Salesforce; Tom Clark, Head of Common Platform, ITV; Tom Wolstencroft, VP, New York Life Recorded: Jan 18 2018 44 mins
    DevOps is all about improving the way organizations work in order to deliver better software faster. It starts with people. In this panel, you’ll hear how three IT leaders led cultural change within their organizations and put a strategy in place to attract, develop and retain the talent they needed for success with DevOps.
  • Machine Learning and Microsegmentation
    Machine Learning and Microsegmentation John O'Neil, Edgewise Chief Data Scientist Recorded: Jan 18 2018 37 mins
    “Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.

    Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Recorded: Jan 18 2018 62 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • The Dr. Seuss Guide to Code Craftsmanship
    The Dr. Seuss Guide to Code Craftsmanship Emily Freeman, Application Engineer, Kickbox Recorded: Jan 18 2018 33 mins
    When you think of Dr. Seuss, writing code probably isn’t the first thing that comes to mind. But if you dig deeper, you’ll notice there’s a gem hidden in all his children’s rhymes. You see, Dr. Seuss would have made an excellent engineer. Because great code isn’t about choosing the perfect method name or building out 95% test coverage. All that is great, but it doesn’t make great code. YOU DO.

    This talk will focus on common pitfalls along the development lifecycle and distill Dr. Seuss’s excellent advice into concise steps developers can take before they write a single line of code.
  • You Put Your Data Where?  Protecting Your Data in the Hybrid Cloud.
    You Put Your Data Where? Protecting Your Data in the Hybrid Cloud. NetApp Cloud Data Services 1901 Group BriteSky Recorded: Jan 18 2018 63 mins
    You put your data where? Protecting your data in the hybrid cloud.

    We’ve heard it before: “I can’t use the cloud because my data won’t be secure or compliant!” You might feel the same. Many companies struggle with this challenge, yet even government agencies with the strictest data privacy requirements use the cloud.

    In today’s rapidly changing world, how can you tell which clouds and cloud types are right for your organization’s needs, now and in the future? Wouldn’t it be great to use a public cloud for more workloads, even those with sensitive data and compliance requirements?

    In our webcast, "You Put Your Data Where? Protecting Your Data in the Hybrid Cloud," we will share how public organizations with strict data privacy regulations leverage and deploy hybrid cloud to meet their business needs. NetApp’s partner 1901 Group will speak about a government law enforcement agency that has deployed hybrid cloud to gain better access to compute capabilities while keeping legal data under lock and key. Additionally, BriteSky, a Canada-based service provider, will discuss how they help customers use cloud resources and still maintain sovereignty over their corporate data.

    Whether you’re a public or private company, government agency, U.S.-based or multinational organization, this informative webcast will help you put your data where it's accessible to cloud infrastructures yet fully protected. Join us to learn how NetApp and our partners help people like you meet data compliance and data sovereignty requirements and deploy cloud architectures to suit your business needs.

    Register today.
  • All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target
    All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target Storage Switzerland, Vexata Recorded: Jan 18 2018 61 mins
    In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
  • Beyond RSpec: Innovative Strategies for Confident CI
    Beyond RSpec: Innovative Strategies for Confident CI Kevin Paulisse, Site Reliability Engineer, GitHub Recorded: Jan 18 2018 45 mins
    Continuous Integration (CI) testing provides instant feedback as you develop Puppet code. While it’s great that your rspec-puppet and beaker tests pass using fixtures and stubs, you can get a false sense of security from unanticipated edge cases, unrealistic assumptions, or the lack of complete coverage. You may be tempted to address these limitations by writing even more tests, but that would only exacerbate your frustration. Instead, you could use some alternate techniques to make your CI pipeline predict real-world behavior more accurately, and thereby gain confidence in your test results.

    In this session, we will explore some less traditional yet more powerful techniques for automated testing of Puppet code, and will explore how GitHub scaled these strategies to test hundreds of unique combinations while keeping build times reasonable. You will leave this session with fresh ideas to improve your CI pipeline, which will lead to confident and reliable deployments.
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Recorded: Jan 18 2018 64 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • How to Monitor Performance in the Digital Enterprise
    How to Monitor Performance in the Digital Enterprise John Rakowski, Sr. Director of Technology Strategy, AppDynamics Recorded: Jan 18 2018 49 mins
    The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.

    But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.

    In this webinar, attendees will learn:
    - The state of play in regards to monitoring in the enterprise
    - How Application Performance Monitoring (APM) tools improve ITSM processes
    - Key APM capabilities and how they apply to Service Transition and Operation
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Recorded: Jan 18 2018 59 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Meet the new PowerEdge XR2 Rugged Server - proven hardware in any condition
    Meet the new PowerEdge XR2 Rugged Server - proven hardware in any condition Tracy Troyer - VP, Product Group & Jared Wilson- Enterprise Product Mgr - both of Dell EMC OEM Solutions Recorded: Jan 18 2018 32 mins
    Rugged, ready and right along with you. Built from the ground up for harsh environments, the rackable compact size and certifications in shock, vibe, dust, humidity, EMI and maritime mean the XR2 is agile. The de-branding and customization capabilities mean it’s versatile. So whoever you are and wherever you go, you can take rugged with you. Join us to learn how the Dell EMC OEM XR2 server powered by Intel Xeon SP processors gives you anytime, anywhere access to the data and insights you depend on to make work happen.
  • 6 Trends Shaping DevOps Adoption in 2018 & Beyond
    6 Trends Shaping DevOps Adoption in 2018 & Beyond Robert Stroud, Principal Analyst, Forrester Research Recorded: Jan 18 2018 47 mins
    One constant in all our lives is change. Digital disruption is rampant to support our business, as disruptive technologies are driving innovative business models across every industry. Innovation at speed mandates that IT organizations not only accelerate release velocity, but do so with greater quality, security and availability. For many, the transition to DevOps starts small, often with a single team delivering new innovation — typically writing the DevOps tool chain as well as the application.

    This talk from Rob Stroud, Principal Analyst at Forrester, will explore what’s required to meet the enterprise demand of DevOps in 2018 and beyond — including how will organizations adapt, and what approaches and actions your team and organization need to take to facilitate a smooth, and swift, transformation.
  • 2018 UC Trend Watch
    2018 UC Trend Watch Dave Murphy, IR Recorded: Jan 18 2018 57 mins
    2017 has been a big year in UC, the increased impacts of AI, Microsoft's announcement Teams, Avaya exiting Chapter 11 and Cisco's continued march toward the cloud, just to name a few.
    What will 2018 have in store? Join this webinar to get the lowdown on predictions for 2018 so you can stay ahead of the game.
  • How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix
    How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix Aaron McIntosh, Senior Marketing Manager, WinMagic | Amanda Martinez, Alliances, Nutanix | James LaPalme, VP of BD, WinMagic Recorded: Jan 18 2018 34 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.

    WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.

    Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.

    In this webinar you will learn:
     
    Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
    Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
    Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Recorded: Jan 18 2018 63 mins
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
    Data Driven Security: Improve Your Security Posture To Defeat Your Adversary Jamie Brummell, EMEA Systems Engineer, Palo Alto Networks and Paul Davies, EMEA Senior Alliances SE, Splunk Recorded: Jan 18 2018 48 mins
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats

    Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
    [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Jan 22 2018 6:00 pm UTC 60 mins
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 3:00 am UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • Обзор новых возможностей гиперконвергентного апплайнса VxRail 4.5
    Обзор новых возможностей гиперконвергентного апплайнса VxRail 4.5 Андрей Николаев Jan 23 2018 8:00 am UTC 60 mins
    Обзор новых возможностей гиперконвергентного апплайнса VxRail 4.5 на базе 14G поколения серверов Dell EMC.

    На вебинаре вы узнаете о новых возможностях гиперконвергентного апплайнса VxRail, появившихся с выходом релиза 4.5 и переходом на новое поколение серверов Dell EMC поколения 14G. Благодаря последним обновлениям удалось достигнуть значительного повышения производительности, снижения стоимости решений и расширения вариантов конфигураций, что позволяет адаптировать решение под потребности практически любых задач.

    Вебинар проводится при поддержке компании Intel.
  • Modernize your Data Protection for VMware
    Modernize your Data Protection for VMware Daniel Olkowski (Solution Architect Central East Europe) Jan 23 2018 11:00 am UTC 45 mins
    Data Protection Suite is package contain the best Dell EMC solutions.
    Join us in the short, 30 min session describing what is new from technology and sales perspective
  • Impacts for Workspace Management and Transformation Providers
    Impacts for Workspace Management and Transformation Providers Dr. Andreas Stiehler, Principal Analyst, PAC & Michael Collins, ASG Jan 23 2018 2:00 pm UTC 60 mins
    Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.

    In this webinar you will learn how:

    - To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry

    - To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service

    - A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies

    - We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Jan 23 2018 2:00 pm UTC 60 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Digital Workplace: Transforming the Employee Experience
    Digital Workplace: Transforming the Employee Experience Presenter: Robin Gareiss, President, Nemertes Research; Moderator: Irwin Lazar, VP & Service Director, Nemertes Research Jan 23 2018 4:00 pm UTC 60 mins
    Digital workplace initiatives broadly expand applications and customization available to employees. During this webinar, we will cover:
    • What is a digital workplace initiative, and the phases of deployment?
    • What technologies and capabilities are included? Which vendors are the most critical?
    • How soon will digital workplace initiatives incorporate artificial intelligence, human-to-machine interfaces, always-on collaboration, and other advanced technologies?
    • Who is leading these initiatives? How involved are the business units, and which ones?
    • What cultural or operational changes must be considered?

    We look forward to sharing this information with you!
  • Enterpryze Omni One:Integrating Square and SAP Business One for retail
    Enterpryze Omni One:Integrating Square and SAP Business One for retail Morgan Browne, CEO of Enterpryze Jan 23 2018 4:00 pm UTC 60 mins
    Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.

    Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.
  • Monoliths to Microservices: Migrating Legacy Apps
    Monoliths to Microservices: Migrating Legacy Apps James Falkner Technical marketing manager, Red Hat Jan 23 2018 4:00 pm UTC 60 mins
    Enterprises are transitioning from on-premise, monolithic applications to highly dynamic, polyglot environments using microservices and cloud computing. During this transition, organizations are often left wondering what to do with existing investments in legacy platforms and application development frameworks that are running the business of today but are quickly becoming obsolete in the face of the ongoing digital revolution.

    In this webcast, we'll explore how organizations can meet the challenges of modern business using existing applications while at the same time driving new innovation using modern application development technologies like microservices, containers, and hybrid cloud. These techniques can help deliver market innovation faster and with more reliability while minimizing the risk of introducing new technology too quickly.
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy
    The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Eric Avigdor, DIrector of Product Management at Gemalto Jan 23 2018 4:00 pm UTC 60 mins
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 4:00 pm UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • How to Put Your Business on the Fast Path to Azure
    How to Put Your Business on the Fast Path to Azure John Mutchek, Cloud Architect at Microsoft, Tim Laplante Director, Product Management at Carbonite Jan 23 2018 5:00 pm UTC 30 mins
    Every business is trying to stay ahead of the technology curve by putting their data in the cloud. Identifying the best cloud platform to trust with your data, and finding a single provider capable of creating cloud solutions designed for you and your business needs, are the keys to a successful transition.

    Join our exclusive webcast for a technology overview that shows why Microsoft Azure is the most trusted cloud for business data. You’ll also learn about Carbonite’s solutions for quick Azure on-boarding and protection of your cloud data.

    Sign up today for this joint 30-minute webcast by Microsoft and Carbonite and learn how your business can accelerate its movement to the Azure cloud.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 23 2018 5:00 pm UTC 45 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Trends in Container and Cloud Native Cybersecurity
    Trends in Container and Cloud Native Cybersecurity Josh Thorngren, VP of Marketing at Twistlock Jan 23 2018 6:00 pm UTC 60 mins
    As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.

    Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.

    Specifically, we’ll cover:
    * Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
    * How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
    * How to modernize legacy workloads with containers
  • What Makes a Visionary? Qumulo in the Gartner Magic Quadrant
    What Makes a Visionary? Qumulo in the Gartner Magic Quadrant Nate Odell - Senior Director of Marketing Jan 23 2018 6:00 pm UTC 30 mins
    In our first year in Gartner’s Magic Quadrant, we were named a visionary for distributed file-systems and object storage. Find out what sets us apart from the rest of the storage market in this live webinar.

    During the webinar, we’ll cover:
    - How Gartner makes their Magic Quadrant selections
    - What the distributed file-system and object storage market looks like today
    - An overview of Qumulo technology and why we were named as a visionary in the category
    - Why QF2 is one of the highest Gartner Peer Insights review ratings

    Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • Apple IT Trends for 2018
    Apple IT Trends for 2018 Nick Thompson, Product Manager, Jamf Jan 23 2018 7:00 pm UTC 60 mins
    It’s been a busy year for Apple. From unveiling new products and operating systems to forming new enterprise relationships, Apple continues to evolve its capabilities and best practices for managing Mac, iPad, iPhone and Apple TV devices. Before you finalize your IT plans for next year, join us for a look back at major Apple milestones and enjoy a glimpse at where Apple may be headed in the future. 

    In our webinar, Apple IT Trends for 2018, we’ll examine the strategic moves made by Apple and explain what they mean for you in the new year.
    We'll cover:
    •Apple IT accomplishments in 2017
    •Predictions for Apple IT trends in 2018
    •IT initiatives to consider and provide examples of organizations already implementing them
  • Amazon Load Balancing
    Amazon Load Balancing Todd Bernhard, Product Marketing Manager Jan 23 2018 7:00 pm UTC 45 mins
    Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones. Load Balancing offers different types of load balancers that all feature the high availability, automatic scaling, and robust security necessary to make your applications fault tolerant.

    Attendees will:
    -Understand how Load Balancers can help optimize your cloud resource utilization and reduce costs
    -Identify the security implications of Load Balancers
    -Look at why monitoring Load Balancer deployments is so important
  • Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets
    Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Jan 24 2018 6:00 am UTC 60 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Skalierung ohne Grenzen: Scale-out, nicht up.
    Skalierung ohne Grenzen: Scale-out, nicht up. Ashutosh Tamhankar und Robert Romanski Jan 24 2018 9:00 am UTC 60 mins
    Leidet Ihr Unternehmen an Ineffizienz, die von einem veralteten Scale-up-Ansatz für Datenmanagement und Datensicherung herrührt? Vollständig integrierte Datensicherung wird jedenfalls immer wichtiger, um eine hohe Verfügbarkeit und skalierbare Services bieten zu können – für Ihre vor Ort gespeicherten Anwendungen und Daten.

    Klinken Sie sich ein in unser 45-Minuten-Webinar, in dem wir Ihnen die Scale-out-Architektur von Commvault HyperScale™ vorstellen. Wir zeigen Ihnen, wie Unternehmen wie Ihres es schaffen, durch die Verlagerung hin zu Sekundärspeichern ihre Geschäftsziele und die Initiativen rund um die Transformation der IT zu fördern.

    Was bieten wir Ihnen in diesem Webinar?

    * Vergleich von Scale-out und Scale-up
    * Hebelwirkungen einer Scale-out-Infrastruktur
    * Positive Effekte einer integrierten Datensicherungs-Appliance
    * Wie die „Commvault HyperScale™ Appliance“ Computer, Speicher, Datensicherung über den gesamte Lebenszyklus sowie Analytics in einer einheitlichen Plattform bündelt

    Es ist Zeit für frische Ideen, um Ihre Datenmanagement-Herausforderungen zu meistern. Erfahren Sie, wie Ihre IT durch eine Scale-out-Infrastruktur agiler wird!
  • Rethink Security for SaaS: Power of the Platform
    Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Jan 24 2018 1:00 pm UTC 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • Desire & Reality: What is needed for the Workplace of the future?
    Desire & Reality: What is needed for the Workplace of the future? Manfred Bremmer, Senior Editor IoT & Mobile, COMPUTERWOCHE & Michael Collins, Global Vice President, Workspaces Practice, ASG Jan 24 2018 2:00 pm UTC 60 mins
    Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.

    But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.

    Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.

    Michael Collins from ASG Technologies will address details like:

    - How to close the gap between the needs of the enterprise and personalization
    - Why it is important to include employees in the planning of their workplace at an early stage;
    - How to implement the right mix of standardization and individualization and:
    - Why more flexibility & agility for employees leads to higher productivity.

    In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
  • NetApp and Commvault Working Together to Protect the Next Generation Data Center
    NetApp and Commvault Working Together to Protect the Next Generation Data Center Erik Kemp - Technical Marketing Engineer, NetApp; Charlie Patterson - Alliance Architect, CommVault, Jan 24 2018 4:00 pm UTC 60 mins
    This webinar will highlight:
    •How NetApp and Commvault’s innovative data management capabilities allow you to get the most out of your Next Generation Data Center while ensuring your data is protected
    •Commvault IntelliSnap integration with NetApp SolidFire and NetApp HCI (Element OS) along with the NetApp product portfolio
    •Seamless Application Integration

    Speakers will be Erik Kemp, Technical Marketing Engineer, NetApp and Charlie Patterson, Alliance Architect, CommVault.
  • Get Your Cloud Security in Shape for 2018
    Get Your Cloud Security in Shape for 2018 Misha Govshteyn, Co-Founder and Senior Vice President of Products, Alert Logic Jan 24 2018 4:00 pm UTC 60 mins
    Last year, there were several major breaches across various industries, from Equifax to Uber and everything in between. There’s no discrimination when it comes to a security breach: everyone is at risk. So how does your organization stay ahead of tomorrow’s threats in 2018? Alert Logic is here to help you find an answer!

    Join Co-Founder, Misha Govshteyn, as he presents the key learnings on last year’s top breaches along with insight to shape up your cloud security for the new year. Register now and gain the best strategies to protect your business-critical applications.

    In this engaging webinar, you’ll discover:

    • Where Are They Now: The breaches of 2017
    • Remedies to the top misconfigurations in your cloud workloads
    • The 5 security issues you’ll face in 2018
  • Interoperability and Portability for Cloud Computing: A Guide v2.0
    Interoperability and Portability for Cloud Computing: A Guide v2.0 Cloud Standards Customer Council Jan 24 2018 4:00 pm UTC 60 mins
    Version 2.0 of Interoperability and Portability for Cloud Computing: A Guide is now available.

    This paper from the Cloud Standards Customer Council provides a clear definition of interoperability and portability and how these concepts relate to different components in the architecture of cloud computing, each of which needs to be considered in its own right. Version 2.0 reflects the new ISO/IEC 19941 Cloud Computing Interoperability and Portability standard and its facet models of interoperability, data portability, and application portability.

    In this webinar, authors of the paper will discuss how to select and provision cloud services indicating how interoperability and portability affect the cost, security and risk involved.