Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Windows 10 Deployment, Cloud Capabilities & App Testing: Q&A with IT Pros
    Windows 10 Deployment, Cloud Capabilities & App Testing: Q&A with IT Pros Robert Van Winkle, Principal Program Manager & Brent Barnett, Program Manager, Device Experience and Productivity Services Recorded: Jul 25 2017 60 mins
    Have you ever wondered how Microsoft does deployment? Get your questions answered about how Microsoft IT approaches migrations and rollouts.

    Performing a system-wide migration across a large or complex environment is no easy task, but new Windows 10 deployment options, streamlined application rollouts, and enhanced cloud capabilities can ease the path. Find out how Microsoft IT approached the deployment of Windows 10 across a global user base, plus how they think about Windows as a service.

    You'll also hear about Microsoft IT's best practices and lessons learned—from application compatibility testing and upgrade strategies to smoothing the deployment path through end user readiness.

    Join this webinar to:
    - Learn how Microsoft IT is using new features in the Windows 10 Creators Update.
    - Find out how Windows IT approaches Windows 10 update management.
    - Get your questions answered in a live Q&A.
  • MeetTheCEO of CloudLanes!
    MeetTheCEO of CloudLanes! Storage Switzerland’s George Crump and Charlie Hodges Recorded: Jul 25 2017 41 mins
    CloudLanes CEO, Asif Moinuddin is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Moinuddin's background, introduces listeners to CloudLanes creators of the Cloud Data Platform, which enables enterprises to responsibly move data from on-premises to any cloud, between clouds, and utilize software from any cloud to light up their data with integrity and assurance. This enables businesses to fully leverage the agility, scale, security, and economics of the cloud, risk-free with better TCO.

    Listen to the live or on demand conversation and get your cloud data questions answered by our panel of experts. No Registration Required!
  • Kubernetes 1.7 AMA
    Kubernetes 1.7 AMA CoreOS Recorded: Jul 25 2017 34 mins
    CoreOS is hosting a Kubernetes v1.7 “AMA” panel discussion to review major highlights and changes from the latest release.

    We will get started with a quick 1.7 release roundtable discussion and a bit of context for folks who are new to Kubernetes, before opening the discussion to include questions from the audience.

    Tune in live to join the conversation!
  • From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift
    From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift Zohaib Khan, Practice Lead, App Modernization & Migration, Red Hat; Malik Sayed, Sr. Manager, Digital Architecture, Verizon Recorded: Jul 25 2017 44 mins
    Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.

    In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
  • Storage Management for Today’s HPC Demands
    Storage Management for Today’s HPC Demands Mark Pastor, Quantum Corporation, Addison Snell, Intersect360 Research Recorded: Jul 25 2017 34 mins
    The world of high-performance computing continues to expand with the proliferation of analytics, AI and other HPC processes. This expanding base of HPC users places demands on data storage infrastructure that are more balanced between performance, economics and ease of deployment than the requirements found in traditional HPC environments.

    In this webinar we will discuss how these requirements are shaping today’s HPC storage infrastructure.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Recorded: Jul 25 2017 52 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • What Even the Best Firms Miss About Customer Service
    What Even the Best Firms Miss About Customer Service Ellen Daley, Vikas Nehru, Nitin Badjatia Recorded: Jul 25 2017 63 mins
    Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.

    While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.

    Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform
    Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform Dave Rudzinsky, SVP & CIO; Jim McDaniel, VP, Strategic Accounts; Matt Serna, Manager, Industry Marketing Manager Recorded: Jul 25 2017 48 mins
    Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?

    Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.

    Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.

    Attendees will learn:

    - How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
    - The strategic role that delivery partners can play in supporting cloud migration initiative
    - How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
  • Does your data security create more pain than it solves? 5 steps to get it right
    Does your data security create more pain than it solves? 5 steps to get it right Raju Verranna, Pre Sales Engineer Recorded: Jul 25 2017 36 mins
    Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?

    Key learning:
    1. Increase security and compliance, while maintaining user-friendliness
    2. Deploy encryption without interrupting normal business processes
    3. Ease the daily burden of your data security administration
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Recorded: Jul 25 2017 47 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 24 2017 37 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 24 2017 40 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Next Gen App Primary Storage
    Next Gen App Primary Storage Mike Matchett, Sr. Analyst & Consultant, Taneja Group Recorded: Jul 24 2017 2 mins
    In this final part of a 3 part series, Senior Analyst & Consultant Mike Matchett discusses Igneous Systems and next gen app primary storage.

    Igneous Systems promises to help filer-dependent enterprises keep up with all their file protection challenges with their Igneous Hybrid Storage Cloud that features integrated enterprise file backup and archive.
  • Retailers:Evolve Customer Experience Strategies to adapt to Consumer Behaviour
    Retailers:Evolve Customer Experience Strategies to adapt to Consumer Behaviour Raj Mistry,Group Vertical Sales Director and Rob Allman,Group General Manager, Customer Experience, Dimension Data Recorded: Jul 24 2017 64 mins
    Retailers are faced with the challenge of fast evolving consumer buying processes. Today and in the future consumers have greater choice in terms of how when and where they buy. Consumers expect an omnichannel experience across all available touch points with retailers.

    According to the 2017 Customer Experience Benchmarking Report, 85% of retail and consumer goods organisations recognise CX as a competitive differentiator. Join us for this webinar where we’ll be discussing the retail specific findings from the report.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Recorded: Jul 21 2017 26 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Why Office 365 Cannot Stop Phishing and Ransomware
    Why Office 365 Cannot Stop Phishing and Ransomware Michael Landewe, Cofounder Avanan Recorded: Jul 21 2017 24 mins
    Microsoft is struggling to stop phishing and ransomware in Office 365. Now there is a solution. Over 70 of the leading security vendors have joined together in one platform to create the most complete, cloud-native protection for SaaS-based email. Best of all, it works in parallel with Microsoft and Gmail to deploy as simply as an app-store one-click application.
  • The Open Innovation Labs Experience: Redefining DevOps Culture
    The Open Innovation Labs Experience: Redefining DevOps Culture Justin Holmes, App Dev Architect, Red Hat; Øystein Bedin, PaaS Infrastructure Architect, Open Innovation Labs, Red Hat Recorded: Jul 20 2017 45 mins
    DevOps is foundational to the world’s highest-performing information technology organizations. But more than anything else, DevOps is about culture, and culture can be elusive. To help our customers experience how a DevOps culture can accelerate their innovative ideas, Red Hat launched it's Open Innovation Labs. In this session, Justin Holmes and Øystein Bedin from Open Innovation Labs will share their story building a DevOps culture for the Labs' core team.

    In this session, you'll learn about:

    - Behaviors and processes to enable collaboration between development and operations.
    - How tools like Ansible by Red Hat and Red Hat OpenShift can help facilitate communication between team members.
    - How Open Innovation Labs provide an environment for Red Hat customers to experience the unique advantages of a DevOps culture.
  • Get Ready for DFARS - A CloudCheckr Workshop
    Get Ready for DFARS - A CloudCheckr Workshop Patrick Gartlan, CloudCheckr CTO Jeff Bennett, Allgress President/COO Tim Sandage, AWS Sr. Security Partner Strategist Recorded: Jul 20 2017 40 mins
    The clock is ticking on the latest cloud compliance mandate: NIST Special Publication 800-171, otherwise known as DFARS (Defense Federal Acquisition Regulation Supplement). Any organization or contractor that holds or processes unclassified Department of Defense (DoD) data must ensure that they comply with the new DFARS clause.

    December 31, 2017 is the ultimate deadline by which to prove compliance, so action is recommended as soon as possible.

    In this webinar, Patrick Gartlan (CloudCheckr CTO), Jeff Bennett (Allgress President/COO), and Tim Sandage (AWS Sr. Security Partner Strategist) will lead an interactive workshop on what DFARS regulation means for your business, specifically:

    ✔ Specific requirements of the DFARS regulation

    ✔ Key controls that CloudCheckr provides to help you meet DFARS requirements

    ✔ Tools from Allgress that map DFARS requirements to CloudCheckr features
  • Ensuring Data Protection with NIST Cybersecurity Framework
    Ensuring Data Protection with NIST Cybersecurity Framework Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Jul 20 2017 32 mins
    When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

    Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

    Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

    • Identify sensitive data, where it is and who is accessing it

    • Protect that data by establishing policies which prevent exposure

    • Detect threats to which could extrapolate data by several means

    • Respond to threats with automated actions

    • Recover after a threat to produce reports to prove compliance

    Register Today
  • Securing Your Public Cloud Infrastructure
    Securing Your Public Cloud Infrastructure Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza Recorded: Jul 20 2017 54 mins
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • The State of Cloud Security
    The State of Cloud Security Eric Hibbard, Hitachi Data Systems, Mark Carlson, Co-Chair SNIA Tech Council, Toshiba Recorded: Jul 20 2017 63 mins
    Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.

    Topics covered will include:

    Summary of the standards developing organization (SDO) activities:
    - Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
    Securing the Cloud Supply Chain:
    - Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
    Emerging & Related Technologies:
    - Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
  • Supermicro Launches New X11 Family of Server and Storage Solutions
    Supermicro Launches New X11 Family of Server and Storage Solutions Ray Pang, Director of Technical Solutions; Supermicro Recorded: Jul 20 2017 39 mins
    Supermicro has released a comprehensive line of new X11 generation server and storage solutions featuring the new Intel® Xeon® Scalable processor family with the strongest support for NVMe storage and 100G/25G Ethernet in the industry.

    Supermicro’s new X11 generation solutions are engineered to unleash the full performance and rich feature sets on the new Intel® Xeon® Scalable processor family, supporting more cores and higher TDP envelopes of 205 watts and higher, increased to six memory channels with higher bandwidth, and more PCI-E 3.0 lanes with up to 100G/40G/25G/10G Ethernet, 100G EDR InfiniBand and integrated Intel® Omni-Path Architecture networking fabrics. The elevated compute performance, density, I/O capacity, and efficiency are coupled with industry’s most comprehensive support for NVMe NAND Flash to deliver up to 16 million IOPS for unprecedented application responsiveness and agility. Customers can select the Server, Storage, Blade, Network, or Workstation systems optimized for their applications, as well as the performance, memory, storage, and I/O profiles that are optimally matched to their workloads, at attractive price points.

    Register for this webinar to hear about Supermicro’s latest and broadest portfolio of new Ultra, BigTwinTM, SuperBlade®, and SuperStorage products optimized for today’s latest technology innovations. We will also be sharing critical insights on how Supermicro workload optimized server solutions deliver the highest performance, efficiency, and scalability in demanding customer environments from cloud to big data and hyper-converged solutions, and efficiently power mission-critical Enterprise workloads.
  • Overcoming the Top 3 Challenges of the Storage Status Quo
    Overcoming the Top 3 Challenges of the Storage Status Quo Storage Switzerland, Panzura Recorded: Jul 20 2017 61 mins
    Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can't meet the unstructured data demands of the mobile workforce or distributed organizations. In this webinar, George Crump, Lead Analyst at Storage Switzerland and Brian Wink, Director of Solutions Engineering at Panzura will expose the hidden gotcha's of the storage status quo and explore how to manage unstructured data in the cloud.
  • Multi-cloud is the new normal and hybrid cloud is inevitable.
    Multi-cloud is the new normal and hybrid cloud is inevitable. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jul 20 2017 45 mins
    As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
  • The Digital Workplace: Understand the trends driving the workplace evolution
    The Digital Workplace: Understand the trends driving the workplace evolution Evan Kirchheimer: Research Director, Ovum. Alex Bennett: GTM Director and Robert Allman: Director CX and C, Dimension Data Jul 26 2017 9:00 am UTC 45 mins
    Digitalisation has changed how employees in your organisation collaborate with each other, support partners, interact with customers, streamline processes, and otherwise build a more effective, more efficient business. Enterprises need a digital workplace strategy to remain competitive and relevant in the current digital climate. To gauge the state of the digital workplace, Dimension Data surveyed 850 business and IT leaders driving technology and organisational change in their companies. They are from organisations with 1,000 or more employees and represent a wide range of industries.
    In this session, we will discuss the key findings of the Report in more detail and provide deeper insights into how organisations today are evolving from a traditional office environment to a digital workplace, with examples of what is happening in the workplace right now.
  • Colocation Connectivity Management
    Colocation Connectivity Management Andy Lawrence, Research VP at 451 Research & Ulrich Schälling, Head of Business Line Networks at FNT Software Jul 26 2017 2:00 pm UTC 60 mins
    The competitive advantage of MTDC and hosting providers will be determined by their ability to become a provider of services - not just iron. As space and power have been commoditized, being able to differentiate with new business and financial models and new products will mean the difference between success and failure. To succeed in this market, these companies need to provide the right prod-ucts and services to their customers. To compete effectively in today’s hyper-competitive market, they must offer customers new and innovative network connections and connectivity services. To support this strategy the infrastructure management team and network operations managers need to emphasize on standardized infrastructures, efficient change processes and secure maintenance and operation
  • Practical Guide to Cloud Management Platforms
    Practical Guide to Cloud Management Platforms Cloud Standards Customer Council Jul 26 2017 3:00 pm UTC 60 mins
    Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.

    This webinar will cover:

    •A review of CMP capabilities
    •How to operate and manage applications and data across hybrid cloud infrastructures
    •Available CMPs on the market today
    •Evaluation criteria for selecting a CMP to meet your needs
    •Deployment considerations
  • Webinar: MDM – From Master Data to Data Mastery
    Webinar: MDM – From Master Data to Data Mastery Featuring Guest Speaker Michele Goetz, Principal Analyst at Forrester Research Jul 26 2017 3:30 pm UTC 45 mins
    To achieve digital transformation means businesses need to be data driven, insight rich, and intelligently powered. Companies that strategically invested in MDM consistently out perform both digital and non digitally focused organizations. Why? Because MDM brings understanding to the data across a complex hybrid ecosystem of data silos and platforms allowing digital enterprises to gather, orchestrate and syndicate data and insights anywhere at any time. The best practices, skills and technologies needed to power master data, are the foundational skills to scale the broader investment in information and analytic architecture. Michele Goetz, Principal Analyst at Forrester Research, will share how digital transformation is shaping MDM and how businesses are rethinking their MDM strategies for competitive advantage.

    • How MDM is at the center of driving stronger business outcomes
    • How MDM competencies lay the foundation for data mastery and deeper insight
    • How MDM technology is evolving to meet the new digital age and how to select your MDM capabilities
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Jul 26 2017 5:00 pm UTC 45 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • The Showdown for Data Preservation: Iron Mountain vs. The Cloud
    The Showdown for Data Preservation: Iron Mountain vs. The Cloud Storage Switzerland, CloudLanes Jul 26 2017 5:00 pm UTC 60 mins
    Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Jul 26 2017 5:00 pm UTC 60 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps
    Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps Kamala Dasika, Pivotal and Roshan Kumar, Redis Labs Jul 26 2017 6:00 pm UTC 60 mins
    As demands on your cloud-native applications rapidly change, how can you ensure that your database is responsive and highly available? The truth is that modern applications are usually still supported by monolithic shared databases and traditional operational practices. Pivotal and Redis Labs are collaborating to bring developers more agility and autonomy with a highly available, scalable, and high performance Redis database service for their cloud-native applications.

    Join Roshan Kumar from Redis Labs and Kamala Dasika from Pivotal as they discuss:

    - How Redis Labs supports real-time use cases for the modern enterprise
    - How Redis Enterprise provides seamless high availability and disaster recovery for Redis applications
    - How full life cycle management of your apps and Redis Enterprise via Pivotal Cloud Foundry enables dynamic scale, high performance and uptime
  • How to Effortlessly Manage Tasks & Project Management Software Like a Pro
    How to Effortlessly Manage Tasks & Project Management Software Like a Pro Dale Howard, Director of Technical Solutions, Sensei Project Solutions Jul 26 2017 6:00 pm UTC 75 mins
    Task Types and Effort Driven can be two of the most confusing features of Microsoft Project, both to novice users and to experienced users alike. For example, have you ever changed one number in Microsoft Project, and then the software changed another number in response, and you don’t know why?

    Guest expert Dale Howard will unlock the mysteries of Task Types and Effort Driven behavior in Microsoft Project, showing you how their behavior is logical, predictable, and meaningful.

    Join this webcast to:
    - Eliminate the confusion around these two Microsoft Project features
    - Harness the power of Task Types in your own projects
    - See how Effort Driven task statuses interact with each Task Type
  • CDCP (Certified Data Centre Professional) Course Sneak Peek
    CDCP (Certified Data Centre Professional) Course Sneak Peek Marco van Gink Jul 27 2017 2:00 pm UTC 45 mins
    Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Jul 27 2017 3:00 pm UTC 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • Defining Enterprise Cloud Data Management for a hybrid world
    Defining Enterprise Cloud Data Management for a hybrid world James Humphrey, National Instruments and Forbes Analyst Joe McKendrick Jul 27 2017 4:00 pm UTC 60 mins
    Is your company on a data-driven digital transformation journey?
    With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
    Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.

    In this webinar, you will learn:
    - Current digital transformation market trends driving the influence of cloud.
    - Role of hybrid data management
    - How National Instruments is growing at scale and reducing time to market for their products and services
    - How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
  • Containers and Persistent Memory
    Containers and Persistent Memory Arthur Sainio, SNIA NVDIMM SIG Co-chair, SMART Modular, Chad Thibodeau, Veritas, Alex McDonald, NetApp Jul 27 2017 5:00 pm UTC 75 mins
    Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.

    You’ll learn:
    •What SNIA is doing to advance persistent memory
    •What the ecosystem enablement efforts are around persistent memory solutions
    •How NVDIMMs are paving the way for plug-n-play adoption into containers environments

    Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 27 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • Lenovo and Intel discuss how to make your data center more efficient
    Lenovo and Intel discuss how to make your data center more efficient Jeff Klaus General Manager, Intel Data Center Solutions - Chuck Weber Product Manager, Lenovo Enterprise Business Group Jul 27 2017 5:00 pm UTC 60 mins
    Lenovo XClarityTM Energy Manager helps you reduce the cost of powering your data center. XClarity Energy Manager is an easy to use application that analyzes and controls power consumption and temperature for groups of servers. By analyzing power and temperature data, XClarity Energy Manager helps data center administrators establish policy-based control over data center energy optimization goals which can improve business continuity and energy efficiency. Join us to see how this this application improves operation processes by:

    •Monitoring energy consumption, estimating the power demand, and reallocating power to servers as needed.
    •Monitoring the temperature and cooling capacity of servers and datacenter spaces.
    •Sending notifications when certain events occur or when thresholds are exceeded.
    •Limiting the amount of energy that an endpoint or a group consumes using policies.
    •Optimizing energy efficiency by monitoring real-time inlet temperatures, identifying low-usage servers based on out-of-band power data, measuring power ranges for different server models, and evaluating how servers accommodate new workloads based on the availability of resources.
    •Reducing the power consumption to a minimum level to prolong service time during an emergency power event (such as a data-center power failure).

    Presenters
    Jeff Klaus
    General Manager, Intel Data Center Solutions
    Chuck Weber
    Product Manager, Lenovo Data Center Group
    George Clement
    Senior Application Engineer, Intel Data Center Solutions
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Jul 27 2017 5:00 pm UTC 30 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Jul 27 2017 5:00 pm UTC 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Running Spark on Kubernetes
    Running Spark on Kubernetes Eddie Esquivel, Solutions Engineer Jul 27 2017 5:00 pm UTC 60 mins
    Apache Spark has established itself as a powerful distributed compute framework. Capable of performing SQL, machine learning, streaming analytics and batch processing all via a unified API. At the same time Kubernetes is gaining traction as an efficient way to manage and orchestrate containers for stand alone applications and more complicated distributed applications like Apache Spark.

    In this webinar we'll go through spinning up an Apache Spark cluster on Kubernetes and analyzing various patterns to interact with the Apache Spark cluster. We'll also discuss work that is happening in the open source community to make Apache Spark on Kubernetes a first class citizen.
  • Deploying Cloud onRamp for AWS, Azure, and Office365
    Deploying Cloud onRamp for AWS, Azure, and Office365 David Klebanov, Director of Technical Marketing, Viptela Jul 27 2017 5:00 pm UTC 45 mins
    Cloud transformation has been a top priority for enterprises, but the adoption is plagued with complex workflows and poor user experience. Even though enterprises onboard AWS or Azure, the workflows to establish connectivity, security and segmentation across VPC (and VNET) are fairly complex. On the other hand, for SaaS, the issue is primarily around user experience. Enterprises deploying Office365 are realizing that performance with Skype for Business and Sharepoint is not reliable. In this webinar we will take a further look at the wide-ranging capabilities the Viptela Cloud onRamp solution offers, and deploying it for AWS, Azure, and Office365.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Jul 27 2017 5:30 pm UTC 60 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Beginner's Guide to Public Sector Cloud Infrastructure
    Beginner's Guide to Public Sector Cloud Infrastructure Todd Bernhard, CloudCheckr Product Marketing Manager & Jonathan Morse, State Local Higher Education Account Executive Jul 27 2017 6:00 pm UTC 60 mins
    Migrating to the cloud poses challenges for any organization, but there are particular concerns for the public sector. Government regulations like FedRAMP and the upcoming DFARS must be met, but security in the cloud is different than in the data center. Cloud providers use a Shared Responsibility Model, where they secure the physical infrastructure and the rest is up to the customer. In the public sector, budgets have to be justified... and used, at the risk of decreasing in the next year. Given the potential for Cloud Sprawl, without a Cloud Management Platform, expenses can get out of control.

    This webinar serves as a guide for public sector organizations looking to embrace the cloud. We will discuss the specific requirements of public sector organizations and explain the choices that will need to be made during such a migration. Topics covered include:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?
  • General Dynamics IT: 6 Steps to Implementing a Successful CX Program
    General Dynamics IT: 6 Steps to Implementing a Successful CX Program Tish Falco, Sr. Director, Customer Experience - General Dynamics IT Jul 27 2017 6:00 pm UTC 45 mins
    As technology rapidly evolves, customers expect superior service, intuitive interactions with organizations and access to services in a way they prefer – at a time they are available and in a manner that fits their individual needs. More and more, organizations are adopting Customer Experience (CX) as a strategic initiative to better understand and deliver for their customers. Join us to learn how to successfully implement a customer experience program that will deliver an easy, effective and consistent experience for your customers and increase adoption internally.