Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
The infrastructure you manage with Chef is a complex machine. This complexity is mirrored in the cookbooks you develop and the data stored in your Chef server. It is an ongoing effort to keep track of the state of that machine and to keep up with all the functionality included in your (many) cookbooks. However, the right tools can help. With them, you can develop code faster, maintain cleaner code, and better understand your existing code.
In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will demonstrate how better editor and debugger tools can improve your work life. He’ll show you how the right text editor can make it easier to write code. Next, he’ll demonstrate how tools like Rake and Guard can consolidate tasks and automate tests. Finally, he’ll show you how Pry can help you to debug your recipes.
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
Today’s technology leaders need to tackle the big trends—cloud, big data, the Internet of Things, mobility, social media—while lowering IT spend year over year. That’s a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs. This enables you to deliver software- defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more—all while maintaining the freedom to choose which platform to run on.
In this session you will learn more about the main kinds of software-defined storage technology landscape you’ll likely deploy:
Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.
Gestionar la salud en el centro de datos tiene 4 pilares principales: Monitoreo, Análisis, Diagnóstico y Resolución.
En esta sesión estaremos cubriendo estos 4 pilares y por qué son importantes. In this session we will cover these main pillars and why they are important. Les enseñaremos como podemos usar sensores embebidos en el silicio disponible a través de interfaces estandarizadas en sus servidores, ayudando a los profesionales de TI a comenzar a agregar estos pilares en su entorno ya que ayudarán a maximizar con la reducción del tiempo medio de reparación (MTTR) para evitar interrupciones. En el caso de los servidores actuales, vamos a explicar la forma de acceder a ellos de manera remota y solucionar sus problemas con Intel Virtual Gateway.
Aspectos Importantes de los 4 Pilares:
•Monitoreo: Monitoreo automatizado de la salud de los servidores, alertas de fallas, Tablero de visualización y más.
•Análisis: Causa raíz con los detalles de la salud de los servidores, reporte de fallas de dispositivos con indicador de severidad, historial de comportamiento.
•Diagnóstico: Acceso Remoto a través de vKVM, acceso “in-band” integrado, detalles de la salud a nivel componente.
•Resolución: Encendido y apagado remoto, vMedia remoto.
Want to easily deploy your Node.js, Ruby, Python, .NET, Tomcat, PHP or Docker web applications to AWS? AWS Elastic Beanstalk is a service that makes it easy to deploy, scale, and manage your web applications on AWS by providing preconfigured application stacks and managing the underlying infrastructure on your behalf. You simply select the application stack you want and upload your code to get started. This webinar will familiarize you with how to deploy your web application to AWS using AWS Elastic Beanstalk (EB). We will walk through the steps necessary to debug, test and scale your application to handle millions of web requests. Also, you will learn about deployment options, cost management, and ongoing monitoring and maintenance.
• Understand the benefits of AWS Elastic Beanstalk versus do-it-yourself
• Deploy a sample Node.js application using the Elastic Beanstalk command line interface
• Modify application stack configuration and extend your application to use additional AWS resources (e.g.: DynamoDB, SNS, etc.)
• Debug, load test, and scale the sample application to handle millions of web requests • Use deployment options available for zero downtime deployments (in-place and blug/green)
• Use tags for cost management
• Set up alarms to monitor you running applications
Join AWS for this Building Scalable Web Applications webinar where we will explain the key architectural patterns used to build applications in the AWS Cloud, and how to leverage cloud fundamentals to build highly available, cost effective web-scale applications.
You will learn how to design for elasticity and availability within AWS using a common web architecture as a reference point and discuss strategies for scaling, security, application management and global reach. If you want to know how to make your applications truly scale then join this webinar to learn more.
In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
Data Governance continues to be a priority for Salesforce customers, whether they're fast-growing, small businesses, or larger organizations dealing with acquisitions, complex sales teams, and global markets.
When managing customer data, it's important that everyone in the organization treats it as a corporate asset. This requires understanding everywhere it will be used (including people, processes, and systems), then determining how to manage the data in a way that will meet the needs of both the users and the overall organization.
Join us to learn the best ways to get started and build a strong data governance and stewardship foundation.
By integrating your phone system with your Salesforce CRM, your service organization can dramatically improve customer care. You will be able to route incoming service calls to the right agent and help your agents resolve problems more quickly by providing them with information about the caller.
During this webinar you will see a live demonstration of NewVoiceMedia ContactWorld for Service and learn how Salesforce and NewVoiceMedia can help you improve fist contact resolution rates and drive down handle times.
You will learn how to:
◦Provide automatic screen pops with caller information
◦Use Salesforce data to dynamically route calls
◦Route based on case owner
◦Implement post-call surveys
◦Use call recording and quality assurance
◦Improve service levels with native Salesforce reporting
Today, hospitals and healthcare organizations are under increasing pressure to revamp the way doctors and clinicians work and the how patients are treated ̶ IT based solutions across medical units work to make patient treatment and medical professional work more efficient and effective.
Join us for an informative session and hear how leading hospitals have reduced IT costs and increased clinical staff productivity.
This webinar will share how three medical facilities in the U.S. have successfully:
•Streamlined clinical workflows with “no click access”
•Ensured the protection of patient information and compliance requirements with “tap in and out” user authentication and highly secure PCoIP® Zero Clients
•Increased staff and doctor satisfaction with a consistent user experience that follows them no matter where they need to work
•Reduced operational costs by deploying PCoIP Zero Clients, PCoIP Management Console Enterprise Edition and Imprivata OneSign® Single Sign On (SSO)
The movement away from electro-mechanical devices for primary storage to solid state technology continues. Flash technology has been immensely successful and continues to advance with greater density and less cost. It is also driving changes in the interfaces and protocols for storage from disk-based to memory-based. Additional solid state technology is entering the market and will create a hierarchy of different performance and cost storage. This presentation will discuss some of these changes and their potential impacts.
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
Amazon Web Services has single handedly altered the IT landscape. The ways of monitoring legacy on-premise environments cannot be applied to the dynamic nature of a cloud-based IT infrastructure. To innovate in the cloud and effectively monitor this new infrastructure model, a modern approach is required. Join the experts from PagerDuty as they discuss how how to build a modern ops environment for workloads running on AWS.
RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:
• Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
• Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
• Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
• Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
• Quickly get started with our 5 easy migration steps
Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day by overcoming compliance and design challenges using a (not so) secret arsenal of AWS and Trend Micro security tools.
Key takeaways from this session include how to:
· Design a workload-centric security architecture
· Improve visibility of AWS-only or hybrid environments
· Stop patching live instances but still prevent exploits
In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.
In this webinar you will learn:
1. What Public Cloud Storage Architectures Look Like
2. Why Public Providers Chose These Architectures
3. The Problem With Traditional Data Center File Solutions
4. Bringing Cloud Lessons to Traditional IT
5. The Five Reasons IT can Do it Better
Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.
In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.
Highlights of the Four Main Pillars:
•Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
•Analytics: root cause with health details, failure device report severity indication, and health history.
•Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
•Remediation: remote power on/off and remote vMedia
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor
Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.
Erfahren Sie in dem Webcast
• Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
• Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
• Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
Unity is the new baby of the EMC family. It’s an incredible engineering achievement – it’s a storage solution built from scratch without missing a beat. With Unity, we managed to change the car’s engine while barreling down the highway. It’s faster, denser, less expensive, and simpler than everything else on the market. Unity is focused at external storage use cases that start small - and go up to 500 SSDs/HDDs. Join this free webinar to see it in action and ask any questions you might have.
Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.
Join this webcast to learn:
What components make up EMS
How to get up and running with EMS
How to provide secure access to corporate data
Protect everything—across devices, operating systems and applications
If you need guidance with performance, capacity, and sizing using Red Hat® Ceph Storage on Supermicro servers, then this webinar is for you. Red Hat and Supermicro have performed extensive lab testing to characterize Red Hat Ceph Storage performance on a range of Supermicro storage servers.
Join this webinar to:
•See benchmarking results that led to Ceph-optimized Supermicro server SKUs.
•Learn how to best architect various sizes of Red Hat Ceph Storage clusters for throughput and cost/capacity optimized workloads deployed on Supermicro servers
Schlechte Nachrichten: 80% aller Unternehmen sehen einen akuten Mangel an IT Sicherheit-Fachkräften. Bis 2020 sollen ca. 1,5 Millionen (!) solcher Fachkräfte fehlen, wenn nichts getan wird. Währenddessen steigt das Risiko erfolgreicher Angriffe und Daten-Verluste. Um sich diesen Gefahren stellen zu können kann man entweder bestehendes Personal refokussieren oder man stellt externe Hilfe ein, was immer schwieriger und kostspieliger wird. Es gibt auch einen anderen Weg: in unserem dritten Webcast betrachten wir mögliche Ansätze mit der neuen Gefahrenlage umzugehen und die Kontrolle bewahrt bzw. auch proaktiv nach vorne blicken kann.
Sixteen:Nine editor Dave Haynes talks with Viktor Petersson, CEO of Screenly, to explore his journey building a digital signage solution based on the very popular and very affordable Raspberry Pi. Their discussion will see them touch on a variety of topics:
- Digital signage industry trends
- The disruptive effects of the drop in hardware costs
- The adoption of agile software development and operations
- The start-up road to success
- This will be the first webinar in a series dedicated to exploring the changes that the new wave of IoT innovation is bringing to the digital signage industry.
Interested in harnessing cloud to crunch big data and reduce operational overhead, but concerned the security risks are too great? Our F500 customers have faced the same hurdles energy, oil, and gas firms are grappling with.
Despite concerns about their valuable IP and data, cloud discussions for our customers have moved from “if” to “how" because of the much-needed flexibility the cloud provides.
In just 30 minutes in our June 1st webcast, we will outline the must-know principles defining IT’s cloudy future and how our F500 customers are overcoming security challenges. We’ll then demo Bracket’s groundbreaking virtualization layer that is enabling enterprises in the cloud—and we would love to have you there.
Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join our webinar to understand more about this threat and learn best practices to protect your business and combat ransomware!
The Ask an Architect (SA) Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.
A few things to keep in mind...
- Please note that this is a time when you can get general technical guidance; if you require extensive or urgent support, please contact AWS Technical Support >> https://aws.amazon.com/contact-us/
- If your question is not answered during the live session, we will get back to you afterwards via e-mail
- Did you know that we already have a repository of answers written by AWS architects? Check if the answer to your question is not already on the AWS Answers webpage >> http://aws.amazon.com/answers/
80% des entreprises jugent qu’elles manquent actuellement de ressources et de compétences en sécurité. Et cela risque de s’aggraver puisqu’on estime qu’en 2020 c’est 1,5 millions de professionnels de la sécurité qui manquerait à l‘appel.
Hors, pendant ce temps, les risques de brèches de sécurité et de cyber-attaques continuent d’augmenter. Pour faire face aux menaces, soit vous détournez le personnel existant de leurs attributions premières soit vous requérez l’aide d’une autre équipe d’experts déjà surchargée.
Il existe une autre alternative …
Rejoignez-nous lors de ce 3ème webcast afin de découvrir comment passer d’une approche réactive à une stratégie offensive pour faire face aux attaques.
Au cours des trois prochains mois, nous vous proposons une série de quatre webcasts consacrés à vos enjeux de sécurité. Lors de chacun des webcasts, nous vous proposons d’échanger avec nos experts sur ces problématiques spécifiques et de découvrir comment les solutions Symantec peuvent vous aider à y répondre.
1) Adoption de la GDPR, une raison à 20M € (11:00 am Apr 21 2016 Paris) - https://www.brighttalk.com/webcast/5691/196523
2) Cloud: réduisez les risques & gardez le contrôle pour en apprécier les bénéfices (11:00 am May 12 2016 Paris) - https://www.brighttalk.com/webcast/5691/196525
3) Comment gérez-vous le manque de ressources en sécurité ? (11:00 am Jun 02 2016 Paris) - https://www.brighttalk.com/webcast/5691/196527
4) Cloud, catastrophes naturelles et cyber-attaques (11:00 am Jun 30 2016 Paris) - https://www.brighttalk.com/webcast/5691/196533
The bad news: A staggering 80% of businesses believe that right now there is a severe shortage of security staff. Even worse is that by 2020 there will be a workforce shortage of 1.5 million security professionals.
The risk of security breaches and cyber-attacks are increasing. To meet security threats, either you divert existing staff away from their intended tasks, or you hire expert help from a skilled pool that is already shrinking.
There is a better way.
Join our webinar where you will learn how to stop simply coping and seize control of your security program whilst looking ahead to deal proactively with possible attacks.
Over the next three months, we’ll be holding a series of 4 webinars tackling threat and information protection.
1) €20 million reasons to embrace the new EU GDPR (21st April 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195977
2) The Cloud: Eliminate risks, Gain Control; release benefits (11th May 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195987
3) How are you managing the security skills shortage? (2nd June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195991
4) Clouds, hurricanes and cyber-attacks… (29th June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195993
Dell Cloud Services and NTT Communications are providing a managed private cloud based data analytics solution to a large insurer based on a Hadoop data platform for data storage. The 24x7 service allows the business to quickly and accurately analyse large amounts of data thereby improving its customer response time. Len Padilla, Vice President, Product Strategy at NTT Communications and Nick Hyner, EMEA Cloud Services Director will discuss this innovative Insurance Project in more detail
You will learn:
-How Dell has enabled a large insurer to provide faster data analysis capabilities using Cloud based service
-How a Multi-vendor cloud based platform drives efficiencies across the organization
-How by accessing data in real-time such as customer demographics and past claim history, insurers are able to provide more accurate, timely policy quotes and can quickly reacting to their competitors’ movements.
The webinar will enable you to hear from an independent Legal Specialists on the real challenges and impacts of the EU GDPR and then the webinar will demonstrate how Dell & Absolute can support your business in overcoming these challenges.
The webinar will focus on:
• Implement a seamless, connected security strategy that works across the organisation, from device to data centre to cloud
• Prove that a lost device is inoperable or has had its data completely wiped
• Gain visibility of data breaches and contain and eradicate threats
• Eliminate the blind spots between networks, identity and access management, data encryption, endpoint security and security managed services
• Enable security decisions based on intelligence that takes into account user, content, location and context
Your organization relies on applications as the face of its business. But what do you rely on to make sure they are up and running and performing as expected? If your application fails at 3:00am – how will you know? If your application is working well in your home country but not in other locations – how will you know?
This is where synthetic monitoring can help. In this webcast, you’ll see how you can start 24x7 monitoring of your web site or application in less than 3 minutes with a self-service SaaS solution -- CA App Synthetic Monitor (ASM). With almost 100 monitoring stations around the world, CA ASM never sleeps and is constantly monitoring the availability and performance of your application providing a real-time view of actual end-user experience.
In this webcast, we’ll explore the following benefits of CA’s synthetic monitoring solution:
•Visibility into cloud-based applications outside enterprise control
•Ensures availability using synthetic transactions to check systems when there is no real user traffic (the “3 AM problem”)
•Captures real user interactions for replay, to help ensure complex services are performing correctly
•Pinpoints problems through comprehensive browser-based end-user perspective to provide optimal experience
Join the Informatica Cloud product team to find out what's new in the Summer 2016 release and explore all the key capabilities. The Summer 2016 release is packed with many new platform capabilities, new and enhanced connectors and various other additions to the Cloud suite to help our customers drive their businesses better with unified and secured data.
•Cloud Data Integration Hub offers centrally managed hub to streamline and automate data integration across cloud and on-premise sources
•Innovative features of Informatica Cloud platform to manage global and distributed data integrations like state-ful time sensitive variables, advanced data transformations like unions and sequences
•Intelligent data masking capabilities included in Informatica Cloud Data Integration to enable masking of sensitive data dynamically saving time and development efforts
•Cloud B2B Gateway is the leading data exchange platform for enterprises and it’ partners and customers providing end-to-end data monitoring capabilities and support for highest level of data quality
•Cloud Application Integrations widget framework, part of SDK, enabling ISVs and third parties to build customized integration solutions
•Native connectors for popular cloud applications like Workday, SAP Success Factors, Oracle, SugarCRM, MongoDB, Teradata Cloud, SAP Concur, Salesforce Financial Cloud
Not just that but extensive enhancements to support ease-of-use, self-service and more richer experience.
There are many solutions being positioned as SD-WAN. These architectures vary based on the particular WAN challenges they target and historical focus. It is critical for enterprises to understand the focus and architectures of software-defined networking solutions before making a decision about which solution is right for their business.
Join Steve Woo, co-founder and VP of Product, as he reviews the architectural details of each of the SD-WAN approaches in the market. Steve will discuss key considerations for choosing among potential architectures and provide a deep dive review of the pure-play SD-WAN designs with a particular emphasis on cloud-delivered software-defined WAN.