Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Dell Optimizer - Få mest ud af din nye Dell Client
    Dell Optimizer - Få mest ud af din nye Dell Client
    Christian Eilskov, Client Solutions Technologists, Dell Technologies Recorded: May 25 2020 8 mins
    Som du måske har set, er Dell i fuld gang med at introducere alle vores nye klienter. De kommer alle med nye og spændene features. En af de features der virkelig fortjener ekstra opmærksomhed er Dell Optimizer.

    Se denne korte præsentation, og se hvorfor.
    Hver lille session i ”Kort & Godt” varer maksimalt otte minutter, og du kan derfor se dem og blive inspireret under kaffepausen – eller blot som overspringshandling
  • Live Optics, tarkkuutta ympäristön mitoituksiin
    Live Optics, tarkkuutta ympäristön mitoituksiin
    Julius Korttila Recorded: May 25 2020 26 mins
    Live Optics, tarkkuutta ympäristön mitoituksiin
  • Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Recorded: May 25 2020 84 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • Laiteäly tukee käyttäjäkokemusta - Dellin uudet kokemuspohjaiset laitteet
    Laiteäly tukee käyttäjäkokemusta - Dellin uudet kokemuspohjaiset laitteet
    Onni Vuorio Recorded: May 25 2020 43 mins
    Dellin uudet kokemuspohjaiset laitteet
    Uskomme, että teknologian tarkoitus on auttaa ihmisiä työskentelemään tehokkaimmalla ja haluamallaan tavalla. Tekoälypohjainen ohjelmisto parantaa käyttäjäkokemusta.
  • Elastically Scaling Kafka Using Confluent
    Elastically Scaling Kafka Using Confluent
    Josh Rosenberg, Group Product Marketing, Confluent + Ricardo Ferreira, Developer Advocate, Confluent Recorded: May 22 2020 60 mins
    The number of mission-critical apps and the amount of data underpinning them has grown exponentially in the increasingly digital world - with no sign of slowing down. But rigid data architectures slow organizations down, forcing them to spend too much up front on resources they don’t use, and causing lag or downtime across their apps. In today’s hypercompetitive digital world where customer loyalty connects with the best performing applications, every millisecond delay could be another lost customer.

    Adjusting to the real-time needs of your mission-critical apps is only possible with an architecture that scales elastically. Confluent re-engineered Apache Kafka into an elastically scalable, next-gen event streaming platform that processes real-time data wherever it lives - making it accessible for any budget or use case.

    Register now to learn how to:
    -Quickly deploy Kafka in Confluent Cloud with just a few clicks and elastically scale your workloads
    -Effortlessly connect your critical data sources and sinks to Kafka to build a complete data pipeline for your real-time apps
    -Easily process streaming data with a simple interactive SQL interface using fully-managed KSQL
    -Accelerate the deployment of standardized, self-managed Kafka clusters as cloud-native systems on Kubernetes to achieve elastic scale with Confluent Platform
  • HCL OneTest
    HCL OneTest
    HCL OneTest Recorded: May 22 2020 4 mins
    An overview of HCL OneTest
  • Being Prepared for the Unforeseen by Having a Strategic Mindset
    Being Prepared for the Unforeseen by Having a Strategic Mindset
    Donald E. Hester, Ron Puccinelli, & Robert DeRoeck Recorded: May 22 2020 66 mins
    CIO CISO Table Talk. The COVID-19 pandemic has demonstrated the importance of technology in dealing with emergency situations. Some organizations were prepared for the transition to work from home and others struggled with the transition. How do we plan for the unknown?
    Having a strategic mindset is an important trait for CIOs and CISOs. This is much more difficult in technology because of the rapid change rate and dynamic nature of technology. How do you make decisions now to set yourself and your organization up for success in the future? Think strategic, act tactical, always keep your current projects focused on the long-term objectives. Join Don, Ron, and Rob for this talk on having a strategic mindset.
    Speakers:
    Donald E Hester, Maze & Associates
    Ron Puccinelli, City of Fairfield
    Robert DeRoeck, Indiana University
  • Forrester Total Economic Impact Report - for Hitachi Vantara Cloud Services
    Forrester Total Economic Impact Report - for Hitachi Vantara Cloud Services
    Sean Owens, Principal Consultant, TEI, Forrester Consulting & Gary Breder, Dir of Product Mktg, Cloud Solutions and Services Recorded: May 22 2020 33 mins
    Hitachi Vantara recently commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study*. The study examines the potential Return on Investment (ROI) that can be enabled from Hitachi Vantara cloud services. Specific Hitachi Vantara cloud services covered in this study and webinar include cloud migration services, cloud application modernization services, and managed cloud services from Hitachi Vantara.

    Please join guest speaker Sean Owens, Principal Consultant, TEI, from Forrester Consulting, and Gary Breder, Director of Cloud Services, at Hitachi Vantara, as they provide listeners with a framework to evaluate the financial impact of some of Hitachi Vantara’s cloud services. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors affecting the investment decision.

    This webinar is an abridged version of the full Forrester TEI study which looked at a three-year analysis period. It will guide attendees through the Forrester TEI methodology and how it was used to derive the study results based on the interviews with customers that have leveraged one or more Hitachi Vantara cloud services.

    In this webinar, we will highlight benefits reported by interviewed organizations:

    • Faster-than-expected migration completion, saving time and costs
    • Application modernization services that enabled improvements in cloud resource utilization and reduce cloud subscription costs
    • Ongoing management services help reduce organization resource needs and save additional cloud subscription fees
    • New opportunities that modernized applications can enable for the business

    *“The Total Economic Impact™ Of Hitachi Vantara Cloud Services: Cloud Migration And Optimization Cost Savings And Business Benefits Enabled By Cloud Migration Services, Cloud Application Modernization Services, And Managed Cloud Services From Hitachi Vantara,” a November 2019 commissioned study conducted by Forrester Consulting on behalf of Hitachi Vantara.
  • It's time to get cirrus about the cloud
    It's time to get cirrus about the cloud
    Graeme McMillan, Sr. Security Solutions Engineer & Justin Buchanan, Senior Manager of VM Offerings Recorded: May 22 2020 49 mins
    Find yourself gazing towards the cloud with roughly the same intrepidation as the Wright brothers did when they looked to the clouds? Although somewhat daunting,the public cloud has sparked an IT migration worth billions.

    Many organizations have turned to the agility of the cloud as a means of accelerating growth and streamlining operations. However, with the somewhat endless list of services and options now available, some companies could certainly find themselves straying from a well architected solution.

    Join Rapid7 as we explore the shift and share how to ensure you're formulating a secure cloud approach.
  • S2:E4 The Value of an Interconnected Ecosystem: Cloud Optimization
    S2:E4 The Value of an Interconnected Ecosystem: Cloud Optimization
    Steve Smith, CoreSite CRO Recorded: May 22 2020 34 mins
    Live stream with CoreSite’s Chief Revenue Officer, Steve Smith every Friday at 9:00AM MST for an interactive discussion on industry trends and hot topics with CoreSite ecosystem partners.

    May 22nd, Season 2 Episode 4
    Organizations face a challenging business climate as they race even faster to better understand how the cloud can help them in their digital transformation journey.

    The rapid change of technology, architectures, security and compliance, along with network, compute and storage/DR requirements has created a big burden on business leaders and IT executives. Gaining an understanding of all of these pieces and assessing price, performance, ROI and TCO models can help companies make the best decision, but how do they get there?

    Groupware Technologies, a valued CoreSite Solution Partner, recently named to The CRN Elite 2020 is based in Silicon Valley and serves high demand brand customers across all verticals, including Facebook, NVIDIA, Salesforce.com, etc. They optimize Cloud spend and architectures for hundreds of customers. We will look at runaway cloud costs, how to control monthly cloud spend, hybrid cloud connectivity, architecture review and assessing for the optimal digital transformation.

    Special Guests:
    Hear from industry experts, John McGivern, Senior Director of Cloud Optimization Services at Groupware Technology and Daryl Harrington, Director of Cloud Solutions at Groupware Technology

    Trending Topics:
    • Cloud Optimization - gaining control of your monthly spend and performance
    • Direct Cloud Scale - Customer network dilemma vs DirectConnect & ExpressRoute
    • Optimal Digital Transformation - The value of an Architecture review and Assessment
  • Kubernetes on Windows with WSL 2
    Kubernetes on Windows with WSL 2
    Alex Chalkias & Sohini Roy - Ubuntu Product Managers & Nuno Do Carmo - Ferring Pharmaceuticals Recorded: May 22 2020 21 mins
    Learn to unleash the power of Kubernetes on Windows easier and faster than before. Join us for a demonstration from Microsoft MVP and Docker Captain, Nuno Do Carmo as he guides us through how to configure a full Kubernetes on-rails on your Windows machine. This is made possible through two tools, MicroK8s and WSL2.

    During this session, you’ll learn how easy it is to not only access a full Linux terminal on Windows, and with the updates on the newest WSL2 (wide release in May) how you can enable MicroK8s, a lightweight, single-package application that brings a fully-featured, conformant and secure Kubernetes system directly on users machines.

    You’ll learn:

    What is the Windows Subsystem for Linux, and what’s are some of the great features that will be enabled in the newest version, WSL2, released in May by Microsoft
    What is MicroK8s
    How to install a local Kubernetes using MicroK8s with WSL2
    The advantages / what this combo can help you achieve
  • Behind the Scenes of Managed Detection & Response Service
    Behind the Scenes of Managed Detection & Response Service
    Marcus Eaton, Lead Security Solutions Engineer, Jason Prescott, Manager Threat Detection, Douglas Wainer, Threat Analyst Recorded: May 22 2020 48 mins
    You might think of a security operations center like a stereotypical movie war room: a dark room filled with complex maps, fancy monitors, and analysts on headsets. However, most SOCs aren't really a physical presence or room; more accurately, they're a formally organised team that's dedicated to a specific set of security roles and responsibilities for detecting and validating threats within your environment.
    No matter a company's size or purpose, it’s valuable to have a dedicated organisational-level team whose job is to constantly monitor security operations and incidents and respond to any issues that may arise. The various responsibilities within a cybersecurity team can be extremely complex, and a SOC can not only serve as the tactical console to empower team members in performing their day-to-day tasks, but also as a strategic center to keep the team aware of bigger, longer-term security trends.

    In this webcast, our threat detection specialists will reveal;
    · How known and unknown threats are identified in our customer environments
    · The intelligence behind threat hunting
    · How our SOC uses threat intelligence to detect, investigate and respond to incidents
    · What a typical day in the life of a SOC Analyst looks like
  • Non-instrusive POS Transformation
    Non-instrusive POS Transformation
    Dheer Singh, Chief Technologist - Retail TechMahindra & Tanja Batz, Product Manager, SUSE Recorded: May 22 2020 53 mins
    Given the unprecedented impact on business in the near term, the top priorities for retailers are to find ways for their stores to :
    •Contain Cost
    •Improve Security
    •Enhance Efficiency
    •Enable Touchless Experience
    •Remote Support

    This webinar will introduce you to SUSE Manager, a non-intrusive and rapidly deployable solution that can deliver on all of the above for your stores?
  • As best practises para detetar e bloquear ficheiros maliciosos
    As best practises para detetar e bloquear ficheiros maliciosos
    Pedro Castro Recorded: May 22 2020 51 mins
    O número e complexidade dos ataques têm crescido exponencialmente. As organizações gastam milhões de euros todos os anos em soluções de cibersegurança, no entanto as empresas continuam a ter brechas de segurança.

    Neste webinar, os nossos experts vão falar sobre os métodos mais eficientes de detetar e bloquear ficheiros maliciosos, demonstrando as best practises para o fazer, assim como, exemplos de ataques que temos observado no mundo real e que devem ser precavidos. Irá aprender os detalhes por detrás destas ameaças, as suas estratégias para ultrapassar as soluções de segurança existentes e para se moverem lateralmente dentro das organizações. Por último, veremos como é possível simplificar a segurança das organizações com menos tools e menos alertas.

    Junte-se a esta sessão informativa focada na prevenção de ameaças
  • CIO Guide, Building a successful hybrid, multi-cloud strategy
    CIO Guide, Building a successful hybrid, multi-cloud strategy
    Janavi Ravi co-founder of Loonycorn and Pluralsight Author Recorded: May 22 2020 53 mins
    Breakdown - More and more organizations find themselves juggling multiple cloud providers—some through careful planning, but many by happenstance. Regardless of their journey, many companies may be asking, “what now?”Join Pluralsight author and cloud expert Janani Ravi for an in-depth discussion on how to build a successful hybrid, multi-cloud strategy. You’ll learn:• Popular beliefs about cloud, and the evidence that supports and contradicts those beliefs• Questions to ask when building and implementing a cloud strategy (and what the answers should look like)• Technological design patterns that matter in a hybrid, multi-cloud, ML/AI-permeated world
  • 情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介
    情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan Recorded: May 22 2020 47 mins
    CISSPは(ISC)²が認定を行っている国際的に認められた情報セキュリティ・プロフェッショナル認定資格です。情報セキュリティの共通言語とも言える『(ISC)² CISSP CBK』を理解している情報セキュリティ・プロフェッショナルのみに与えられる資格で、CISSPの取得は、国内外において、個人および所属組織の信用・信頼の獲得につながります。Webinarでは、このCISSPについてわかりやすく説明します。
  • Best practices for verification to support reduced certificate lifetimes
    Best practices for verification to support reduced certificate lifetimes
    Dathan Demone, Director Verification Services, Entrust Datacard Recorded: May 22 2020 35 mins
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • Set Up for Success on Hybrid Cloud with VMware Cloud on AWS - Cantonese
    Set Up for Success on Hybrid Cloud with VMware Cloud on AWS - Cantonese
    Deckard Cheung (Solution Architect, VMware) & Clive Leung (Solution Architect, Rackspace) Recorded: May 22 2020 60 mins
    As cloud adoption continues to boom, more businesses are looking to hybrid architectures to modernize their legacy IT. With a hybrid cloud, you can take advantage of the scalable, flexible nature of a public cloud while maintaining the control and security of a private cloud.

    VMware Cloud™ on AWS enables you to run your applications across private, public and hybrid cloud environments. Rackspace Managed VMware Cloud on AWS leverages our strong partnerships and deep expertise across VMware and AWS to help customers simplify, accelerate and optimize VMC on AWS.

    Join VMware Solution Architect Deckard Cheung and Rackspace Solution Architect Clive Leung to find out how to make the most of what the next-generation cloud has to offer, while maximizing your existing VMware and AWS investments.

    This session will cover:

    •Introduction to VMware Cloud on AWS
    •Easy workload portability and hybrid capabilities from anywhere in the world
    •A migration path to the cloud that doesn’t require costly and time consuming changes
    •Expert guidance and services across both VMware and AWS platforms
    •What does this mean for our customers today?

    Join our webinar and get a chance to receive a FREE Hybrid Cloud assessment.
  • How to effectively secure your remote workforce - Asia Pacific
    How to effectively secure your remote workforce - Asia Pacific
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: May 22 2020 24 mins
    2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:

    - Keep corporate assets secure
    - Protect and verify worker identities
    - Help remote employees stay productive
    - Reduce the administrative burden on IT

    Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
  • How confident are you in the results and reports you receive and deliver?
    How confident are you in the results and reports you receive and deliver?
    Jack Danahy, Chief Evangelist, Alert Logic; Curt Vurpillat, Sr. Consultant, Ingram Micro; Peter Hoff, CISO, Pet Retail Brands Recorded: May 21 2020 61 mins
    According to Gartner, "The marketing around MDR is increasingly confusing for buyers. The MDR label is being co-opted by service providers that demonstrate few, if any, of the characteristics defining the MDR market and are more aligned to the MSS market."

    It’s time to eliminate the confusion and bring much needed clarity to the purpose, efficacy, and value of managed detection and response (MDR) as a critical element in organizational security planning.

    Join Alert Logic and a host of industry thought leaders for seven interactive panel discussions, addressing:

    - What defines MDR?
    - Why is MDR evolving as a form of protection?
    - What capabilities and value should you expect from your MDR provider?

    Based on The MDR Manifesto – an examination of the critical capabilities necessary to deliver MDR – each webcast will feature one of seven essential tenets of comprehensive MDR.

    Watch now and learn how to ensure that the results and reports you receive and deliver are hitting the mark.
  • Funding Election Security for the 2020 Election Cycle
    Funding Election Security for the 2020 Election Cycle
    Tom Williams Recorded: May 21 2020 60 mins
    The election season is here. Watch this webinar to discover emerging topics around technology solutions for IT Security in elections for 2020. This includes technology considerations and grant funding to support election initiatives.
  • DevOps, Mainframes and the Economic Rebound
    DevOps, Mainframes and the Economic Rebound
    Anna Murray, ASG Technologies; Jeff Cherrington, ASG Technologies & Mitchell Ashley, Accelerated Strategies Group Recorded: May 21 2020 59 mins
    Disruption is upon us. Businesses are quickly dealing with the economic impact from COVID-19. At the same time, organizations must innovate by shifting to contactless services, increasing digital forms of commerce, and accelerating time to market in the post COVID-19 world.

    Mainframe applications underpin many critical business processes, executing vast numbers of financial transactions, storing terabytes of data and supporting major brands around the globe. Organizations continue to invest in software tools to move to DevOps, automated workflows, CI/CD and IDE integration to accelerate development and manage the complexity. Mainframes are and will be a critical part of organizations path to economic growth.

    On this webinar, ASG Technologies and Mitch Ashley, a former CIO and current CEO of the analyst firm Accelerated Strategies Group, share the importance of advancing mainframes with DevOps processes and toolchains and the vital role mainframes will continue to play in an organizations future.
  • Bringing Governance and Cost Control to your Application Release Pipeline
    Bringing Governance and Cost Control to your Application Release Pipeline
    Pascal Joly, Quali; Mark Galpin, JFrog Recorded: May 21 2020 50 mins
    As your organization goes through the application transformation journey, DevOps engineers are faced with difficult questions around the need to maintain security compliance and infrastructure costs under control while implementing full automation of your release process.

    Join us and learn how JFrog and Quali combine forces to speed up the application release cycle and enforce governance and control. In particular, how Environment as a Service can help with security compliance, with a consistent blueprint throughout the value stream and cost control with built in automation and business-driven policies.
  • Digitally Transform InsurTech: Growth in a Highly Commoditized Insurance Market
    Digitally Transform InsurTech: Growth in a Highly Commoditized Insurance Market
    Eric Howse, Director, Enterprise Sales, Zia Consulting & Jim Schmidt, Strategic Solution Specialist, ASG Technologies Recorded: May 21 2020 44 mins
    Many of ASG’s insurance customers have told us that they are dealing with increasing volatility, uncertainty and commoditization driven by our changing world.

    Consumers and policyholders may have shopped for the best price or the best experience but now they want immediate answers to their quickly changing needs. Brokers may have had the luxury of time to determine policy terms, rates and their commission payments when working with their customers, but today they need immediate answers.

    Group policy administrators now need immediate insights on layoff and furlough provisions, enrollment rules and where they can find policy certificates. Responsive insurers, able to quickly satisfy the needs of multiple stakeholders, will succeed.

    In response to this, ASG and Zia Consulting, will demonstrate how targeting costly and complex document processing tasks seen in applications, underwriting and claims can deliver a rapid ROI.
  • Assessing the Benefits and Risks of Today's Collaboration Tools
    Assessing the Benefits and Risks of Today's Collaboration Tools
    ROBERT CRUZ, Sr. Dir of Information Governance, Smarsh; BRIAN HILL, Principal, Wellington Consulting Recorded: May 21 2020 52 mins
    Collaboration tools are helping organizations save time and work together while reaching a broader audience. The potential risks associated with these dynamic channels are what firms need to be prepared for. In this webinar, we will go over the advantages to giving employees the tools they need to communicate and how to use technologies to help mitigate the risk these dynamic communication tools create.

    Watch this webinar to learn more about:
    - How productivity and customer immediacy goals are driving investment in collaboration
    - How firms are managing new functionalities offered by Slack, Microsoft Teams, and Webex Teams
    - What new communications risks are introduced by interactive tools?
  • Security Awareness Training – Your best line of defence
    Security Awareness Training – Your best line of defence
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ May 26 2020 1:00 am UTC 39 mins
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Secure Your Digital Transformation Journey with Thales and Microsoft
    Secure Your Digital Transformation Journey with Thales and Microsoft
    Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, Thales May 26 2020 1:00 am UTC 90 mins
    For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • The 2020 Global Managed Services Report: Transformation reimagined
    The 2020 Global Managed Services Report: Transformation reimagined
    Dan Greengarten, Senior Vice President, Client Success; Alex Bennett, Group Senior Vice President, Go to market: Customer May 26 2020 7:00 am UTC 45 mins
    NTT Ltd.’s 2020 Global Managed Services Report, conducted by IDG Research, covers the challenges and opportunities felt by over 1,250 business and IT leaders across the world. Our research lifts the lid on the importance of smart sourcing for organizations and the service providers they partner with.
    Join our experts as they discuss how organizations are still transforming. Yet, transformation shifts and pivots dependent upon the internal or external forces being applied. And right now, the pivot is towards the end user. That is keeping people secure, engaged and productive is paramount to ensuring business outcomes are still met.
  • När Nätverken Möter Den Nya Morgondagen! 1
    När Nätverken Möter Den Nya Morgondagen! 1
    Robert Klasson Gigamon SE Nordic and Baltic andJohn Svensson Gigamon Sales Director Nordic and Baltic May 26 2020 8:00 am UTC 30 mins
    Gör mer med befintlig utrustning, verktygsoptimering kan spar upp till 50%
    Klarar befintlig utrustning 10G, 40G, 100G, Hur undviker ni att uppgradera säkerhets och analysutrustning i onödan.
    De flesta organisationer har gjort betydande investeringar i nätverket och säkerhetsverktygen som de använder för att hantera och skydda sina nätverk.

    När trafiken skiftar från LAN till WAN är det viktigt att dataflödet till dessa verktyg inte orsakar överbelastning av sökerhetslösningar och andra verktyg, orsakar områden där ni inte har full synlighet eller skapar andra problem beroende på den ökade trafikmängden.
    För att maximera effektiviteten av en organisations verktyg och säkerhetsutrustning är det viktigt att nätverkstrafik från fysisk, virtuell och moln miljöerna är optimerade innan de levereras till dessa lösningar.
    Om inte riskerar man att överbelasta dessa och att få göra manuell handpåläggning i annars automatiserade processer för att undvika problem
    ”Case study”
    Den amerikanska Myndigheten HHS (Health and Human Services) uppgraderade sitt nätverk till 10 GBps, men många av deras säkerhetsverktyg hade 1 Gbps nätverks interface.
    Med Gigamon kunde de behålla de äldre verktygen som kunde kunna arbeta med trafik från det snabbare 10Gb nätverket.
    Enligt ESG-studie tillhandahåller de en en besparing på 40–50 procent för att de kunnat dimensionera sin hårdvara och sina säkerhetsverktyg
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz May 26 2020 8:00 am UTC 48 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Infrastructure Innovation Insights
    Infrastructure Innovation Insights
    Dell Technologies May 26 2020 8:00 am UTC 90 mins
    Tijdens de Infrastructure Innovation Insights zullen we dieper ingaan op de laatste IT innovaties met enkele van onze infrastructuur experts en teamleden.

    Moderne workloads stellen steeds zwaardere eisen aan uw infrastructuur. Dell Technologies storage-, data protectie-, hyperconverged- en networking- oplossingen bieden u de performance, schaalbaarheid en betrouwbaarheid om u in de komende periode verder te helpen.

    Wij zien u graag tegemoet in dit webinar om u verder te helpen in het nieuwe data tijdperk.
  • How Prepared Are You For The Current Threat Landscape?
    How Prepared Are You For The Current Threat Landscape?
    Richard Vines and Anthony Roberts May 26 2020 8:00 am UTC 36 mins
    Data analysis from Europe published by Cynet, reveals that this wide quarantine creates unique cyber risks that attackers forcefully seize to launch attacks on multiple organizations, especially targeting employees working from home.

    Join Anthony Roberts, Security Engineer at Cynet, as he shares:

    The cyber risks that mass working from home entails.

    Live threat data, showing spike in specific attack vectors.

    Best practices on how to be best prepared and maintain your organisation secure.
  • Security Awareness Training –Your best line of defence
    Security Awareness Training –Your best line of defence
    Paul Down, Director & Matt Cooke, Cyber Security Specialist May 26 2020 9:00 am UTC 31 mins
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Shopfloor 4.0 -> durchgängige Digitalisierung ihrer Produktion
    Shopfloor 4.0 -> durchgängige Digitalisierung ihrer Produktion
    Jürgen Hamm, SAP Solution Architect, NetApp; Alexander Kern, Senior Project Manager, NetApp May 26 2020 9:00 am UTC 30 mins
    Mit transparentem Datenfluss/-management vom Auftragseingang über die Fertigung bis zur Produktauslieferung neue Geschäftsmodelle umsetzen. Themen wie online Qualitätsmonitoring und Qualitätsdokumentation liefern wir „gratis“ dazu.
    Werden sie agil mit uns digital, wir bieten ihnen ein minimales Einstiegsrisiko, und eine schrittweise Umsetzung. Ob sie ihre Digitalisierung auf ihr Rechenzentrum beschränken, oder um die Möglichkeiten eines hybriden Cloud Ansatzes erweitern wollen, bleibt ihre Entscheidung.

    Sprecher:
    Jürgen Hamm, SAP Solution Architect, NetApp
    Alexander Kern, Senior Project Manager, NetApp
  • Next Level Storage: PowerStore!
    Next Level Storage: PowerStore!
    Yves Pelster (Senior Account Executive, Modern Data Center Enterprise) May 26 2020 9:00 am UTC 75 mins
    Intelligent und anpassungsfähig muss sie sein – die Storage-Lösung für das neue Datenzeitalter.

    Im Webinar gehören Sie zu den Ersten, die die Ära der neuen Dell EMC Storage Lösung PowerStore einläuten.
    Die Dell EMC PowerStore bietet eine einheitliche Performance und Effizienz, eine Container-basierte Scale-up- und Scale-out-Architektur sowie die Option, Anwendungen lokal zu hosten und nahtlos zu migrieren. Das Ergebnis: bis zu 7 Mal mehr Leistung und bis zu 3 Mal geringere Latenz.
  • Datenstrategie der Zukunft - Technologietrends, die Sie kennen müssen
    Datenstrategie der Zukunft - Technologietrends, die Sie kennen müssen
    Jörg Meiners, Principal Sales Engineer DACH Region - Denodo Technologies May 26 2020 9:00 am UTC 45 mins
    Im Zeitalter von Big Data, künstlicher Intelligenz und Cloud Computing nimmt die Menge und Heterogenität der Daten rasant zu. Unternehmen brauchen klare Strategien, um ihre digitalen Informationen effektiv zu nutzen und die datenbasierte Wertschöpfung voranzutreiben.

    In diesem Webinar stellen wir Ihnen zukunftsweisende Technologietrends vor, die die Datenstrategien von Unternehmen global prägen:

    • Wie richten große Organisationen ihre Architekturen zur konformen Daten-Bereitstellung strategisch aus? Welche Rolle spielt hierbei das Konzept der „Data Fabric“?
    • Wie lässt sich eine konsistente Daten-Integration in Echtzeit innerhalb einer heterogenen Landschaft aus on-prem und diversen Clouds sicherstellen?
    • Wie können Unternehmen eine Self-Service Infrastruktur aufbauen, um ihre Datenbestände zugänglich zu machen und zu monetarisieren?
  • Keep Hidden Threats from invading your network
    Keep Hidden Threats from invading your network
    Chris McCormack May 26 2020 10:00 am UTC 45 mins
    Network firewalls are evolving, and the latest generation
    is very different from its predecessors. We continue to see
    a shift in the threat landscape, and a dramatic rise in the
    number and complexity of security systems that protect
    against cyberattacks.


    These changes, combined with the
    overwhelming amount of data produced, have created a
    dangerous situation that requires a much different approach
    to network security, one that makes it essential security
    systems work together, simplify and streamline workflows,
    and parse through enormous volumes of data to focus
    attention on exactly what’s important without negatively
    impacting performance. It also requires new approaches to
    security integration, new management systems, and new
    ways of identifying and responding to risks and threats.
  • Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Tim van Baarsen May 26 2020 10:00 am UTC 57 mins
    In this talk, Tim van Baarsen will take you on a journey beyond the basics of Spring Kafka and will share his knowledge, pitfalls and lessons learned based on real-life Kafka projects that are running in production for many years at ING Bank in the Netherlands.
  • Pluralsight Customer Workshop - Next
    Pluralsight Customer Workshop - Next
    James Mason, Next - Service Delivery Software and Projects Manager May 26 2020 10:00 am UTC 60 mins
    This session will present Next's story of Tech Skills development and the steps they have taken with Pluralsight to address staff retention and in supporting the organisations key business strategies.
  • Stellen Sie die Weichen: Effiziente Netzwerk-Verwaltung mit SD-WAN - WKLMC (2/3)
    Stellen Sie die Weichen: Effiziente Netzwerk-Verwaltung mit SD-WAN - WKLMC (2/3)
    Marc Prenger (Sr. Sales Engineer Networking) May 26 2020 11:00 am UTC 75 mins
    Erfahren Sie in diesem Webcast, wie Sie Ihr traditionelles WAN durch den Einsatz von SD-WAN technisch und betrieblich optimieren können. Profitieren Sie von einem optimierten Datenverkehr mit höheren Bandbreiten zu ggfls. niedrigeren Kosten (CAPEX / OPEX) und kürzeren Bereitstellungszeiten. Lösen Sie sich von Ihrem bisherigen WAN Anbieter, nutzen Sie mehrere Anbieter oder Technologien parallel und öffnen Sie die Türen hinsichtlich SaaS Angeboten in der Cloud.

    Über Marc Prenger: Sr. Sales Engineer Networking (Enterprise / Service Provider), Subject Matter Expert SD-WAN
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint May 26 2020 12:00 pm UTC 34 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Reflections on Secure Remote Working
    Reflections on Secure Remote Working
    Kamran Khan, Intelligent Workspaces GTM Leader and Rory Duncan, Intelligent Cybersecurity GtM Leader May 26 2020 1:00 pm UTC 60 mins
    A little more than two months on from the implementation of strict lockdown measures in the UK, Ireland and many other countries across the world, join presenters Rory Duncan, Go to Market Lead for Cybersecurity and Kamran Khan, UK&I Go to Market lead for Intelligent Workplace at NTT Ltd. as we reflect on key lessons learned from the rapid shift to home working.

    In this webinar we will share the very latest insights about what we are seeing in the market and discuss best practices around how the technologies and solutions deployed to respond rapidly to COVID-19 can be leveraged to enhance employee experience, improve security posture and ultimately contribute to longer term business recovery.
  • Enterprise Data TDI Reference Architecture
    Enterprise Data TDI Reference Architecture
    Dell Technologies May 26 2020 1:00 pm UTC 60 mins
    SAP HANA Data Architecture and Dell Technologies TDI Reference Architecture.
    Dopo aver definito nel primo webinar la Data Strategy ideale, in questo secondo webinar affronteremo le Reference Architectures che ci permetteranno di poterla implementare al meglio.

    Verranno quindi approfondite le soluzioni TDI (Tailored Datacenter Integration) che seguono le best practices SAP e Dell Technologies.
  • Data Xpresso meets Seth Cochran, Founder & CEO of Operation Fistula
    Data Xpresso meets Seth Cochran, Founder & CEO of Operation Fistula
    Helena Schwenk, Technology Evangelist,; Eva Murray, Technology Evangelist | Exasol May 26 2020 1:30 pm UTC 30 mins
    Special guest Seth Cochran takes us through how he built a nonprofit for maternal health and how his data-driven approach completely flipped the typical nonprofit funding model on its head to lead to more effective and better outcomes for women and girls.
  • Ready to take back control of office 365?
    Ready to take back control of office 365?
    Matt Walmsley May 26 2020 2:00 pm UTC 26 mins
    With the widespread adoption of Office 365 and an increasingly mobile workforce, cloud security has become top of mind for most organisations. Traditional security solutions, like enabling MFA, are focused point-in-time assessments and offer limited efficacy since attackers can still hijack authenticated sessions to gain access. It’s time fora more modern approach to cloud security.

    This webcast we will discuss:

    The latest trends in cloud threats
    Why preventative solutions aren’t sufficient to stop attacks
    Why the severity of an attack in the cloud surpasses an on-prem attack
    How Vectra Cognito for Office 365 can help stop attacks before they become breaches
  • Protecting the Unprotectable
    Protecting the Unprotectable
    Dries Robberechts May 26 2020 3:00 pm UTC 57 mins
    Current IT revolutions such as Cloud, IoT and BYOD force dramatic changes upon corporate networks. With countless devices and services getting connected and no clear network boundaries, Identity has to be the new perimeter. Not trusting anyone by default, even those already inside the network perimeter has to be the new reality. The security model of Zero Trust.

    Silverfort’s Next-Generation Authentication Platform can enforce secure authentication for any user on any system, including systems that were considered “Unprotectable” until today, without any modifications to endpoints and servers. This includes homegrown systems, IT infrastructure, IoT devices, dynamic IaaS environments and more.

    Silverfort enables organizations to address a wide variety of Zero Trust use cases and compliance needs, including secure migration of sensitive applications to the Cloud.

    Watch this webinar to learn:

    Why passwords are no longer a reliable factor of authentication.
    Why so many sensitive enterprise systems still aren’t protected by Multi-Factor Authentication (MFA).
    Why traditional MFA won’t cope with Zero Trust requirements.
    How Silverfort’s technology allows full agent-less Adaptive Risk Based Authentication.
  • Deploying 128 at Scale: Best Practices for Large Scale SD-WAN Deployments
    Deploying 128 at Scale: Best Practices for Large Scale SD-WAN Deployments
    Patrick Timmons - Co-Founder, VP of Customer Success May 26 2020 3:00 pm UTC 60 mins
    In this webinar, we will discuss how to approach deploying large-scale network topologies with the 128T Session Smart router. We will explain strategies for designing, deploying and monitoring your large-scale network.
  • Streamline your IT for increased agility
    Streamline your IT for increased agility
    Pierrick Martel, Product Marketing Manager and Eileen Lee Lavergne, Technology Marketing Consultant May 26 2020 3:00 pm UTC 37 mins
    In organizations around the world, IT teams are innovating practices to collect crucial data, improve performance and experience, and provide a more agile, streamlined environment. However with higher business expectations, increased security and continuity processes, and aging tools create barriers in the path to a data-driven, agile business. Discover how you can streamline your IT and capture crucial data to continuously improve your business performance.

    Enable your IT performance analysis with future-ready and AIOps-connected tools. If you’re under pressure to streamline IT, learn new strategies in this 35 minute webinar to:
    • Monitor everything - by unleashing the power of connection.
    • Build a bridge - between monitoring and service desk.
    • Automate IT operations - with a robust set of APIs.
    • Streamline your data - for predictive insights and informed decision making.
  • 5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    Emmanuel Bertolin, SVP and General Manager of Provider Services, AppDirect and Laura Stevenson, Senior Director, AppDirect May 26 2020 3:00 pm UTC 45 mins
    Today, chances are good that you’re part of the consumer subscription economy. Maybe you have an Amazon Prime account, stream Hulu, or listen to your favorite songs on Spotify. But selling, implementing, and managing recurring B2B digital products is entirely different than selling simple subscriptions to consumers.

    In this webinar, Emanuel "Bert" Bertolin, AppDirect's Senior Vice President and General Manager of Provider Services, will give an overview of B2B subscription commerce. He will also detail five key reasons why a consumer subscription playbook won't work for businesses. Specifically, he'll cover how B2B subscriptions are:

    - More complex and multi-dimensional
    - Need more sales assistance
    - Often include the channel
    - Require seamless integration
    - Must accommodate a range of payment options

    Attendees will come away with a better understanding of how to adapt to these differences and succeed in the new world of B2B subscription commerce.
  • Deep Dive into the new SD-WAN Sandbox
    Deep Dive into the new SD-WAN Sandbox
    Stuart Clark, Eugene Black, Sai Suchandan Reddy Marapareddy, Silvia Spiva - Cisco Systems May 26 2020 3:00 pm UTC 60 mins
    In the BrightTalk webinar, you will hear how we planned and built the new Cisco SD-WAN Sandbox, what goes into building a sandbox, and an awesome demo from Sai showing you how to use Postman collection examples to get started with Cisco vManage APIs. Then we will look at how to use vManage Aggregation APIs to generate reports on statistics related to loss/latency/jitter of SD-WAN overlay tunnels and we will also look at how to use APIs to trigger policy updates to change the preferred transport for certain application traffic. Finally, we look at how to use Viptela Python SDK to simplify operations related to feature/device templates. We will also be taking your questions live too.