Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack Andy Shoemaker Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed Product Marketing Manager, Imperva Incapsula Recorded: Aug 26 2016 56 mins
    In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.
  • Jak modernizować IT i gdzie szukać oszczędności na innowacje? Jak modernizować IT i gdzie szukać oszczędności na innowacje? Filip Kata, Systems Engineer, EMC Recorded: Aug 26 2016 50 mins
    Podczas sesji zaprezentujemy w jaki sposób, przy obecnie topniejących budżetach, można znaleźć fundusze na innowację i rozwój nowoczesnych platform i aplikacji.
  • Don’t Buy the Healthcare IT “Snake Oil”! Don’t Buy the Healthcare IT “Snake Oil”! Marion Jenkins, Healthcare Technology Partners Recorded: Aug 25 2016 26 mins
    Recently the president of the American Medical Association referred to healthcare IT as the “snake oil” of the 21st century. He referenced ineffective electronic health records, an explosion of direct-to-consumer digital health products, and apps of mixed quality.

    In this webinar, leading healthcare expert, Marion Jenkins, will cover the major causes of this sorry state of affairs, and discuss how healthcare technologies can actually help medical practices deliver better patient care.

    Major areas to be covered:

    1.Who is to blame? There is plenty to go around. Physicians? Healthcare IT vendors? The government? The solution must get past blame and address solutions.

    2.How can clinical users and executives “break through” the logjam of sub-optimal IT systems, poor implementation, and ineffective workflows?

    3.Is it possible to utilize new technologies to improve patient care, without breaking the bank and further hurting the clinician/patient experience?

    4.What are the necessary changes that enable technology to actually provide benefit in a healthcare setting?
  • Using your Load Balancer for Application Performance Monitoring Using your Load Balancer for Application Performance Monitoring Ashish Shah, Director of Product, Avi Networks Recorded: Aug 25 2016 47 mins
    Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.

    In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:

    • A “Network DVR” to record and replay traffic events to pinpoint app issues
    • At-a-glance view of all virtual services throughout the system
    • Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
    • Health scores that give you immediate feedback on application performance
  • Know Your Baseline Costs Before Considering Migration Know Your Baseline Costs Before Considering Migration Chris Grossmeier, Director of Product Management Recorded: Aug 25 2016 42 mins
    Join this webinar to be certain of making the right decisions on moving resources to the cloud. You’ll see how to evaluate which workloads are candidates for cloud migration PLUS measure how efficiently you’re utilizing your own resources.

    The CloudPhysics Cost Calculator for Private Cloud lets you apply basic costing models to determine your actual costs per virtual machine (VM) in terms of power, compute resources, memory, storage, licensing, and more to generate a cost baseline.

    Now you can apply CloudPhysics rightsizing intelligence to your VMs. See your “as is” costs beside your rightsized costs at peak, 99th percentile, and 95th percentile. Capture savings by reducing workloads to match actual demands and reduce overprovisioning.

    When mapping your VMs to their public cloud instances, apply the same peak, 99th percentile, and 95th percentile data to reveal cost difference for private versus public cloud.

    Attend this webinar to be sure you’ve optimized decision-making before you move.
  • Autopilot for Data Viz Tasks: TIBCO Simplr & Spotfire Cloud Autopilot for Data Viz Tasks: TIBCO Simplr & Spotfire Cloud Katherine Hatch, Product Marketing at TIBCO Software; Timothy Alexander, Senior Product Marketing Manager at TIBCO Software Recorded: Aug 25 2016 35 mins
    Most of us use tons of cloud services like Marketo, Slack, Salesforce, Office 365 and Google Apps - all which make life easier. There are still, however, all kinds of tedious tasks around gathering, managing and moving data from these systems, as well as from co-workers and customers. TIBCO Simplr is a personal workflow automation tool that puts routine tasks on autopilot, and when used with TIBCO Spotfire, automates workflows so you can dive deeper into data and deliver visualizations and insights faster than ever.

    Regardless of technical skill level, anyone can:
    - Access information in cloud apps they use everyday
    - Collect it from people with easy-to-create forms
    - Move it to where they need it through powerful flows - all without help from IT
    - Automate data visualizations with TIBCO Spotfire

    Join this webinar to learn how TIBCO Simplr and TIBCO Spotfire can put time back in your day, and help you get that raise you deserve too.
  • Metric and Measurement Mistakes that Destroy Agile - 1 PMI PMP PDU Credit Metric and Measurement Mistakes that Destroy Agile - 1 PMI PMP PDU Credit Andy Jordan, ProjectManagement.com Recorded: Aug 25 2016 58 mins
    To be a high performing business, you require effective metrics and measurements that will help you gain valuable performance insights which will help drive informed and strategic decisions for your organization. Join Andy Jordan, ProjectManagement.com as he discusses what people are doing wrong when it comes to Agile metrics and provide guidance on how to get it right – the first time. Andy will also discuss the risks of using common metrics between Agile and waterfall approaches as well as why organizations need to focus on value-based metrics rather than arbitrary metrics of progress.

    This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
  • Not All SD-WANs Are Equal. Performance Matters! (EMEA Version) Not All SD-WANs Are Equal. Performance Matters! (EMEA Version) Zeus Kerravala is founder and principal analyst with ZK Research & Chris Rogers, Director of Cloud Solutions at Silver Peak Recorded: Aug 25 2016 41 mins
    The use of broadband Internet connections in SD-WAN environment has many benefits, however for any enterprise, performance and reliability cannot be compromised. An SD-WAN solution must include all the functionality needed to meet these essential requirements that deliver outstanding performance and Quality of Service by:

    •Actually improving the quality of the bandwidth you already have, instead of routing around it
    •Enabling centralized control and administration of network-wide policies
    •Providing detailed visibility into real-time and historical application and network trends
    •Allowing for the modular deployment of WAN optimization to insure performance when you need it, where you need it
    This all adds up to an enterprise-grade, performance-centric offering that allows your SD-WAN to rapidly connect users to the applications they need. Deployment times are reduced significantly and enterprises enjoy enhanced performance, visibility and control over the entire network.
  • Video - Cyber Resiliency: Bouncing Back from a Security Breach Video - Cyber Resiliency: Bouncing Back from a Security Breach Misha Govshteyn, Founder & Chief Security Officer, Alert Logic Recorded: Aug 25 2016 31 mins
    Cyber resilience encompasses cyber security and business resilience, and aims not only to defend against potential attacks but also to ensure an organisation's survival following a successful attack. Companies cannot avoid cyber attacks 100-percent of the time, breaches will eventually occur but in order to bounce back quickly from attacks, companies must become cyber resilient.

    Misha Govshteyn, Founder & Chief Security Officer at Alert Logic delivered a talk at our London Cloud Security Summit - "Cyber Resiliency: Bouncing back from a security breach". In this session he examines cyber risk and the keys steps in building a cyber resilience strategy.
  • Video: Live Cyber Hack Demo Video: Live Cyber Hack Demo James Brown, VP of Global Solution Architecture and Richard Cassidy, UK Cyber Security Evangelist Recorded: Aug 25 2016 22 mins
    Watch a Live Cyber Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of implementing web applications that lack the correct security controls. The will also demonstrate how web applications are attacked, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security, tailored towards the AWS Cloud.
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Recorded: Aug 24 2016 39 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • Building Blocks for Scalable, High Performance Storage Applications: SPDK Building Blocks for Scalable, High Performance Storage Applications: SPDK Jonathan Stern, Storage Applications Engineer at Intel Corporation Recorded: Aug 24 2016 59 mins
    Discussing the Storage Performance Development Kit (SPDK) an extension of the Data Plane Development Kit (DPDK) into a storage context. We cover how SPDK got started, what the benefits are of an NVMe* polled mode driver, how SPDK supports protocols like NVMe over Fabrics and the future areas of development for SPDK.
  • Next Generation Data Centers – Are you ready for scale? Next Generation Data Centers – Are you ready for scale? Qing Xu, Technology and Applications Manager, Belden; Stephen Worn, CTO, DatacenterDynamics Recorded: Aug 24 2016 51 mins
    This presentation will provide a general overview of the data center trends and the ecosystem that comprises of “hyperscale DC”, “MTDC”, and “enterprise DC”.
  • It’s a Global Market. Address it! It’s a Global Market. Address it! Thomas Brence, Dir Product Marketing, Informatica - Sheila Donovan, President, Global DM Solutions Recorded: Aug 24 2016 48 mins
    Many corporations are looking overseas for continued business growth in both consumer and business markets. Now more than ever, customer contact data is a vital corporate asset.

    If you are responsible for managing global address data, this webinar is for you. You will learn how to optimize performance from Informatica’s Address Verification product by developing best practices for global address data management.

    During this webinar, viewers will learn:
    •Developing quality acceptance standards for multiple data sources
    •Identifying and troubleshooting poor quality incoming data
    •Creating business rules for exception processing
    •Understanding language and cultural idiosyncrasies that affect address data
    •Educating your team about the Do’s and Don’ts of global address management
    •Developing core best practices for your organization
    •Selecting the best parameters in Address Verification for your specific business needs
    Join industry veteran and thought leader, Sheila Donovan, President and Founder of Global DM Solutions, as she walks through this exciting content.
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Recorded: Aug 24 2016 59 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • Don’t Pay the Ransom!  A Guide on how to Prevent & Recover from Ransomware Don’t Pay the Ransom! A Guide on how to Prevent & Recover from Ransomware Brian W. Levine, Sr. Director of Cloud Security and Compliance, Syncplicity Recorded: Aug 23 2016 33 mins
    To say ransomware is a growing threat is an understatement. While there is no foolproof way to prevent an attack, there are measures you can put in place to better defend against this new and very destructive type of malware. Join Syncplicity’s Senior Director of Cloud Security and Compliance, Brian W. Levine, as he outlines why Syncplicity should be an integral part of your plan to prevent and recover from an attack, and how we can help you avoid paying the ransom.
  • Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro Making the Move to Hyper-V: LifeStore Bank’s Transition from VMware ESX to Micro G2M Communications Recorded: Aug 23 2016 53 mins
    The costs of running VMWare have risen to unmaintainable levels for companies that are looking to expand and scale operations. The ESX Tax over burdens IT budgets, hindering their ability to scale and manage OPEX. In this webcast, we will show IT managers how Microsoft Hyper- V and Storage Spaces can be a game changer for their organization, providing a cost effective, stable and easy to manage virtualization platform. LifeStore Bank will tell you how they transitioned from an infrastructure based on VMWare ESX and EMC VNXe to Microsoft Hyper-V and DataON Storage's Cluster-In-Box (CIB) storage to scale their capabilities, optimize service level agreements and lower the cost of running virtual environments by 1.5X

    Speakers

    Howard Lo, VP of Sales, Dataon Storage
    Aidan Finn – Microsoft MVP
    Josh Rountree – IT Manager, LifeStore Bank
    Kris Menon - Business Development Manager, HSGT
    Shaun Walsh – Managing Partner, G2M Communications
  • What Your Object Storage Vendor Isn't Telling You About NFS Support What Your Object Storage Vendor Isn't Telling You About NFS Support George Crump, Storage Switzerland Recorded: Aug 23 2016 61 mins
    NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
  • Not All SD-WANs Are Equal. Performance Matters! Not All SD-WANs Are Equal. Performance Matters! Zeus Kerravala is founder and principal analyst with ZK Research & Chris Rogers, Director of Cloud Solutions at Silver Peak Recorded: Aug 23 2016 41 mins
    The use of broadband Internet connections in SD-WAN environment has many benefits, however for any enterprise, performance and reliability cannot be compromised. An SD-WAN solution must include all the functionality needed to meet these essential requirements that deliver outstanding performance and Quality of Service by:

    •Actually improving the quality of the bandwidth you already have, instead of routing around it
    •Enabling centralized control and administration of network-wide policies
    •Providing detailed visibility into real-time and historical application and network trends
    •Allowing for the modular deployment of WAN optimization to insure performance when you need it, where you need it
    This all adds up to an enterprise-grade, performance-centric offering that allows your SD-WAN to rapidly connect users to the applications they need. Deployment times are reduced significantly and enterprises enjoy enhanced performance, visibility and control over the entire network.
  • Become a Cloud Master with the HPE Helion Cloud Suite Become a Cloud Master with the HPE Helion Cloud Suite Keri Sprinkle, Neil Miles, Kiran Makarla HPE Recorded: Aug 23 2016 56 mins
    In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.


    Join this web event for a deeper dive, and be the first to see this new suite in action:

    Manage hybrid and multi-cloud environments
    Develop, deploy, and scale cloud-native applications
    Drive business performance with focused analytics

    More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.


    View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517
  • Next Generation Cloud Data Warehousing with Informatica and Microsoft Azure Next Generation Cloud Data Warehousing with Informatica and Microsoft Azure Life Time Fitness, Microsoft Azure, Informatica Aug 30 2016 4:00 pm UTC 60 mins
    Become a cloud-first company on your terms with hybrid cloud data management. Join us to learn how you can use Informatica Cloud or leverage your existing PowerCenter investment to redirect workloads and run on Microsoft Azure public cloud eco-system. You will learn how your organization can benefit from cloud economics and improved agility, while continuing to leverage existing PowerCenter resources, skills and work-products. Gain insight into the products and connectors available to run Informatica on Azure. Hear how Life Time Fitness is using Informatica Cloud and PowerCenter running on Microsoft Azure to drive customer intimacy and improve operational efficiency.
  • The Cost Shift Model for Video Storage and Data Management The Cost Shift Model for Video Storage and Data Management Brian Morsch, VP of Sales, Surveillance & Security – Americas and Andy Brinck, VP of Channel Sales – Americas Aug 30 2016 4:00 pm UTC 45 mins
    If you are a security integrator then this webinar is for you!

    Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform.

    Join us on Tuesday, August 30 at 9:00 AM PST for The Cost Shift Model
    for Video Storage and Data Management to learn how Quantum is taking a different approach to revolutionize storage solutions within the surveillance and security industry.

    Attend this webinar and learn:
    - How a multi-tier storage approach is shifting the budget spent in the surveillance market
    - How to extend your customers’ surveillance budget
    - How you can offer a scalable storage solution without compromising video quality, retention time, or camera streams

    Quantum can help you design and implement a scalable storage foundation that will enable you to differentiate your offerings in the market.
    Register for this webinar today!
  • How Global DMS Transformed their Customer Experience How Global DMS Transformed their Customer Experience Kelly Ann Jourdain, Manager, Technical Support, Global DMS and Carl Rio, Strategic Account Manager, NewVoiceMedia Aug 30 2016 5:00 pm UTC 60 mins
    What’s the best way to enhance the sales and customer experience? Not quite sure what the answer is – don’t worry, every company finds themselves dwelling on how to accomplish this.

    Join Kelly Ann Jourdain, Manager Technical Support at Global DMS and Carl Rio, Strategic Account Manager at NewVoiceMedia as they discuss how Global DMS tackled transforming their customer and sales engagement by increasing their speed of call resolution, eliminating their back-up call center, utilizing omni-channel and analytics to drive efficiency gains.
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Aug 30 2016 5:00 pm UTC 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

     about other available Azure programs
     application development tests on Azure
     what other customers are doing on Azure and how it is paying large dividends
  • Google Cloud Storage Nearline - Take Your Data To The Next Level Google Cloud Storage Nearline - Take Your Data To The Next Level Brian Stevens and Carl Schachter, Google Aug 30 2016 7:00 pm UTC 30 mins
    Find out about how organizations can dramatically lower storage infrastructure costs by deploying a cloud-based object storage solution.

    Led by Google executives, Brian Stevens and Carl Schachter, this webcast will discuss:
    ●The benefits of using cloud as another storage tier?
    ●When to consider Cloud Storage (GCS) for secondary storage
    ●How to potentially use Cloud (Google Compute Engine) for Disaster Recovery
    ●Potential issues with bandwidth, recovery time, cost, security and usability

    Google Cloud Storage Nearline is a low-cost, highly-durable and highly available storage service for infrequently accessed data, data archiving, online backup and disaster recovery. Data is available instantly, not within hours or days. With sub-second average response times and 1 cent per GB/month pricing, Cloud Storage Nearline gives you terrific performance at a low cost.
  • Industry 4.0 & IoT:  the convergence of  information and operational technology Industry 4.0 & IoT: the convergence of information and operational technology Jimmy Garcia-Meza co-founder and CEO of CloudPlugs Aug 31 2016 4:00 pm UTC 60 mins
    This webinar explores the convergence of Operational and Information technology as one of the key benefits of the Internet of Things; and how to use this convergence as a way to build a new generatin of integrated digital supply chains which are the base of Industry 4.0.

    This webinar will cover the following topics:

    * Industry 4.0 and IoT Trends
    * Higher efficiency and productivity through end to end integrated digital supply chains
    * New business opportunities for all players in the manufacturing supply chain
    * Real life examples on industrial process improvements through the use of IoT

    About the speaker: Jimmy Garcia-Meza is the co-founder and CEO of CloudPlugs Inc. He has over 20 years of experience running startups and large divisions in private and public U.S. multinational companies. He co-founded nubisio, Inc. a cloud storage company acquired by Bain Capital. He was CEO of FilesX, a backup software company acquired by IBM. He held various executive positions at Silicon Image (SIMG) where he was responsible for driving the world-wide adoption of HDMI. He was a venture director at Index Ventures and held several executive positions at Sun Microsystems where he has in charge of a $1.7B global line of business.
  • Using Salesforce Gamification to Improve Sales Performance Using Salesforce Gamification to Improve Sales Performance Richard Dumas Regional VP, NewVoiceMedia Aug 31 2016 5:00 pm UTC 60 mins
    Would you like to improve sales performance, grow your active pipeline, increase calls made and meetings booked? Would you like to increase logging of new contact information and improve the overall usage of your CRM?

    Gamification for Salesforce can help you do just that by fostering teamwork, collaboration, and a healthy level of competition within your sales organization that will ultimately boost the performance of your sales team.

    During this webinar you will see a live demonstration of NewVoiceMedia Motivate working alongside Salesforce Sales Cloud and NewVoiceMedia ContactWorld for Sales.

    You will learn how to:

    - Analyze personality types and design incentives that will reward sales reps in a way that will energize them most
    - Run team competitions with incentives to drive performance
    - Increase sales performance through interactive, real-time leaderboards, alerts, recognition and comparisons
    - Use gamification techniques to encourage your inside sales team to make more calls and engage more prospects over the phone
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Informatica Cloud – An Introduction Informatica Cloud – An Introduction Phil Turton, Informatica Cloud Lead, UK & Ireland Sep 1 2016 10:00 am UTC 30 mins
    Cloud technology – cloud platforms (e.g. AWS and Azure) and cloud applications (e.g. Salesforce, Workday, Tableau) are becoming an increasingly prevalent constituent of a company’s enterprise architecture. Informatica Cloud is the Gartner market-share leader (22%) in the key “iPaaS” or “Cloud Integration” sector – technology to connect cloud to cloud or cloud back to an on-premise infrastructure. This presentation sets out the market context, Informatica product overview and position within Informatica’s strategy.
  • Big Data Innovation – From Experiment to Production Big Data Innovation – From Experiment to Production Matt Aslett - 451 Research Director, Data Platforms and Analytics with Aali Masood, Senior Director, Oracle Sep 1 2016 4:30 pm UTC 60 mins
    Big Data projects offer the promise of generating value from previously ignored or under-exploited data. Many enterprises are looking to take advantage of new data sources and combine that with the wealth of information they already hold about their customers, their business, even their competitors to develop new innovative applications and services, such as:

    · combining data from devices, sensors, customers, and analyze that in real time to react better and faster (example, location-based services)
    · pursue new opportunities in an adjacent markets – for example selling predictive maintenance services to the buyers of your products
    · accelerate time to market – for example identifying the most valuable customers and launching special programs to boost loyalty

    Innovation from Big Data is driven by experimentation to uncover new markets or data-driven products and services, as well as trying out new business processes, searching for new insights, and testing new hypotheses.

    However, a well-planned integration strategy is essential to putting this innovation to work in production business environments. The innovation may take advantage of new platforms, but to be taken into production it must work smoothly with existing systems and processes. No matter where the innovation came from, enterprises still need to access data, and figure out how to make it scale. This will involve not only the technology team, but business and strategic leaders as well.

    Join Oracle and 451 Research for a webinar exploring how to take advantage of big data opportunities by coordinating innovation and production. It covers how to manage rapid development in an environment with minimal control—together with the ability to migrate innovation into a production environment to support real-world needs that are constantly changing.
  • Briefings Part 1: The Digital Marketplace & Cybersecurity Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Sep 1 2016 5:00 pm UTC 75 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

     Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

     Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

     Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • Jak platformy typu All-Flash Array zmieniają perspektywę składowania danych. Jak platformy typu All-Flash Array zmieniają perspektywę składowania danych. Bartosz Charliński, Systems Engineer, EMC Sep 2 2016 8:00 am UTC 60 mins
    Czy przyspieszenie aplikacji musi być kosztowne? Czy proces ich rozwoju i testowania musi być oparty o kompromisy związane z niską wydajnością i wysokim poziomem komplkacji? W czasie porannej kawy pokażemy Państwu jak w prosty sposób, z wykorzystaniem różnych rozwiązań All Flash zmienić podejście do serwowania i rozwoju swoich najbardziej wymagających aplikacji.
  • Digitale Transformation und die Auswirkungen auf Ihr Business Digitale Transformation und die Auswirkungen auf Ihr Business Jürgen A. Krebs Sep 2 2016 8:00 am UTC 60 mins
    Erfahren Sie unter anderem

    - wie Sie schneller als die Konkurrenz auf Innovationen reagieren können.
    - was Ihnen zu Umsatz für heute und auch morgen verhelfen kann
    - wie Sie Ihre eigene Unternehmenstransformation gestalten können

    und vieles mehr!
  • Manage any device, anywhere from a single console with HEAT LANrev Manage any device, anywhere from a single console with HEAT LANrev Margreet Fortune Sep 6 2016 9:45 am UTC 60 mins
    HEAT LANrev was Highly Commended in the recent Computing Vendor Excellence Awards in London - Mobile Management category.
    With the fragmentation of technology platforms and proliferation of mobile devices organisations today need a unified management approach for smart connected devices. Join this session to learn how HEAT LANrev can provide end to end multi-platform support for Windows, Mac, Linux, iOS and Android.
  • The FCA Says the Cloud is OK The FCA Says the Cloud is OK Greg Hanson, CTO & VP Cloud EMEA, Informatica & Andrew Joss, Head of Industry consulting – Financial Services, Informatica Sep 6 2016 1:00 pm UTC 60 mins
    The Financial Conduct Authority (FCA) has released guidance for all Financial Services Institutions considering outsourcing to the Cloud, advising a Hybrid or Cloud deployment fosters innovation which can be a driver for effective competition.

    Using a third party provider to integrate with cloud software can open a new world of opportunities including cost efficiencies, increased security and a more flexible infrastructure capacity. These benefits support effective competition.

    Join this webinar and learn:

    1.Trends and drivers of change in Financial Services
    2.The latest guidance, from the FCA, for firms outsourcing to the ‘cloud’ and what it means
    3.Cloud, Hybrid and on-Premise – why no one size fits all and why that’s ok
    4.The benefits and the opportunity available to Financial Services Organisations
  • Experts show how hackers perform web attacks which kills your site ranking Experts show how hackers perform web attacks which kills your site ranking Leon Brown - Product Marketing, Symantec Website Security & Avishay Zawoznik - Security Researcher, Imperva Incapsula Sep 6 2016 3:00 pm UTC 45 mins
    After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.
  • 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 홍세진, 부장, HPE 소프트웨어 보안사업부, 휴렛팩커드 엔터프라이즈(HPE) Sep 7 2016 5:00 am UTC 60 mins
    공격자들은 지하 시장에서 점점 전문화 , 조직화하고 있으며, 공격 기법도 무서운 속도로 고도화하고 있습니다.
    정보 보호 업체인 “Websense Security Labs”이 미국, 영국, 캐나다, 호주의 IT관리자 1,000명 을 대상으로 조사한 결과 보고서에 따르면 대부분의 데이터 유출 사고는 “인가된 사용자”에 의해 이루어지고 있다고 합니다.
    또한 그 동안 국내/외 많은 보안 사고 사례를 통해 알 수 있듯이 대부분의 정보 유출 사고는 탈취된 정상 사용자 계정 권한을 이용해서 이루졌다는 사례를 언론 등을 통해서 접할 수 있었습니다.

    정보 유출 사고 예방을 위해 대부분의 보안 담당자는 이러한 알려진/알려지지 않은 다양한 보안 위협과 고도화된 내/외부에서 발생되는 위협을 식별 및 대응을 위한 위협 관리 체계의 필요성을 느끼고 있으며, 가트너에서는 향후 내/외부 다양한 보안 위협 예측 그리고 예방을 위해User Behavior Analytics (UBA) 사용은 필수이며, 2018년까지 최소 25%이상의 보안사고가 UBA 기술에 의해 탐지될 것이라고 리포트를 통해 예측하고 있습니다.

    프로파일링 기반 이상행위 분석은 정상적인 사용자 및 시스템의 행동과 적절한 연관성의 정상 기준선을 설정하고 사용자 및 동료 그룹 간 이상 현상을 실시간으로 분석을 통해 권한 보유 사용자의 비정상 행위를 시각화 및 위협 예측 그리고 예방합니다.

    또한 전체 IT 환경에 대한 보안을 더욱 민첩하고 지능적으로 변모하도록 요구하고 있으며, SIEM 보안 플랫폼과 연계 가능하며 UBA 기술은 알려진 위협과 알려지지 않은 위협에 관한 조치 가능한 정보를 생성하여, 사용자 및 시스템에 대한 세부적인 가시성을 제공함으로써 위협을 선제적으로 대응할 수 있는 보안 인텔리전스와 내부 위협를 보다 신속하게 해결할 수 있습니다.
  • Data Protection 101: Follow and protect your critical data, wherever it lives Data Protection 101: Follow and protect your critical data, wherever it lives Sunil Choudrie, Global Solutions Marketing Manager Sep 7 2016 10:00 am UTC 45 mins
    When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

    Organizations today face the following challenges:
    •Identifying the type of data that needs to be protected
    •Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
    •Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

    Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

    Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
  • Protection des données:comment gérer & protéger les données,où qu’elles résident Protection des données:comment gérer & protéger les données,où qu’elles résident Hervé Doreau, Directeur Technique – Symantec France Sep 7 2016 1:00 pm UTC 45 mins
    Lorsqu’il s’agit de vos données sensibles, comment pouvez-vous être certain qu’elles sont protégées et qu’aucune ne quitte votre environnement ?

    Les entreprises sont aujourd’hui confrontées aux difficultés suivantes :

    - Identifier le type de données à protéger
    - Contrôler l’accès aux données et garantir la confidentialité des identités, en particulier face aux fortes amendes prévues par la réglementation
    - Empêcher les fuites de données en dehors de l’organisation, les mégafuites et pertes de données s’accroissant d’année en année. 

    En 2015, plus d’un demi-milliard d’enregistrements personnels ont été dérobés ou perdus, et les campagnes de spear-phishing à l’encontre des salariés d’entreprise ont augmenté de 55 %.

    Dans un premier temps, il convient de permettre aux bonnes personnes d’accéder aux données pertinentes, où qu’elles se trouvent, en contrôlant l’accès, en surveillant les flux et en évitant qu’elles tombent entre de mauvaises mains. Vous pouvez alors facilement passer à la seconde étape : appliquer des politiques qui contrôlent l’accès aux données et leur utilisation, que ce soit sur le cloud, les appareils mobiles ou le réseau.

    Assistez à un webinaire Symantec sur les derniers enseignements tirés en matière de protection des données pour l’ensemble des applications qui composent votre environnement.
  • Deep-dive into Linux Based Applications on Microsoft Azure Deep-dive into Linux Based Applications on Microsoft Azure Jose Miguel Parrella, Open Source Product Manager, Microsoft Corporation Sep 7 2016 6:00 pm UTC 60 mins
    As a follow-up to the previous highly rated session, this session will deep dive into all the relevant features of enterprise development pertinent to an open source developer. It’s no surprise that one in three Virtual Machines in Azure run Linux. In fact, over 60% of the images provided by our application partners in Azure Marketplace are Linux-based and chances are you are running applications on top of Linux as well.

    Which applications are a better fit for the cloud, and what are common use cases and patterns for them? How can Azure provide a first-class experience for your Linux-based applications?

    Attend this webcast to discover:

     How Docker, LAMP, Gluster, JBoss, Hadoop and MySQL enterprise-grade applications running on top of Linux can benefit from Azure.

     How Azure offers you a hyper-scale, open and flexible cloud platform that adds value to your existing investments.

     The powerful architectures made possible with Azure Resource Manager and more.
  • Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Sep 8 2016 8:00 am UTC 45 mins
    Quando le comunicazioni condividono dati sensibili, come puoi assicurarti che siano protetti e non filtrino fuori dal tuo ambiente?

    Le aziende oggi devono affrontare le seguenti sfide:

    - Identificare il tipo di dati da proteggere
    - Controllare l’accesso ai dati e garantire la riservatezza delle identità, soprattutto per non esporsi a pesanti sanzioni normative
    - Prevenire le fughe di dati sensibili, considerato che il numero di grandi violazioni e perdite di dati aumenta di anno in anno. 

    Nel 2015, infatti, oltre mezzo miliardo di dati personali sono stati rubati o persi e, nello stesso anno, le campagne di spear phishing contro i dipendenti aziendali sono aumentate del 55%

    Qual è il primo passo? Consentire a specifici utenti di accedere a specifici dati, ovunque siano, monitorando il flusso dei dati per evitare che cadano nelle mani sbagliate. Il secondo: la semplice applicazione di policy per controllare accessi e uso dei dati su cloud, sui dispositivi mobili e/o sulla rete.

    Partecipa al webinar Symantec per sapere come proteggere i dati in molte applicazioni del tuo ambiente.
  • Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Ramsés Gallego - Symantec Strategist Sep 8 2016 9:00 am UTC 45 mins
    Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

    En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

    - Identificar los tipos de datos que se deben proteger.
    - Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
    - Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

    En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

    El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

    Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.
  • Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Alexander Peters, Senior Manager Office of the CTO - Symantec Germany Sep 8 2016 12:00 pm UTC 45 mins
    Wie können Sie sicher sein, dass wichtige Daten geschützt sind und Ihre Umgebung nicht verlassen?

    Unternehmen stehen vor verschiedenen Herausforderungen. Sie müssen:

    - Die Art von Daten identifizieren, die geschützt werden sollen.
    - Den Zugriff auf Daten kontrollieren und sicherstellen, dass Identitätsdaten nicht offengelegt werden, insbesondere angesichts empfindlicher Bußgelder.
    - Verhindern, dass vertrauliche Daten das Unternehmen verlassen – Mega-Datenpannen und Datenverlust nehmen Jahr für Jahr zu. 

    2015 wurden mehr als eine halbe Milliarde Datensätze mit persönlichen Informationen gestohlen oder gingen verloren und die Anzahl von Spear-Phishing-Kampagnen, die auf Mitarbeiter in Unternehmen abzielten, stieg um 55 %.  

    Der erste Schritt besteht darin, den richtigen Personen von überall aus Zugang zu den entsprechenden Daten zu ermöglichen, indem Sie den Zugriff steuern, den Fluss der Daten überwachen und dafür sorgen, dass sie nicht in falsche Hände geraten.  Anschließend setzen Sie dann Richtlinien durch, um Zugriff und Nutzung zu kontrollieren – in der Cloud, auf Mobilgeräten oder im Netzwerk.

    Nehmen Sie an einem Webinar von Symantec teil, in dem es um gewonnene Erkenntnisse in Bezug auf den Schutz von Daten für die zahlreichen Anwendungen in Ihrer Umgebung geht.