Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Why Alert Logic? A DevOps Approach to Security Why Alert Logic? A DevOps Approach to Security Wayne Moore Recorded: Oct 21 2016 2 mins
    Simply Business is their name because it reflects their motto. “Protection should be simple.” That practice has earned Simple Business the position as UK’s favourite business insurance broker, with over 300,000 businesses and landlords protected. They’re proud of the award-winning claims service, which is, after all, the proof of the pudding. Their Head of Information Security, Wayne Moore, is also proud of is the security posture they have achieved with Alert Logic while leveraging the most agile cloud infrastructure for their business, Amazon Web Services. Watch the Simply Business video where you’ll learn how they made it happen.
  • 2016 Alert Logic Cloud Security Summit - NYC Highlights 2016 Alert Logic Cloud Security Summit - NYC Highlights Alert Logic Recorded: Oct 21 2016 4 mins
    View highlights from our recent Cloud Security Summit in NYC.

    The Summit focused on security and compliance challenges in a cloud environment and how organizations can close security gaps to de-risk greater cloud adoption, including how security can enable each stage of their cloud journey.

    Learn more best practices for AWS and security at one of our upcoming Summits: https://www.alertlogic.com/summit/
  • Why Alert Logic? Security for Financial Institutions Why Alert Logic? Security for Financial Institutions Mark Beatty Recorded: Oct 21 2016 2 mins
    Penns Woods Bancorp, Inc. is the bank holding company for Jersey Shore State Bank (JSSB) and Luzerne Bank (LUZ). As a growing financial institution, they understand they are in the pool of prime targets for cyberattacks. Watch this video to hear why Mark Beatty, CIO & Security Officer at Penns Woods Bancorp relies upon Alert Logic to detect intrusions and thwart breaches.
  • Azure HyperCloud: Cost Reduction, Increased Agility and Improved Scalability Azure HyperCloud: Cost Reduction, Increased Agility and Improved Scalability Kevin Orbaker, Microsoft Recorded: Oct 21 2016 57 mins
    Want consistent management across your on-premises and cloud resources and to quickly deploy new scalable solutions? This session will focus on how you can leverage the hypercloud to extend and modernize your database infrastructure.

    In this session, Kevin Orbaker (MTC Architect, Irvine) shares his experience leveraging the cloud and discusses:

    Hybrid Cloud Services
    How to increase the scale of your database with automatic response
    How to write once and deploy anywhere, on-premises or in the cloud
    How to scale operations while reducing application and OS footprint
  • Why Alert Logic? Agility and Security, Without the Risk Why Alert Logic? Agility and Security, Without the Risk Brett King Recorded: Oct 21 2016 4 mins
    Brett King, Head of Service Delivery of FunkyPigeon.com, WH Smith’s online personalised greeting card and gift company, discusses why his organisation trusts Alert Logic for managed security services. In this video, Brett talks about the security and compliance challenges they faced and why they made the decision to outsource to Alert Logic for security-as-a-service, enabling his team to focus on continued business growth.
  • What's Next in Emerging Tech? [Emerging Tech Virtual Summit] What's Next in Emerging Tech? [Emerging Tech Virtual Summit] Eric Horvitz, Technical Fellow & Managing Director, Microsoft Research Recorded: Oct 21 2016 30 mins
    By the end of this event, you’ll be asking, “what’s next?” In this final session of our virtual summit, Technical Fellow & Managing Director at Microsoft Research, Eric Horvitz, will discuss the next generation of emerging technology, with a particular eye to artificial intelligence.
  • Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Tereza Nemessanyi, Microsoft, Kevin O’Brien, GreatHorn and Kristen Smith, littleBits Recorded: Oct 21 2016 27 mins
    In this session, you’ll hear about innovative ways start-ups are using emerging technologies. Microsoft’s own Entrepreneur-in-Residence will tell us what’s happening in the start-up world, and two start-up moguls, Kevin O’Brien of GreatHorn and Kristen Smith of littleBits, will tell us how their companies are using emerging tech.

    In a constantly-evolving world of technology, it's near impossible to stay up to date with all the new advancements in tech. Whether you're launching a start-up, working for one, or in the planning stages, join us to hear from entrepreneur experts in cyber security, cloud communication, infrastructure, inventions and more!
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Recorded: Oct 21 2016 36 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Nowe modele Data Domain Nowe modele Data Domain Daniel Olkowski, Systems Engineer, EMC Recorded: Oct 21 2016 49 mins
    Nadszedł czas na odświeżenie prawie wszystkich modeli Data Domain.
    Co się zmienia?
    Które modele mają nowsze wersje?
    W czasie piątkowej, porannej kawy dowiesz wszystkiego o najważniejszych zmianach w Data Domain!
  • Data Governance: Behalten Sie die Kontrolle über Ihre Daten Data Governance: Behalten Sie die Kontrolle über Ihre Daten Stefan Girschweiler, Presales Consultant Recorded: Oct 21 2016 51 mins
    Data Governance definiert die Regeln und Prozesse für das Management der Daten im Unternehmen und hat die Aufsicht über alle Unternehmensdaten. Daten werden über mehrere Abteilungen hinweg eingesetzt und benötigen somit eine einheitliche Definition und zentrale Regeln zur Aufrechterhaltung der Datenqualität.
  • The Connected Officer: Bringing IoT to Policing The Connected Officer: Bringing IoT to Policing Jeff King, JPS Solutions Architect Microsoft Recorded: Oct 20 2016 16 mins
    Get your officers connected through IoT: The Internet of Things (IoT) is making waves in law enforcement!

    From connected guns that remember exactly when and how they were fired, to wearable smart devices designed for police dogs, the IoT is becoming a go-to solution not only to improve law enforcement officers’ capabilities, but also to increase accountability. In this webcast, you'll learn how the NYPD is leveraging sensor devices all over lower Manhattan to proactively respond to terrorism threats, crimes in progress, and 911 calls.

    You'll see how technology and sensor (IoT) devices are providing new crime-fighting tools and real-time situational awareness for law enforcement. You'll also learn how vehicle-mounted license plate readers, in-car and body-worn camera systems, drones and aerial surveillance vehicles are using the cloud to provide officers with a real-time, connected view of other first responders around them, connections to databases of wanted vehicles, and real-time situational awareness for officers.

    Join this webcast to learn how to:

    Use real-time data services in the Cloud to protect citizens and front-line officers.
    Leverage the Internet of Things (IoT) for better policing and counter-terrorism efforts.
    Implement best practices in sensor technology in patrol vehicles and for connected officers.
    This webcast is part of our Empowering digital transformation in law enforcement webcast series. Sign up for this session, or the entire series today!
  • Hacktivism Culture: DDoS 101 Hacktivism Culture: DDoS 101 Larry Collins, Product Manager at HOSTING and James Askham, Solutions Engineer at CloudFlare Recorded: Oct 20 2016 48 mins
    The threat of Distributed Denial of Service (DDoS) attacks is a growing problem for mission-critical websites, such as eCommerce shops, SaaS applications, gaming forums, and University portals; in addition, politically or artistically important organizations and journalists can be especially at risk of attack, due to the nature of their website content.

    The company CloudFlare delivers DDoS protection to over 4,000,000 websites globally, from personal blogs to large enterprises, while also offering a free protection program for respected free speech, public interest, and civil society organizations, called “Project Galileo”.

    Join Larry Collins, Product Manager at HOSTING, and special guest, James Askham, Solutions Engineer at CloudFlare, on October 20th at 3 PM EST for the webinar Hacktivism Culture: DDoS 101. During the live event, they will go over:

    •What a DDoS attack is from a technical perspective
    •The most common types of DDoS attacks
    •Best practices for mitigating against these attacks and how CloudFlare’s “Project Galileo” protects political and artistic organizations.
  • What's Possible with AI & Machine Learning? [Emerging Tech Virtual Summit] What's Possible with AI & Machine Learning? [Emerging Tech Virtual Summit] Lance Olson, Director of Program Management, Cortana Intelligence Suite, Microsoft Recorded: Oct 20 2016 13 mins
    The opportunities are endless! In this session, you’ll hear how Artificial Intelligence and machine learning can be leveraged inside your organization.

    These technologies are on the precipice of huge change and adoption, and will be major trends in technology over the next few years. Stay ahead of the curve and learn how you can start implementing and utilizing these options for IT automation, platform implementation, predictive analytics, and more.
  • Backup into the Cloud. Has the time come? Backup into the Cloud. Has the time come? Dave Elliott, Global Product Lead, Enterprise Cloud; Randy Serafini, Sr. Manager, Product Marketing, Veritas Recorded: Oct 20 2016 28 mins
    We all know that data is growing at a really fast rate for a variety of reasons. At the same time, budgets for storing and protecting that growing data are not changing, or not as quickly as the data is growing. The classic ‘do-more-with-less’ drumbeat in IT continues.

    With tape as the primary backup target, companies are facing many limitations which are becoming more and more problematic in a world where data security, compliance, and availability are critical.

    Hear from Dave Elliot (Google) and Randy Serafini (Veritas) as they discuss about cloud storage, backup, and some of key aspects of making the decisions on moving to the cloud as a backup destination.
  • Discovery in the Cloud: The Future of Configuration Management Discovery in the Cloud: The Future of Configuration Management Doron Orbach, Bill Dyck, Nick Rendall, HPE Recorded: Oct 20 2016 66 mins
    With the constantly evolving IT landscape, migration to a cloud or hybrid-cloud based infrastructure is becoming the new normal for companies around the world. Is your company prepared for the future of configuration management, mapping business services and applications within the cloud environment?

    This webinar will review how configuration management dynamics change in the cloud and how you can best prepare yourself for success in discovery and CMDB practices there:

    Cloud infrastructure trends and implications for configuration management
    Strategies for successful configuration management in the cloud
    HPE CMS real-time event-based cloud discovery capabilities
    Live Q&A with our CMS experts
  • 3 Critical Data Preparation Mistakes and How-to Avoid them 3 Critical Data Preparation Mistakes and How-to Avoid them Mark Vivien, Business Development, Big Data Recorded: Oct 20 2016 32 mins
    Whether you're just starting out or a seasoned solution architect, developer, or data scientist, there are most likely key mistakes that you've probably made in the past, may be making now, or will most likely make in the future. In fact, these same mistakes are most likely impacting your company's overall success with their analytics program.

    Join us for our upcoming webinar, 3 Critical Data Preparation Mistakes and How to avoid them, as we discuss 3 of the most critical, fundamental pitfalls and more!

    • Importance of early and effective business partner engagement
    • Importance of business context to governance
    • Importance of change and learning to your development methodology
  • Demystified: SD-WAN, SDN, NFV, and VNF Demystified: SD-WAN, SDN, NFV, and VNF Steve Woo, Co-founder and VP of Products, VeloCloud Recorded: Oct 20 2016 61 mins
    Many Enterprises are evaluating, piloting or migrating to SD-WAN. As they navigate the market they are encountering a myriad of technology terms, options and choices. During research and solution evaluations, Software-Defined WAN (SD-WAN), Software-Defined Network (SDN), Network Function Virtualization (NFV) and Virtual Network Function (VNF) are concepts that come up frequently and often cause confusion.

    This webinar will demystify these concepts, give you a detailed explanation of each and clarify the differences. Most importantly, you will learn which of these technologies are the best fit for your Enterprise to build the most scalable, high-performing, and secure wide area network.
  • Gen 4 Attacks: Web Behavior Analytics to Protect Websites Gen 4 Attacks: Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Recorded: Oct 20 2016 58 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities David Jevans, VP Mobile Security, Proofpoint Recorded: Oct 20 2016 40 mins
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Maximizing Value in Multicloud Environments Maximizing Value in Multicloud Environments Enrico Fuiano, Sr. Product Marketing Manager Recorded: Oct 20 2016 44 mins
    A recent IDC global study shows that companies are becoming more sophisticated in how they think about cloud. However, in spite of the continued growth in cloud adoption, few organizations (less than 3%) are maximizing the value derived from their cloud environments. In this webcast, we will review some of the findings from IDC study derived from more than 6,100 interviews with enterprise IT leaders across 31 countries who have deployed private, public, and hybrid clouds in their organizations. We will also discuss the obstacles that organizations are facing to achieve greater cloud maturity.

    Cisco is helping customers translate the findings of this IDC study into personalized analysis and guidance through the Cisco Business Cloud Advisor framework. In addition, Cisco is launching a new set of Cloud Professional Services to help businesses navigate the ‘multicloud maze.’ Attend to learn how containers, microservices architectures and DevOps methodologies can really help you position cloud as a platform that powers your digital transformation strategies.
  • Overcoming the Challenges of Scaling Agile Project Management - 1 PDU Overcoming the Challenges of Scaling Agile Project Management - 1 PDU Andy Jordan, ProjectManagement.com Recorded: Oct 20 2016 57 mins
    Organizations are increasingly looking to expand Agile to a greater number of projects and to increasingly diverse business areas.  The process and tools that served them well for just a handful of software development projects may well struggle to scale vertically and horizontally and organizations need solutions. Join Andy Jordan, ProjectManagement.com as he discusses the need to evolve Agile approaches in different areas and at different scales.

    This session is approved for 1 Project Management Institute (PMI) PMP Credit.
  • Comment moderniser son datacenter avec le stockage Software-Defined Comment moderniser son datacenter avec le stockage Software-Defined Nicolas.Ehrman, SDS Senior Systems Engineer Recorded: Oct 20 2016 45 mins
    Marre de constamment éteindre les feux causés par un datacenter qui tourne sur une infrastructure traditionnelle?

    Le stockage software-defined en mode bloc de ScaleIO permet de de décupler les performances, l'évolutivité et l'élasticité de vos couches de matériel serveur standard.

    A vous de choisir l'option qui vous convient :
    1. Le logiciel ScaleIO : une flexibilité totale : appliquez le sur vos serveurs, switches et racks
    2. ScaleIO Ready Node: combine les serveurs Dell PowerEdge X86 avec ScaleIO
    3. VCE VxRack FLEX : une solution clé en main complète

    Répondez au besoins du business et simplifiez le processus d’acquisition et de déploiement d’un serveur SAN.
  • CA PPM in der Praxis – Teil 1: Applikation Portfolio Management CA PPM in der Praxis – Teil 1: Applikation Portfolio Management Peter Säckel/Advisor PPM/CA Technologies Oct 25 2016 8:00 am UTC 60 mins
    Wie stellen Sie sicher, dass sich all Ihre Applikationen an Ihren Geschäftszielen ausrichten?
    Passen Sie Ihr Budget für Applikationen regelmäßig an die aktuelle Geschäftsstrategie an?

    Dieses Webinar möchte aufzeigen, wie Sie eine komplette Übersicht zu Ihrer Applikationslandschaft erhalten, diese objektiv hinsichtlich Geschäftszielen bewerten und dabei Redundanzen oder unnötige Applikationen identifizieren.

    Das damit verbundene Einsparungspotential könnte in sinnvolle Innovationen oder Unternehmenstransformation eingesetzt werden.

    Diese Webinar-Reihe beginnt mit dem Thema Applikation Portfolio Management und wird sich in weiterführenden Webinaren mit ausgewählten Themen aus der PPM-Welt ergänzen.
  • Transformation zum modernen Rechenzentrum mit Software Defined Storage Transformation zum modernen Rechenzentrum mit Software Defined Storage Mike Unruh, SDS Advisory Systems Engineer Oct 25 2016 1:00 pm UTC 45 mins
    Keine Lust mehr auf die Herausforderungen im Zusammenhang mit der Ausführung eines Rechenzentrums mit herkömmlichen Infrastruktur?

    Dell EMC ScaleIO Software defined Block Storage auf standard-Serverhardware bietet hohe Performance, massive Skalierung und erstklassige Flexibilität.

    Wählen Sie aus 3 verfügbaren Optionen, um Sie;
    1. Vollständige Flexibilität: ScaleIO auf Ihrer Auswahl von Server, Switch und Rack
    2. Vorab validierte: ScaleIO in Kombination mit leistungsstarken Dell PowerEdge-Servern
    3. Sofort einsetzbare, vollständig entwickelte Lösung von VCE

    Sie können jetzt Ihre geschäftlichen Ziele erfüllen, und gleichzeitig erheblich vereinfacht den Prozess der Beschaffung und Bereitstellung eines Server-SAN
  • Best Practices: Architecting Security for Microsoft Azure VMs Best Practices: Architecting Security for Microsoft Azure VMs Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Oct 25 2016 2:00 pm UTC 60 mins
    Do you know if your workloads are secure? Do you have the same security and compliance coverage across all of the cloud platforms and datacenters running your critical applications? Are you having to design your security framework each time you deploy to a new region or datacentre?

    Whether you’re working with multiple cloud environments or exclusively on Azure, there are certain things you should consider when moving assets to Azure. As with any cloud deployment, security is a top priority, and moving your workloads to the cloud doesn’t mean you’re not responsible for the security of your operating system, applications and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your Azure environment is secure.

    Register for this impactful webinar as we discuss step-by-step what you need to do to secure access at the administrative, application and network layers.

    In this webinar, we will take a look at:
    • The Shared Security Model: What security you are responsible for to protect your content, application, systems and networks
    • Best practices for how to protect your environment from the latest threats
    • Learn how traditional security approaches may have limitations in the cloud
    • How to build a scalable secure cloud infrastructure on Azure
  • Tips on Anyalyzing and Modeling Complex Data Sets Tips on Anyalyzing and Modeling Complex Data Sets Scott Dallon, BrainStorm, Inc. Oct 25 2016 2:00 pm UTC 30 mins
    Discover how businesses turn big data into meaningful insights to help make organizations work smarter, and make better decisions faster.

    Join Scott Dallon to learn tips on analyzing and modeling complex data sets!
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Oct 25 2016 3:00 pm UTC 75 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco Oct 25 2016 4:30 pm UTC 60 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Oct 25 2016 5:00 pm UTC 75 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Product Marketing Manager Oct 25 2016 5:00 pm UTC 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Oct 25 2016 5:00 pm UTC 60 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Oct 25 2016 6:00 pm UTC 60 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • SD-WAN for Next-Generation Retail Networks SD-WAN for Next-Generation Retail Networks Ciaran Roche, CTO, Coevolve: Kangwarn Chinthammit, Director of Solutions, VeloCloud Oct 26 2016 2:00 am UTC 60 mins
    Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands.

    Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.
  • Best Practices on Operational Efficiency in Network Security Best Practices on Operational Efficiency in Network Security Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Oct 26 2016 5:00 am UTC 60 mins
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
  • Using App SaaSification as a key to build digital infrastructure Using App SaaSification as a key to build digital infrastructure Suresh Subramanian, Solutions Architect Sr Manager, Cloud Oct 26 2016 1:00 pm UTC 90 mins
    The greatest value the cloud offers is the ability to use technology to scale business processes quickly and make them more consumable. It enables them to run as a service, giving developers and operators more flexibility to stand up a service, sort out what works and what doesn’t, and ultimately improve the user experience. As they say in Silicon Valley, it allows developers to “fail fast” and repeat.

    The so-called “SaaSification” of business is driving innovation and smart organizations get this—they are seizing the moment, creating dynamic services on a platform, consumable by large groups of users at any time. According to some recent industry analyst estimates, 34 percent of enterprises will have 60 percent or more of their applications on a cloud platform within two years.

    During this webcast you will learn:
    -How App SaaSification allows companies to use their new found IT “assets” in ways they haven’t before
    - How App Saasification saves the companies from having to buy any additional infrastructure or expensive platforms. Instead, they were able to scale up and down cost-effectively to offer an additional, value-added product that enhanced customers’ viewing experience
  • HPE Security Fortify SCA and SSC, new features to power a DevOps SDLC HPE Security Fortify SCA and SSC, new features to power a DevOps SDLC Michael Right, Sr Product Manager, Fortify and Emil Kiner, Product Manager, Fortify Oct 26 2016 3:00 pm UTC 60 mins
    As threats evolve, so must application security. HPE Security Fortify continues to create and pioneer new features and functionality to further automate and streamline your app security testing program. Learn about new static scanning advances that align with DevOps requirements. Hear how scan analytics can further enhance and refine advanced auditing processes to increase the relevancy of security scan results.
  • Tech Talk: Protecting Your Business From a Destructive Cyberattack Tech Talk: Protecting Your Business From a Destructive Cyberattack Alex Almeida Oct 26 2016 3:00 pm UTC 45 mins
    Threats to the business are evolving quickly. Learn EMC's solution to protect your business from a destructive cyber attack
  • Defending Your Wi-Fi Airspace Against Threats: Tips You Need to Know Defending Your Wi-Fi Airspace Against Threats: Tips You Need to Know Ryan Orsi, Director of Strategic Alliances Oct 26 2016 4:00 pm UTC 60 mins
    Organizations across all industries are facing increased pressure from customers, vendors, and employees to offer Wi-Fi access. While offering this service provides significant gains, businesses cannot forget about the critical security measures needed to defend against wireless threats.

    Join Ryan Orsi, Director of Strategic Alliances, as he delves into the top challenges of deploying enterprise-grade, secure Wi-Fi, and the key solutions within reach of all organizations.
  • Netflix: The Journey to Efficiently Securing Your Video Stream Netflix: The Journey to Efficiently Securing Your Video Stream Jonathan Stern, Applications Engineer at Intel & Scott Long, Sr. Software Engineer at Netflix Oct 26 2016 4:00 pm UTC 60 mins
    Netflix engineers were faced with a challenge: how do you protect the privacy of your customers while serving over a third of all internet traffic in the US? Intel and Netflix engineers discuss the scale of the challenge and how it was solved using Intel® software ingredients and the latest Intel® Xeon® processors. This session includes details of the analysis performed, the software ingredients used, and the record setting results of this collaboration.
  • Your Journey To Cloud Native Made Simple Your Journey To Cloud Native Made Simple Mark Williams, CTO at Redapt Inc, Sasha Jeltuhin, Dir of Technology at Apprenda, Scott Whitright, Cisco Oct 26 2016 4:00 pm UTC 60 mins
    As software becomes the competitive currency of the enterprise, investments are being made to embrace new distributed cloud applications, implement cloud platforms, and automate infrastructure provisioning. However, organizations are facing many challenges in regards to setting the correct path toward cloud native, delivering high quality & agile applications, all while keeping up with the increasing pace of business without sacrificing governance and operational efficiency.

    Cisco, Apprenda and Redapt have joined hands to offer an end-to-end solution to alleviate these challenges and transform your datacenter into a secure, policy-driven application cloud platform.

    Join us to learn:

    • Where your organization currently fits on the cloud maturity model and what strategies can help you succeed at improving your cloud capabilities

    • How enterprises can effortlessly cloud enable existing monolithic Java and/or.NET applications in addition to running docker based cloud native applications

    • How to drive rapid development through DevOps, including continuous integration (CI) and continuous delivery/deployment (CD)

    • Approaches to leverage both IaaS and PaaS to automate service provisioning, security, compliance and governance

    • Ways to drive order of magnitude improvements in infrastructure utilization, developer productivity, organizational agility, and governance

    • And more!
  • Solving Today's Mobile and IoT Security Challanges Solving Today's Mobile and IoT Security Challanges Jon Garside, Product Marketing Manager & Rich Boyer, CIO, NTT i3 Oct 26 2016 5:00 pm UTC 60 mins
    IoT devices are on your network. Do you know how what to do with them?

    View this webinar to dive into the NTT i3 Global Threat Intelligence Report, and how to combat new IoT concerns and security gaps. Learn more about:
    Misconceptions in the security model for wired vs. wireless networks
    Managing policies for IoT in the enterprise using contextual data
    The value of device roles and real-time enforcement for IoT

    Rich Boyer, CISO at NTT Innovation Institute Inc. (NTT i3), and Jon Garside, Product and Solutions Marketing Manager at Aruba will lead this technical discussion – don’t miss it!
  • DR Strategies For Hyperconverged Architectures DR Strategies For Hyperconverged Architectures Curtis Preston, Storage Switzerland Oct 26 2016 5:00 pm UTC 60 mins
    Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
  • Defeating Polymorphic Phishing Defeating Polymorphic Phishing George Anderson | Director of Product Marketing Oct 26 2016 5:00 pm UTC 45 mins
    Phishing has long been one on the most successful ways of compromising users and also organizations’ networks. This webinar looks at the state of Phishing today, recommends what people, processes and technology can do to minimize the risks. And discusses a new Real-Time Anti-Phishing solution that is defeating this highly effective compromise.
  • Improve Web Performance and Site Protection: Migrate from Akamai to Incapsula Improve Web Performance and Site Protection: Migrate from Akamai to Incapsula Divr Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Oct 26 2016 5:00 pm UTC 60 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:
    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.