Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
DevOps is foundational to the world’s highest-performing information technology organizations. But more than anything else, DevOps is about culture, and culture can be elusive. To help our customers experience how a DevOps culture can accelerate their innovative ideas, Red Hat launched it's Open Innovation Labs. In this session, Justin Holmes and Øystein Bedin from Open Innovation Labs will share their story building a DevOps culture for the Labs' core team.
In this session, you'll learn about:
- Behaviors and processes to enable collaboration between development and operations.
- How tools like Ansible by Red Hat and Red Hat OpenShift can help facilitate communication between team members.
- How Open Innovation Labs provide an environment for Red Hat customers to experience the unique advantages of a DevOps culture.
The clock is ticking on the latest cloud compliance mandate: NIST Special Publication 800-171, otherwise known as DFARS (Defense Federal Acquisition Regulation Supplement). Any organization or contractor that holds or processes unclassified Department of Defense (DoD) data must ensure that they comply with the new DFARS clause.
December 31, 2017 is the ultimate deadline by which to prove compliance, so action is recommended as soon as possible.
In this webinar, Patrick Gartlan (CloudCheckr CTO), Jeff Bennett (Allgress President/COO), and Tim Sandage (AWS Sr. Security Partner Strategist) will lead an interactive workshop on what DFARS regulation means for your business, specifically:
✔ Specific requirements of the DFARS regulation
✔ Key controls that CloudCheckr provides to help you meet DFARS requirements
✔ Tools from Allgress that map DFARS requirements to CloudCheckr features
When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.
Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.
Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:
• Identify sensitive data, where it is and who is accessing it
• Protect that data by establishing policies which prevent exposure
• Detect threats to which could extrapolate data by several means
• Respond to threats with automated actions
• Recover after a threat to produce reports to prove compliance
As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.
Topics covered will include:
Summary of the standards developing organization (SDO) activities:
- Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
Securing the Cloud Supply Chain:
- Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
Emerging & Related Technologies:
- Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.
In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.
The presentation will cover:
> Challenges surrounding increased migration to public clouds
> Using automation for secure DevOps
> How to ensure effective and efficient operations
This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can't meet the unstructured data demands of the mobile workforce or distributed organizations. In this webinar, George Crump, Lead Analyst at Storage Switzerland and Brian Wink, Director of Solutions Engineering at Panzura will expose the hidden gotcha's of the storage status quo and explore how to manage unstructured data in the cloud.
Supermicro has released a comprehensive line of new X11 generation server and storage solutions featuring the new Intel® Xeon® Scalable processor family with the strongest support for NVMe storage and 100G/25G Ethernet in the industry.
Supermicro’s new X11 generation solutions are engineered to unleash the full performance and rich feature sets on the new Intel® Xeon® Scalable processor family, supporting more cores and higher TDP envelopes of 205 watts and higher, increased to six memory channels with higher bandwidth, and more PCI-E 3.0 lanes with up to 100G/40G/25G/10G Ethernet, 100G EDR InfiniBand and integrated Intel® Omni-Path Architecture networking fabrics. The elevated compute performance, density, I/O capacity, and efficiency are coupled with industry’s most comprehensive support for NVMe NAND Flash to deliver up to 16 million IOPS for unprecedented application responsiveness and agility. Customers can select the Server, Storage, Blade, Network, or Workstation systems optimized for their applications, as well as the performance, memory, storage, and I/O profiles that are optimally matched to their workloads, at attractive price points.
Register for this webinar to hear about Supermicro’s latest and broadest portfolio of new Ultra, BigTwinTM, SuperBlade®, and SuperStorage products optimized for today’s latest technology innovations. We will also be sharing critical insights on how Supermicro workload optimized server solutions deliver the highest performance, efficiency, and scalability in demanding customer environments from cloud to big data and hyper-converged solutions, and efficiently power mission-critical Enterprise workloads.
Internet is a convenient, cost-efficient means to connect your branch offices and to access public cloud applications. It is also an integral part of any enterprise’s hybrid WAN architecture. However, its unreliable and unpredictable performance may hamper employee productivity.
Join us in this webinar to learn about:
• Some of the challenges enterprises face with Internet connectivity
• How Internet connectivity can be optimised to improve branch offices’ connectivity and to access cloud applications
So, think small, because a branch office could bring you closer to market domination when it is well connected to the rest of the world by reliable, business-grade Internet.
Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
Cyber attacks are on everyone’s agenda but with so much at stake just how should Broadcast, Media and Entertainment players protect themselves in an increasingly hostile world?
High profile attacks on broadcast and media players are on the increase. But what does the threat landscape look like? What are the new attack surfaces and how should broadcasters and media companies approach cybersecurity?
Brian Brackenborough, CISO, Channel 4
Richard Welsh, CEO, Sundog Media Toolkit & VP of Education, SMPTE
Cameron Brown, Information Security Strategist & Cyber Defence, EY
In today’s world of digitization there is an increasing dependence on sophisticated business software to rapidly evolve and deliver an intuitive user experience – not just to keep training and support cost low but – most importantly – to keep employee motivation up.
If you are interested in driving down application development costs and time by up to 50% while vastly improving user adoption and relevancy, join us for this exciting webinar opportunity July 20 2017!
Find out how, as an SAP partner in the Build engagement model, you can rapidly prototype, build, and monetize functionally rich applications for the integrated business processes of SAP’s 350,000 customers - based on SAP Cloud Platform.
SAP Cloud Platform is a platform-as-a-service (PaaS) that enables you to:
• Rapidly build and deploy business applications in the cloud for faster time to value.
• Securely integrate with your SAP and third-party (non-SAP) cloud and on-premise systems for greater agility and productivity.
• Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction.
• Leverage our digital channels and flexible license options to market your packaged solution to 350,000 SAP customers.
Join us on this webcast and learn about the partner experience and how you can benefit from the features of SAP Cloud Platform and the Build engagement within the SAP PartnerEdge program.
Date: Thursday, July 20, 2017
Time: 10 a.m.to 11 a.m. EST (60 minutes)
To find out more about the SAP PartnerEdge program and SAP Cloud Platform, visit our Application Development Partner Center.
In our first Windows webinar, find out about the benefits of migrating your Windows workloads to AWS. During the session, we will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to architect, deploy, and manage your Windows platforms on AWS.
Dell EMC has launched our most cutting-edge portfolio of PowerEdge servers ever to help customers drive IT Transformations. The newly designed 14th generation of the Dell EMC PowerEdge server portfolio forms a secure, scalable compute platform that is the ideal foundation for software-defined data center initiatives, hyper converged infrastructure “HCI” , analytics and tradition x86 server workload acceleration. The new portfolio delivers innovation in many areas including:
- Scalable business architecture - new intel CPU family & new server designs optimized for a wide variety of existing and emerging workload requirements
- Management leadership with intelligent automation - via new idrac9 with expanded APIs and the all-new OpenManage™ Enterprise console enable IT staff to spend more time on higher priority work
- Integrated security - protects customers’ businesses and data for the life of the server
In this webinar, we will explain how running SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery.
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World in May. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Quali’s Cloud Sandbox Software allows you to create and publish sandboxes that are replicas of infrastructure and application configurations and use them for development, testing, demos, training and support. Model, orchestrate, and deploy on-prem, cloud, and hybrid environments and accelerate DevOps Automation.
Learn about AWS customer Retail Insights’ several security and compliance needs when protecting their AWS environment and how Alert Logic helped develop a comprehensive security strategy by understanding their security posture, gaining visibility into their environment and proactively protecting against threats and attacks. Attendees will gain a deep understanding of securing the full application stack and the value of having a security solution tightly integrated with AWS.
Today’s cloud-connected enterprise demands a new WAN architecture, an SD-WAN, to meet the performance and security requirements for SaaS and IaaS. As SD-WAN technology evolves, new levels of automation, security and architectural simplification have emerged. First-packet application classification is an advanced capability that automatically steers trusted SaaS and web traffic directly to the internet and unknown or suspicious traffic to a next-generation firewall for additional security inspection.
Further advancements harness machine learning and AI to enable adaptive, application-centric traffic handling and pervasive security. With automation, machine learning, and AI, the Self-Driving WAN can be realized.
The way we work as an organization is no longer changing. It has already changed. People access content from all kinds of devices, across different locations. Business content is being created and viewed both inside and outside of your organization. But how do you effectively protect the way it's shared and managed while meeting your compliance needs? Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats.
Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.
· Key considerations for a cloud-first data governance strategy
· Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
· How to use SaaS technology to empower your users while effectively governing their content
Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.
Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
Public cloud providers like Amazon AWS enable software providers to build and offer software-as-a-service. These SaaS providers are often plagued by networking challenges owing to multi-tenant requirements, different connectivity types and strict security & compliance requirements. There has to be a simpler way to solve networking requirements for the cloud other than the legacy hardware-based networking solutions.
Join us in this webinar to hear from a cloud expert, Richard Weekes, Enterprise Analytics & Mobility Provider, Microstrategy, where he architected an elegant cloud networking solution to address the 4 common pitfalls for SaaS providers.
In this webinar, you will learn:
. The most common top 4 networking pitfalls in the cloud that hinders SaaS providers
. How to avoid these common pitfalls that are seen with the legacy hardware-based networking solution
. How Aviatrix overcomes the pitfalls with a software-only solution built natively in the cloud
What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
Retailers are faced with the challenge of fast evolving consumer buying processes. Today and in the future consumers have greater choice in terms of how when and where they buy. Consumers expect an omnichannel experience across all available touch points with retailers.
According to the 2017 Customer Experience Benchmarking Report, 85% of retail and consumer goods organisations recognise CX as a competitive differentiator. Join us for this webinar where we’ll be discussing the retail specific findings from the report.
Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.
Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:
• Identify trends and techniques in methods used for credential theft and abuse.
• Review how cyber criminals have changed their tactics to compromise networks.
• Examine who is being targeted, and why.
• Discuss techniques to stop credential leakage.
AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.
Join us to learn tools and tips to take your AWS investment to the next level, including:
- Forecasting and tagging tips to predict and optimize cloud spend
- A comprehensive approach to monitoring to ensure secure and compliant infrastructure
- Proactive risk detection and automated remediation tactics
Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.
In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.
Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go
Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?
1. Increase security and compliance, while maintaining user-friendliness
2. Deploy encryption without interrupting normal business processes
3. Ease the daily burden of your data security administration
Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?
Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.
Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.
Attendees will learn:
- How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
- The strategic role that delivery partners can play in supporting cloud migration initiative
- How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.
In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:
•The market and technology trends that influence workload, data center and cloud strategy
•How to evaluate the characteristics of various workloads and execution venues
•How to manage workloads across on-premises and off-premises ecosystems
Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.
While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.
Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.
In this session, hear about:
* Credential theft industry research coverage
* Industry analysis of the problem space
* Application of the credential theft lifecycle in light of recent attacks
Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.
In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
The world of high-performance computing continues to expand with the proliferation of analytics, AI and other HPC processes. This expanding base of HPC users places demands on data storage infrastructure that are more balanced between performance, economics and ease of deployment than the requirements found in traditional HPC environments.
In this webinar we will discuss how these requirements are shaping today’s HPC storage infrastructure.
Have you ever wondered how Microsoft does deployment? Get your questions answered about how Microsoft IT approaches migrations and rollouts.
Performing a system-wide migration across a large or complex environment is no easy task, but new Windows 10 deployment options, streamlined application rollouts, and enhanced cloud capabilities can ease the path. Find out how Microsoft IT approached the deployment of Windows 10 across a global user base, plus how they think about Windows as a service.
You'll also hear about Microsoft IT's best practices and lessons learned—from application compatibility testing and upgrade strategies to smoothing the deployment path through end user readiness.
Join this webinar to:
- Learn how Microsoft IT is using new features in the Windows 10 Creators Update.
- Find out how Windows IT approaches Windows 10 update management.
- Get your questions answered in a live Q&A.
Digitalisation has changed how employees in your organisation collaborate with each other, support partners, interact with customers, streamline processes, and otherwise build a more effective, more efficient business. Enterprises need a digital workplace strategy to remain competitive and relevant in the current digital climate. To gauge the state of the digital workplace, Dimension Data surveyed 850 business and IT leaders driving technology and organisational change in their companies. They are from organisations with 1,000 or more employees and represent a wide range of industries.
In this session, we will discuss the key findings of the Report in more detail and provide deeper insights into how organisations today are evolving from a traditional office environment to a digital workplace, with examples of what is happening in the workplace right now.
The competitive advantage of MTDC and hosting providers will be determined by their ability to become a provider of services - not just iron. As space and power have been commoditized, being able to differentiate with new business and financial models and new products will mean the difference between success and failure. To succeed in this market, these companies need to provide the right prod-ucts and services to their customers. To compete effectively in today’s hyper-competitive market, they must offer customers new and innovative network connections and connectivity services. To support this strategy the infrastructure management team and network operations managers need to emphasize on standardized infrastructures, efficient change processes and secure maintenance and operation
Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.
This webinar will cover:
•A review of CMP capabilities
•How to operate and manage applications and data across hybrid cloud infrastructures
•Available CMPs on the market today
•Evaluation criteria for selecting a CMP to meet your needs
To achieve digital transformation means businesses need to be data driven, insight rich, and intelligently powered. Companies that strategically invested in MDM consistently out perform both digital and non digitally focused organizations. Why? Because MDM brings understanding to the data across a complex hybrid ecosystem of data silos and platforms allowing digital enterprises to gather, orchestrate and syndicate data and insights anywhere at any time. The best practices, skills and technologies needed to power master data, are the foundational skills to scale the broader investment in information and analytic architecture. Michele Goetz, Principal Analyst at Forrester Research, will share how digital transformation is shaping MDM and how businesses are rethinking their MDM strategies for competitive advantage.
• How MDM is at the center of driving stronger business outcomes
• How MDM competencies lay the foundation for data mastery and deeper insight
• How MDM technology is evolving to meet the new digital age and how to select your MDM capabilities
Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.
In this session, get details on:
* Why the platform plays a critical role towards disrupting credential-based attacks
* Preventing the theft of credentials, using new PAN-OS 8.0 technologies
* Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
Task Types and Effort Driven can be two of the most confusing features of Microsoft Project, both to novice users and to experienced users alike. For example, have you ever changed one number in Microsoft Project, and then the software changed another number in response, and you don’t know why?
Guest expert Dale Howard will unlock the mysteries of Task Types and Effort Driven behavior in Microsoft Project, showing you how their behavior is logical, predictable, and meaningful.
Join this webcast to:
- Eliminate the confusion around these two Microsoft Project features
- Harness the power of Task Types in your own projects
- See how Effort Driven task statuses interact with each Task Type
As demands on your cloud-native applications rapidly change, how can you ensure that your database is responsive and highly available? The truth is that modern applications are usually still supported by monolithic shared databases and traditional operational practices. Pivotal and Redis Labs are collaborating to bring developers more agility and autonomy with a highly available, scalable, and high performance Redis database service for their cloud-native applications.
Join Roshan Kumar from Redis Labs and Kamala Dasika from Pivotal as they discuss:
- How Redis Labs supports real-time use cases for the modern enterprise
- How Redis Enterprise provides seamless high availability and disaster recovery for Redis applications
- How full life cycle management of your apps and Redis Enterprise via Pivotal Cloud Foundry enables dynamic scale, high performance and uptime
Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.