Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Customer Panel: Building a Modern Security Program
    Customer Panel: Building a Modern Security Program
    Maranda Cigna, Director of Product Marketing, Rapid7 Recorded: Nov 16 2018 47 mins
    Wondering how your peers are solving some of today’s most common incident detection and response challenges? Struggling to implement a security orchestration and automation strategy that can complement your SIEM?

    Join a group of Rapid7 customers as they discuss how they have built their incident detection and response programs to combat today’s most prevalent cybersecurity threats. No matter where you are in your cybersecurity journey, our panel of experts will be able to guide you to security success.

    Our experts will cover a variety of today’s hottest security topics, including:

    1. How they have built their incident detection and response programs with Rapid7
    2. Today’s modern threat landscape and the most common threats they are facing
    3. Metrics from detection and response programs that are most important to share with executive staff
  • Setting Your SOC up for Success
    Setting Your SOC up for Success
    Wade Woolwine, Director of Managed Services, Rapid7 Recorded: Nov 16 2018 58 mins
    Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Simply adding a SOC to your portfolio without adequate preparation is going to result in poor performance in threat detection, high turnover in valuable resources, and a general underperformance of a heavy financial investment.

    In order to get the most from your investment, SOC analysts require full visibility through the right technology, a well-defined mission, team structure, and leadership, and most importantly the SOC must augment existing high-performance security programs.

    Join Wade Woolwine, Director of Rapid7’s MDR service and SOC, to learn some of the key considerations that should be in place before hiring your first SOC analyst.
  • Is Your Organization Ready for Automation?
    Is Your Organization Ready for Automation?
    Scott King, Senior Director, Advisory Services Recorded: Nov 16 2018 56 mins
    Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

    Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

    Join Rapid7 experts for an engaging discussion where you’ll learn:

    1. Key considerations that should be in place before implementing automation
    2. When is the right time to add automation (and when it isn’t)
    3. Which common security tasks are ideal to automate
    4. How to prepare your organization for SOAR
  • The Cost of Ransomware on Business
    The Cost of Ransomware on Business
    Eric O’Neill, Cybersecurity expert Recorded: Nov 16 2018 65 mins
    The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, ransomware gangsters raked in $5 billion in extortion fees in 2017, and are predicted to loot nearly $12 billion from businesses and consumers by 2019.

    Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.

    Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:

    •How the most virulent ransomware strains operate
    •The most popular attack vectors used by ransomware
    •How ransomware became such a fast-growing threat
    •What steps you can take to defend against and recover from ransomware attacks
    •Why security and law enforcement experts advise against paying the ransom

    With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
  • Private Cloud Isn’t Going Anywhere
    Private Cloud Isn’t Going Anywhere
    Todd Brannon, Cisco Recorded: Nov 16 2018 11 mins
    In this ten-minute talk you’ll find out who’s using it, why deployments are projected to grow over the next few years, and whether you ought to be leveraging it in your own IT environment. You’ll also learn what Cisco’s secret sauce is and why it’s critical to building a truly responsive, agile on-premises private cloud.
  • Finding a clear path to Multicloud Nirvana
    Finding a clear path to Multicloud Nirvana
    Lax Sakaikale, Cisco Recorded: Nov 16 2018 15 mins
    Multicloud is the new normal, connecting your on prem infrastructure with multiple public clouds is complex.
    Hear how Cisco is creating a clear, actionable path to cloud success. We will give you a list of essential tools across- networking, security, analystics, and management, that you need to get you from wherever you are to wherever you want to go in your multicloud journey. We will also address questions you should be asking yourself, as well as a series of steps you can take to get from wherever you are right now to where want to go in your multicloud journey.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 16 2018 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Nov 15 2018 55 mins
    Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.

    External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.

    Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
  • Flexibly Allocate and Distribute Secure Application Services
    Flexibly Allocate and Distribute Secure Application Services
    John Gudmundson, A10 Networks Recorded: Nov 15 2018 47 mins
    With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.

    You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.

    Join A10 Networks and learn how to:
    •Achieve on-demand provisioning of app services in seconds
    •Maximize ROI with license portability and pay-as-you-grow
    •Use modern DevOps tools to simplify license management
  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Nov 15 2018 52 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Omer Singer, Director of Security, Snowflake Computing; Dan Hubbard, Chief Product Officer at Lacework Recorded: Nov 15 2018 31 mins
    Security For Public Cloud + Security Analytics + Data Warehouse Innovation. Lacework and Snowflake Computing are redefining how data is managed and secured.

    Lacework and Snowflake Computing are innovators in their respective markets; data warehousing and security for public cloud. Working together, they deliver powerful and actionable security insights, combined with the most flexible, scalable, easy to use data warehouse on the planet.

    Please join Omer Singer, Director of Security, Snowflake Computing and Dan Hubbard, Chief Product Officer at Lacework Inc., to review and demonstrate their upcoming partnership.
  • Driving Digital Transformation Through 2019 and Beyond
    Driving Digital Transformation Through 2019 and Beyond
    Forrester Research and Comcast Business Recorded: Nov 15 2018 56 mins
    Join us on November 15th at 2 p.m. ET for “Driving Digital Transformation Through 2019 and Beyond,” a webinar from Forrester Research and Comcast Business, where our expert panelists will explore the key considerations for successful advanced data network technology adoption and long-term strategy.

    We’ll discuss:
    •Why Digital Transformation is not a “one-and-done” concept.
    •The changing narrative around Digital Transformation, as we shift from adding digital features (1.0), to having digital become a core part of an ongoing enterprise strategy (2.0).
    •The ways in which the continuous transformation and evolution of a company’s digital initiatives requires a complete re-think of your business’ go-to-market, including how you interact with your customers, how you drive operational excellence, how you approach innovation, and the technologies you use as the foundation.
    •Why companies using advanced data networks to embrace Digital Transformation 2.0 experience proven gains in customer satisfaction, revenue, and employee productivity.
    •The technologies you can put to work on your own Digital Transformation journey.

    Our panelists include”
    •Andre Kindness, principal analyst at Forrester Research, serves IT Infrastructure & Operations Professionals. He is a leading expert on enterprise network operations and architecture. His research focuses on networking technology and strategy—such as software defined networking and network function virtualization—for private cloud, remote locations, and hybrid cloud.
    •Allan Langfield, executive director, product management at Comcast Business, is responsible for Product Management, Development and Deployment of the Comcast NFV platform, ActiveCore. Allan’s group is focused on delivering a customer-oriented Digital Experience, enabling and integrating services including SD-WAN.
  • Building a Data-Centric Architecture for the Future of Government
    Building a Data-Centric Architecture for the Future of Government
    Pure Storage | Red River | Cisco Recorded: Nov 15 2018 61 mins
    Register Now!
  • Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata, Recorded: Nov 15 2018 60 mins
    Ready to learn how to manage persistent storage for containers in the multi-cloud environment?

    Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.

    In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.


    Presenters:
    Anubhav Sharma, VP, Business Development, Nirmata
    Michael Ferranti, VP, Marketing, Portworx,
  • Refactoring the Factory: Building a Cloud-Native App Transformation Factory
    Refactoring the Factory: Building a Cloud-Native App Transformation Factory
    Mark Carlson, CGI, Carl Brooks, 451 Research & Jeff Kelly, Pivotal Recorded: Nov 15 2018 61 mins
    How is managing a massive cloud-native transformation effort different than the "application modernization factories" that have been around for years? Transforming or modernizing a portfolio consisting of hundreds of existing (aka, “brownfield”) applications is an enormous undertaking that requires a highly talented, cross-functional team.

    Attend this webinar with Pivotal, CGI, and 451 Research’s Carl Brooks to learn about the nuts and bolts of managing cloud-native application transformation at scale. After an overview from 451 Research, we’ll dive deep on the roles, tools, and processes required to create a well-run, cloud-native application transformation.

    Join us to hear how to replicate this success in your own organization!

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    CGI Privacy Statement:
    https://www.cgi.com/en/global-privacy

    This webinar:
    https://content.pivotal.io/webinars/nov-15-refactoring-the-factory-building-a-cloud-native-app-transformation-factory-webinar
  • Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Storage Switzerland, Micro Focus Recorded: Nov 15 2018 57 mins
    The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.

    Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.

    By attending this webinar you’ll learn how to:
    * Implement service levels like RPO and RTO throughout the data center
    * Establish NEW service levels for copy management and recovered performance
    * Fix the disconnect between service levels and data protection applications
  • An Inside Look at Targeted Ransomware Attacks
    An Inside Look at Targeted Ransomware Attacks
    Peter Mackenzie, Malware Escalations Manager, Sophos Recorded: Nov 15 2018 47 mins
    Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Geek Out: Data Automation in the Modern Software Defined Data Center Explained
    Geek Out: Data Automation in the Modern Software Defined Data Center Explained
    Charles Milo, Nic Bellinger, Narasimha Valiveti, Bill Borsari, Sailesh Mital Recorded: Nov 15 2018 61 mins
    Have questions on how to automate your data environment at scale and want answers? No presentations, no scripts, no marketing gimmicks, just your questions answered straight up without intervention by corporate hacks. Special guest, Charles Milo, Senior Solutions Architect at Intel joins our senior team of geeks from Datera to answer your questions on how to massively scale and automate a high-performance data environment using applied machine learning to achieve a software defined data infrastructure. You'll learn about what works and doesn't work with a 100% software-driven infrastructure used to power cloud-native applications, get the most out of new technologies like new flash drives and NVMe and not just what Datera does, but why we built the system the way we did and how it operates to powers your data.

    Bring your questions, and challenge Nic Bellinger, Chief Architect, Bill Borsari, Field Technical Leader, Shailesh Mittal, Senior Software Architect, and Narasimha Valiveti, our Head of Engineering and Charlie will sit down, geek out with you and get all your questions answered on data today.
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Nov 15 2018 48 mins
    The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Sujay Doshi, Sr. SIEM Solution Engineer Recorded: Nov 15 2018 51 mins
    Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

    Attend this webinar to hear about:

    - Why password access based attacks in cloud environments?
    - Threat detection and threat hunting use cases for password-based attacks
    - User account based orchestration and incident response actions
    - Walkthrough of Securonix - Okta integration with a live demo
  • Defense One Summit 2018 Livestream
    Defense One Summit 2018 Livestream
    Defense One | Underwritten by: Booz Allen Hamilton Recorded: Nov 15 2018 274 mins
    Register Now
  • Introducing a Simpler Way to Effective Threat Management
    Introducing a Simpler Way to Effective Threat Management
    Alert Logic Recorded: Nov 15 2018 60 mins
    How to Get the Right Security Coverage for the Right Resources

    There’s a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM (security incident and event management), or expensive traditional security outsourcing vendors.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Learn how Alert Logic’s seamless combination of platform, threat intelligence, and expert services can provide a simpler, more cost-effective approach to security for all your infrastructure and workloads – including across physical, virtual and cloud environments. Learn also how our flexible packaging and pricing will help you get the right level of leverage for the optimal level of investment.

    Join our experts in this webinar to learn more about this new approach to cybersecurity and see a demo of it in action.
  • Kibosh: Bridging the Gap Between Kubertnetes and Cloud Foundry
    Kibosh: Bridging the Gap Between Kubertnetes and Cloud Foundry
    Konstantin Kiess & Wayne Seguin Recorded: Nov 15 2018 41 mins
    In this webinar, you will explore Kibosh and learn to deploy Helm Charts as Services on Kubernetes via Kibosh' Open Service Broker API. Experience on-demand dedicated services the easy way. With this introduction by Stark & Wayne, you will create a Rabbit-MQ service offering on Kibosh from a base chart and use Kibosh to provision an instance of your Rabbit-MQ service.

    Use Case:
    Sometimes you may not want to implement a ServiceBroker API. You have existing Services packaged as Helm Charts but want an easy way to offer them via an OSB API. Or more general, you want a containerized General Service Solution hosted on Kubernetes. The solution is Kibosh.

    Learning Objectives:
    - Understanding the ServiceBroker API.
    - Understanding how Kibosh uses HelmCharts
    - Learning how to create a service from a helm chart basis (e.g. from https://github.com/helm/charts/tree/master/stable)
  • How To Take Your DDoS Protection To The Next Level
    How To Take Your DDoS Protection To The Next Level
    Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at Cloudflare Nov 19 2018 2:00 pm UTC 45 mins
    As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.

    Join this webinar to learn about:

    - How small DDoS attacks can still bring your site down
    - A little known way attackers can bypass traditional DDoS protections
    - Why TCP services may make you vulnerable to a DDoS attack
    - Pros and cons of multiple solutions: BGP, MPLS, and building your own
    - How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • Have it All: Achieving Agility and Security with Automation
    Have it All: Achieving Agility and Security with Automation
    Yoni Geva, Product Manager Nov 19 2018 3:00 pm UTC 60 mins
    Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
    Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
    In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
    Join our webinar to learn how to take advantage of:
    •Automated security policy automation with zero touch
    •Security policy management that keeps up with business requirements
    •Automatic identification of risk
    •Enhanced compliance with quick audit reports on demand
  • Ransomware Solved. Cryptojacking, Next.
    Ransomware Solved. Cryptojacking, Next.
    Anthony Giandomenico, Senior Security Strategist; Damien Lim, ATP Product Marketing; Aamir Lakhani, Sr. Security Strategist Nov 19 2018 6:00 pm UTC 61 mins
    A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.

    Join our panel of experts for a round table discussion around these types of threats and the tactics cybercriminals are leveraging today plus learn about how Fortinet’s advanced threat protection (ATP) Fabric-enabled approach stops the delivery of malicious crypto-mining malware across the dynamic attack surface targeting end-users and servers from the campus to the cloud.
  • Technology Trends 2019: 5 ways cybersecurity will transform next year
    Technology Trends 2019: 5 ways cybersecurity will transform next year
    Matthew Gyde, Group Executive, Cybersecurity at Dimension Data Nov 19 2018 6:30 pm UTC 60 mins
    CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
    A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
    Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
    This webinar will cover:
    •How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
    •Why organisations are focusing on cloud-based security platforms.
    •Why organisations now aim to be secure by design.
    •How cybersecurity is becoming intelligence driven.
    •Why tighter regulation is affecting risk profiles.
  • Technology Trends 2019: 5 ways the tech landscape will transform next year
    Technology Trends 2019: 5 ways the tech landscape will transform next year
    Ettienne Reinecke, Group CTO at Dimension Data Nov 20 2018 6:00 am UTC 60 mins
    Until now, the tech sector has spoken about innovative technologies somewhat theoretically, without providing a clear picture of how these powerful innovations will be used and what they will look like in practice. This has left people without a solid understanding of how these solutions will ultimately manifest in our work and personal lives.

    Join Ettienne Reinecke, Group CTO at Dimension Data, as he reveals the game-changing approaches that will transform the tech landscape during 2019 and beyond, and how companies can ensure emerging solutions – such as AI, machine learning, robotics and AR/VR – become firmly embedded in their core processes. Ettienne will explore:

    •Why easier access will accelerate the adoption of game-changing technologies.
    •How identity will emerge as the killer app for blockchain.
    •How companies can extract value from data, while respecting privacy.
    •Why the Internet of Things (IoT) will change our lives for the better.
    •How disruption will drive consolidation among tech vendors.
  • Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Lionel Meoni, Systems Enginee Manager, Rubrik France Nov 20 2018 9:00 am UTC 33 mins
    Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise

    Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
  • Lightboard Lessons: Perfect Forward Secrecy
    Lightboard Lessons: Perfect Forward Secrecy
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks Nov 20 2018 9:00 am UTC 14 mins
    Perfect Forward Secrecy allows your encrypted communications to stay secure even if a bad guy were to steal the private key of the websever you were communicating with. But, how is that possible? And, how can a web server be configured to achieve this level of security? In this video, we talk about the concept of Perfect Forward Secrecy, describe how it all works, and then show how you can configure your BIG-IP to make sure you take advantage of this really cool security functionality.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Accelerating Channel Innovation | AWS Marketplace
    Accelerating Channel Innovation | AWS Marketplace
    Whit Crump, Global Head, AWS Marketplace Channels Nov 20 2018 10:00 am UTC 60 mins
    We are excited to announce a new feature that allows Partners to resell software solutions directly to customers in AWS Marketplace.

    Many AWS Customers prefer to purchase software solutions through Partners, benefiting from their knowledge of the customer’s business, localized support, and expertise. Partnering with Consulting Partners ensures that customers can deploy the right product at the right price for their business. Additionally, ISVs rely on Consulting Partners for scale, reach, specialization, and value-add services for their customers.

    This new feature combines these benefits and enables Consulting Partners to work with customers from the start of their procurement process all the way to purchase.

    Join this webinar to learn about the feature and how to get started with AWS Marketplace.

    This webinar is intended for:
    - All partners interested in Enterprise Software Procurement
  • LIVE PANEL: Cybersecurity for the Modern Era
    LIVE PANEL: Cybersecurity for the Modern Era
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room Nov 20 2018 10:00 am UTC 60 mins
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

    Line up:
    •Swati Lay, CISO, Funding Circle
    •Graham Edwards, Former Head of Group Security, Nationwide
    •Naveen Vasudeva, MD & Co-founder, CyberCorre
    •Clive Room, Chairman, White Hat Ball
    •Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint

    Moderated by: Tom Berry, Advisory Board Member, ClubCISO
  • Learn How Element 26 Uses Quip to Improve Deal Velocity and Deliver Seamless Cus
    Learn How Element 26 Uses Quip to Improve Deal Velocity and Deliver Seamless Cus
    Nathan Haines Managing Director Element 26. Kate Aldridge Senior Producer Element 26.Louis Tsamados Editing Colorist Element Nov 20 2018 10:00 am UTC 39 mins
    Join us to learn how Nathan Haines, Managing Director at Element 26 empowers a team of 20 to deliver a fast, seamless experience across marketing, sales and service. See first-hand how Quip is used to enable cross-functional collaboration for the sales process, and then on to service delivery.

    On this webinar we will share successes and best practices using Quip to:

    1- Create collaborative sales processes that keep everyone on the same page
    2 - Track filming, scheduling and service deliverables
    3 - Review opportunity management and deal creation use cases
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Nov 20 2018 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Wofür können Sie Kubernetes einsetzen?
    Wofür können Sie Kubernetes einsetzen?
    Naomi Albuquerque Nov 20 2018 11:00 am UTC 60 mins
    Sie benötigen schnell umfassende und aktuelle Informationen über die Kubernetes Plattform? Dieses Webinar liefert Ihnen alle wichtigen Informationen und zeigt Ihnen den Einstieg in die Kubernetes-Distribution von Canonical.

    Nutzen Sie dieses Webinar, um ...
    > zu erfahren, wie Unternehmen Geld und Zeit mit Kubernetes sparen
    > zu lernen, wie Sie erfolgreich einsteigen, von der Implementierung bis zu ersten Workloads
    > Initiale Konfiguration, Installation und Validierung
  • Back to Basics: Solving the Email Fraud Problem
    Back to Basics: Solving the Email Fraud Problem
    Robert Holmes, VP Email Security Products Nov 20 2018 11:30 am UTC 43 mins
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Live Demo: 360 Degrees of Email Fraud Defense
    Live Demo: 360 Degrees of Email Fraud Defense
    Neil Hammet Nov 20 2018 12:30 pm UTC 45 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Driving Behavioural Change Through Phishing Simulation and Security Training
    Driving Behavioural Change Through Phishing Simulation and Security Training
    Paul Down, Wombat Specialist Nov 20 2018 1:30 pm UTC 45 mins
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:

    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • Live Demo: Phishing Simulation and Security Awareness Training
    Live Demo: Phishing Simulation and Security Awareness Training
    Jen Gough, Sales Engineer, Proofpoint Nov 20 2018 3:00 pm UTC 45 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Live Demo: Email Protection and Targeted Attack Protection
    Live Demo: Email Protection and Targeted Attack Protection
    Kiran Khokhar, Product Marketing Manager Nov 20 2018 4:00 pm UTC 45 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Evolution of integration and microservices patterns with Istio service mesh
    Evolution of integration and microservices patterns with Istio service mesh
    Christian Posta, Chief Architect, Red Hat Nov 20 2018 4:00 pm UTC 60 mins
    As we build distributed systems on cloud platforms (like Kubernetes, or public clouds), we must understand where the responsibility of the developer teams lies with respect to the platform. The platform provides some useful abstractions to make us more productive, but the correctness and safety of our applications and business requirements is still the responsibility of the developer and development teams. Tools like Istio, and service mesh in general, solve for some difficult problems like observability, security, and resilience and are highly encouraged for cloud-native application deployments. In this talk, we'll take a look at how Istio can help build resilient distributed-systems applications, but we'll also be very specific about Istio's boundaries and where application frameworks built for integrating systems like Apache Camel fit into the picture. One does not remove the need for the other.
  • Monitoring and Alerting of Availability Groups
    Monitoring and Alerting of Availability Groups
    Shawn Meyers, Principal Architect Nov 20 2018 5:00 pm UTC 60 mins
    So you have your Availability Groups (AG) configured and everything reports green. Learn how to measure for Service Level Agreement (SLA) compliance! Know when replication is delayed! Get notified when a failover occurs! In this session, we will teach the attendee how to implement proper monitoring and alerting. We will also show you what metrics and reports you should be reviewing regularly to ensure there are no surprises, such as pauses replication or unacceptable delays. For example, we will look at the DMVs, extended event sessions, perfmon counters, SQL agent jobs and alerts. We will show what to monitor in your AG, and how to setup alerting so you know when to take action.
  • Ready for Liftoff? Planning a Safe and Secure Cloud Migration
    Ready for Liftoff? Planning a Safe and Secure Cloud Migration
    Jason Garbis of Cyxtera Nov 20 2018 5:00 pm UTC 60 mins
    Want to transition on-premises workloads to the cloud, but are concerned about consistently securing access? Join us for a webinar where we discuss how you can easily and effectively apply secure access policies throughout your cloud migration, regardless of your infrastructure complexity or architectural starting point. By utilizing a modern, cloud-ready security architecture, you can maintain – and in fact, improve – your enterprise security controls throughout the entire migration process.

    In this webinar, Jason Garbis, CISSP – Vice President of Products at Cyxtera, will discuss
    - Challenges (real and perceived) that enterprises face when moving to the cloud
    - Managing policies and permissions for cloud vs. on-premises workloads
    - The pitfalls of inconsistent security
    - How to secure any application, on any platform, anywhere.

    This webinar is for IT / Security leadership (director, VP, CISO, CIO).
  • VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMC Nov 20 2018 5:00 pm UTC 30 mins
    With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
  • Proactive Security: Revamp Your Security Strategy with Containers
    Proactive Security: Revamp Your Security Strategy with Containers
    Sonya Koptyev, Director of Evangelism and Keith Mokris, Product Marketing Lead Nov 20 2018 6:00 pm UTC 60 mins
    If you ask DevOps engineers about the benefits of containers and microservices, their responses will center on the agility, modularity, and scalability that microservices-based architectures provide.
    Security is a crucial and often overlooked advantage of migrating to containers and microservices.

    Containers allow enterprise to secure applications and environments at a more granular and nuanced level. They also empower enterprises to identify and resolve potential security threats before they disrupt workflows, rather than having to adopt a defensive stance oriented around addressing attacks once they are fully underway.

    Watch this webinar to learn:

    •Challenges with traditional security strategies

    •What a proactive approach to security for a microservices-based environment looks like

    •How your organization can adopt a proactive security stance when it makes the migration to containers.
  • The Workforce Gap Widens: The Need to Focus on Skills Development
    The Workforce Gap Widens: The Need to Focus on Skills Development
    John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2 Nov 20 2018 6:00 pm UTC 75 mins
    The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
  • Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Jacquie Touma, Chaitra Vedullapalli, Terri Stephan Nov 20 2018 8:00 pm UTC 60 mins
    We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.

    The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.

    Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!

    In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.

    Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!