Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Cloud on your terms: make the most of your infrastructure investments Cloud on your terms: make the most of your infrastructure investments Tyler Cooper Technology Architect; Albert Wolchesky Senior Technology Architect, Microsoft Corporation May 27 2016 3:00 pm UTC 60 mins
    Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.

    You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?

    Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:

    - Expanding your options without adding complexity
    - Easily moving workloads from your datacenter
    - Building hybrid applications that leverage both on-premises and cloud resources
    - Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint May 31 2016 8:00 am UTC 60 mins
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
  • Что новенького про .... Новое семейство СХД ЕМС Unity? Что новенького про .... Новое семейство СХД ЕМС Unity? Игорь Виноградов May 31 2016 8:00 am UTC 75 mins
    Пока что тут нет описания вебинара, но оно обязательно появится позже, как только мы получим самые самые последние данные. Пока что только скажем - присоединяйтесь, не пожалеете!
  • Meet Unity - New Standard in Flash Optimized Affordable Storage Meet Unity - New Standard in Flash Optimized Affordable Storage Jason Salo May 31 2016 11:00 am UTC 60 mins
    Unity is the new baby of the EMC family. It’s an incredible engineering achievement – it’s a storage solution built from scratch without missing a beat. With Unity, we managed to change the car’s engine while barreling down the highway. It’s faster, denser, less expensive, and simpler than everything else on the market. Unity is focused at external storage use cases that start small - and go up to 500 SSDs/HDDs. Join this free webinar to see it in action and ask any questions you might have.
  • Empower your mobile workforce: Enterprise Mobility Management made simple Empower your mobile workforce: Enterprise Mobility Management made simple Alex Shteynberg Technology Architect; David Hansford Technology Architect, Microsoft Corporation May 31 2016 3:00 pm UTC 60 mins
    Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.

    Join this webcast to learn:

    What components make up EMS
    How to get up and running with EMS
    How to provide secure access to corporate data
    Protect everything—across devices, operating systems and applications
  • Designing Red Hat Ceph Storage Clusters on Supermicro Servers Designing Red Hat Ceph Storage Clusters on Supermicro Servers Alan Johnson - Super Micro; Kyle Bader - Red Hat; Jake Smith - Intel May 31 2016 5:00 pm UTC 60 mins
    If you need guidance with performance, capacity, and sizing using Red Hat® Ceph Storage on Supermicro servers, then this webinar is for you. Red Hat and Supermicro have performed extensive lab testing to characterize Red Hat Ceph Storage performance on a range of Supermicro storage servers.

    Join this webinar to:
    •See benchmarking results that led to Ceph-optimized Supermicro server SKUs.
    •Learn how to best architect various sizes of Red Hat Ceph Storage clusters for throughput and cost/capacity optimized workloads deployed on Supermicro servers
  • Wie gehen Sie mit dem Fachkräftemangel in der IT-Sicherheit um ? Wie gehen Sie mit dem Fachkräftemangel in der IT-Sicherheit um ? Alex Peters, Symantec Security Specialist Jun 1 2016 8:00 am UTC 45 mins
    Schlechte Nachrichten: 80% aller Unternehmen sehen einen akuten Mangel an IT Sicherheit-Fachkräften. Bis 2020 sollen ca. 1,5 Millionen (!) solcher Fachkräfte fehlen, wenn nichts getan wird. Währenddessen steigt das Risiko erfolgreicher Angriffe und Daten-Verluste. Um sich diesen Gefahren stellen zu können kann man entweder bestehendes Personal refokussieren oder man stellt externe Hilfe ein, was immer schwieriger und kostspieliger wird. Es gibt auch einen anderen Weg: in unserem dritten Webcast betrachten wir mögliche Ansätze mit der neuen Gefahrenlage umzugehen und die Kontrolle bewahrt bzw. auch proaktiv nach vorne blicken kann.
  • Digital Signage Meets IoT: building success with a Raspberry Pi! Digital Signage Meets IoT: building success with a Raspberry Pi! Dave Haynes Jun 1 2016 4:00 pm UTC 60 mins
    Sixteen:Nine editor Dave Haynes talks with Viktor Petersson, CEO of Screenly, to explore his journey building a digital signage solution based on the very popular and very affordable Raspberry Pi. Their discussion will see them touch on a variety of topics:
    - Digital signage industry trends
    - The disruptive effects of the drop in hardware costs
    - The adoption of agile software development and operations
    - The start-up road to success
    - This will be the first webinar in a series dedicated to exploring the changes that the new wave of IoT innovation is bringing to the digital signage industry.
  • Marketing Cloud May 2016 New Feature Overview Marketing Cloud May 2016 New Feature Overview Marketing Cloud Production Management Jun 1 2016 4:00 pm UTC 90 mins
    Join us for the Marketing Cloud May 2016 Release Webinar and get an exclusive look at the new features now available.

    Come hear from our experts about the new additions to the product, including Email Studio, Mobile Studio, Advertising Studio, Journey Builder and much more.
  • Energy Firms' Blueprint for Hybrid Cloud Security Energy Firms' Blueprint for Hybrid Cloud Security Vinay Wagh, Senior Product Manager Jun 1 2016 6:00 pm UTC 30 mins
    Interested in harnessing cloud to crunch big data and reduce operational overhead, but concerned the security risks are too great? Our F500 customers have faced the same hurdles energy, oil, and gas firms are grappling with.

    Despite concerns about their valuable IP and data, cloud discussions for our customers have moved from “if” to “how" because of the much-needed flexibility the cloud provides.

    In just 30 minutes in our June 1st webcast, we will outline the must-know principles defining IT’s cloudy future and how our F500 customers are overcoming security challenges. We’ll then demo Bracket’s groundbreaking virtualization layer that is enabling enterprises in the cloud—and we would love to have you there.
  • How to Defeat Ransomware How to Defeat Ransomware Bilal Baig, Technical Director for Mediterranean, Middle East, Africa, CIS, Trend Micro Jun 2 2016 7:00 am UTC 60 mins
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join our webinar to understand more about this threat and learn best practices to protect your business and combat ransomware!
  • Ask an Architect - Virtual Office Hours Ask an Architect - Virtual Office Hours Stanislav Vonholsky, Solutions Architect Jun 2 2016 9:00 am UTC 75 mins
    The Ask an Architect (SA) Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.

    A few things to keep in mind...
    - Please note that this is a time when you can get general technical guidance; if you require extensive or urgent support, please contact AWS Technical Support >> https://aws.amazon.com/contact-us/
    - If your question is not answered during the live session, we will get back to you afterwards via e-mail
    - Did you know that we already have a repository of answers written by AWS architects? Check if the answer to your question is not already on the AWS Answers webpage >> http://aws.amazon.com/answers/
  • Comment gérez-vous le manque de ressources en sécurité ? Comment gérez-vous le manque de ressources en sécurité ? Hervé Doreau (Directeur Technique) & Evelyne Lescuyer (Ingénieur Avant-Vente) Jun 2 2016 9:00 am UTC 45 mins
    80% des entreprises jugent qu’elles manquent actuellement de ressources et de compétences en sécurité. Et cela risque de s’aggraver puisqu’on estime qu’en 2020 c’est 1,5 millions de professionnels de la sécurité qui manquerait à l‘appel.
    Hors, pendant ce temps, les risques de brèches de sécurité et de cyber-attaques continuent d’augmenter. Pour faire face aux menaces, soit vous détournez le personnel existant de leurs attributions premières soit vous requérez l’aide d’une autre équipe d’experts déjà surchargée.
    Il existe une autre alternative …
    Rejoignez-nous lors de ce 3ème webcast afin de découvrir comment passer d’une approche réactive à une stratégie offensive pour faire face aux attaques.

    Au cours des trois prochains mois, nous vous proposons une série de quatre webcasts consacrés à vos enjeux de sécurité. Lors de chacun des webcasts, nous vous proposons d’échanger avec nos experts sur ces problématiques spécifiques et de découvrir comment les solutions Symantec peuvent vous aider à y répondre.

    1) Adoption de la GDPR, une raison à 20M € (11:00 am Apr 21 2016 Paris) - https://www.brighttalk.com/webcast/5691/196523
    2) Cloud: réduisez les risques & gardez le contrôle pour en apprécier les bénéfices (11:00 am May 12 2016 Paris) - https://www.brighttalk.com/webcast/5691/196525
    3) Comment gérez-vous le manque de ressources en sécurité ? (11:00 am Jun 02 2016 Paris) - https://www.brighttalk.com/webcast/5691/196527
    4) Cloud, catastrophes naturelles et cyber-attaques (11:00 am Jun 30 2016 Paris) - https://www.brighttalk.com/webcast/5691/196533
  • How are you managing the security skills shortage? How are you managing the security skills shortage? Sunil Choudrie & Laurence Pitt – Symantec Security Specialists Jun 2 2016 9:30 am UTC 45 mins
    The bad news: A staggering 80% of businesses believe that right now there is a severe shortage of security staff. Even worse is that by 2020 there will be a workforce shortage of 1.5 million security professionals.

    The risk of security breaches and cyber-attacks are increasing. To meet security threats, either you divert existing staff away from their intended tasks, or you hire expert help from a skilled pool that is already shrinking.

    There is a better way.

    Join our webinar where you will learn how to stop simply coping and seize control of your security program whilst looking ahead to deal proactively with possible attacks.

    Over the next three months, we’ll be holding a series of 4 webinars tackling threat and information protection.
    1) €20 million reasons to embrace the new EU GDPR (21st April 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195977
    2) The Cloud: Eliminate risks, Gain Control; release benefits (11th May 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195987
    3) How are you managing the security skills shortage? (2nd June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195991
    4) Clouds, hurricanes and cyber-attacks… (29th June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195993
  • Financial Services workloads that make sense in the cloud (case study) Financial Services workloads that make sense in the cloud (case study) Nick Hyner, Director Cloud Services, EMEA, Dell Cloud Services & Len Padilla, Jun 2 2016 1:00 pm UTC 60 mins
    Dell Cloud Services and NTT Communications are providing a managed private cloud based data analytics solution to a large insurer based on a Hadoop data platform for data storage. The 24x7 service allows the business to quickly and accurately analyse large amounts of data thereby improving its customer response time. Len Padilla, Vice President, Product Strategy at NTT Communications and Nick Hyner, EMEA Cloud Services Director will discuss this innovative Insurance Project in more detail

    You will learn:

    -How Dell has enabled a large insurer to provide faster data analysis capabilities using Cloud based service
    -How a Multi-vendor cloud based platform drives efficiencies across the organization
    -How by accessing data in real-time such as customer demographics and past claim history, insurers are able to provide more accurate, timely policy quotes and can quickly reacting to their competitors’ movements.
  • Dell Security Webinar: Addressing The Challenges of the EU GDPR 2016 Dell Security Webinar: Addressing The Challenges of the EU GDPR 2016 Jonathan Armstrong: (Cordery Compliance), Florian Malecki; (Dell) & Luke Shutler (Absolute Software) Jun 2 2016 1:00 pm UTC 60 mins
    The webinar will enable you to hear from an independent Legal Specialists on the real challenges and impacts of the EU GDPR and then the webinar will demonstrate how Dell & Absolute can support your business in overcoming these challenges.

    The webinar will focus on:
    • Implement a seamless, connected security strategy that works across the organisation, from device to data centre to cloud
    • Prove that a lost device is inoperable or has had its data completely wiped
    • Gain visibility of data breaches and contain and eradicate threats
    • Eliminate the blind spots between networks, identity and access management, data encryption, endpoint security and security managed services
    • Enable security decisions based on intelligence that takes into account user, content, location and context
  • Cover Your Apps in Minutes with Synthetic Monitoring Cover Your Apps in Minutes with Synthetic Monitoring CA Technologies Jun 2 2016 4:00 pm UTC 60 mins
    Your organization relies on applications as the face of its business. But what do you rely on to make sure they are up and running and performing as expected? If your application fails at 3:00am – how will you know? If your application is working well in your home country but not in other locations – how will you know?

    This is where synthetic monitoring can help. In this webcast, you’ll see how you can start 24x7 monitoring of your web site or application in less than 3 minutes with a self-service SaaS solution -- CA App Synthetic Monitor (ASM). With almost 100 monitoring stations around the world, CA ASM never sleeps and is constantly monitoring the availability and performance of your application providing a real-time view of actual end-user experience.

    In this webcast, we’ll explore the following benefits of CA’s synthetic monitoring solution:
    •Visibility into cloud-based applications outside enterprise control
    •Ensures availability using synthetic transactions to check systems when there is no real user traffic (the “3 AM problem”)
    •Captures real user interactions for replay, to help ensure complex services are performing correctly
    •Pinpoints problems through comprehensive browser-based end-user perspective to provide optimal experience
  • Informatica Cloud Summer 2016 Release Informatica Cloud Summer 2016 Release Anwesa Chatterjee, Director Product Marketing, Informatica Jun 2 2016 4:00 pm UTC 60 mins
    Join the Informatica Cloud product team to find out what's new in the Summer 2016 release and explore all the key capabilities. The Summer 2016 release is packed with many new platform capabilities, new and enhanced connectors and various other additions to the Cloud suite to help our customers drive their businesses better with unified and secured data.
    •Cloud Data Integration Hub offers centrally managed hub to streamline and automate data integration across cloud and on-premise sources
    •Innovative features of Informatica Cloud platform to manage global and distributed data integrations like state-ful time sensitive variables, advanced data transformations like unions and sequences
    •Intelligent data masking capabilities included in Informatica Cloud Data Integration to enable masking of sensitive data dynamically saving time and development efforts
    •Cloud B2B Gateway is the leading data exchange platform for enterprises and it’ partners and customers providing end-to-end data monitoring capabilities and support for highest level of data quality
    •Cloud Application Integrations widget framework, part of SDK, enabling ISVs and third parties to build customized integration solutions
    •Native connectors for popular cloud applications like Workday, SAP Success Factors, Oracle, SugarCRM, MongoDB, Teradata Cloud, SAP Concur, Salesforce Financial Cloud

    Not just that but extensive enhancements to support ease-of-use, self-service and more richer experience.
  • SD-WAN Architectural Choices Deep Dive SD-WAN Architectural Choices Deep Dive Steve Woo, Co-founder and VP of Products, VeloCloud Jun 2 2016 5:00 pm UTC 60 mins
    There are many solutions being positioned as SD-WAN. These architectures vary based on the particular WAN challenges they target and historical focus. It is critical for enterprises to understand the focus and architectures of software-defined networking solutions before making a decision about which solution is right for their business.

    Join Steve Woo, co-founder and VP of Product, as he reviews the architectural details of each of the SD-WAN approaches in the market. Steve will discuss key considerations for choosing among potential architectures and provide a deep dive review of the pure-play SD-WAN designs with a particular emphasis on cloud-delivered software-defined WAN.