Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Cameron Goedde - Client Solutions Field Marketing | Dell EMCRecorded: Oct 18 201942 mins
Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.
Marcel Scherer, Lenovo und Carsten Duch, SUSERecorded: Oct 18 201946 mins
SAP Data Hub hat die Aufgabe, die heute vorherrschenden heterogenen Datenquellen, seien sie in der Cloud oder im eigenen Rechenzentrum, zentral und ohne vorherige Konsolidierung zugänglich und vor allem auswertbar zu machen. Die zugrundeliegende Softwarearchitektur basiert auf Containern und setzt eine Kubernetes-Implementierung voraus.
Eine Möglichkeit, SAP Data Hub auf Enterpriseebene zu betreiben, ist die SUSE Container as a Service (CaaS) Platform. Um den Kunden bei der Planung der durchaus komplexen Applikationsumgebung bestmöglich zu unterstützen, haben Lenovo und SUSE eine gemeinsame Referenzarchitektur entwickelt. Ziel ist es, das Thema Infrastruktur für den Kunden schnell abzuhaken und sich auf die Anwendung zu konzentrieren.
Erfahren Sie in diesem Webinar mehr über den Aufbau von SUSE CaaS Platform, Grundlagen von SAP Data Hub und wie eine skalierbare Hardwareplattform basierend auf Lenovo ThinkSystem-Servern aussehen könnte.
Mike Stone, Lead Architect & CIO, House of BrickRecorded: Oct 16 201945 mins
Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.
• Common Cloud Services
- Google Spanner
- Amazon DynamoDB
Esther Chen, Product Marketing at MuleSoftRecorded: Oct 17 201931 mins
To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.
- Understand the power of MuleSoft + Service Cloud in building a personalized service experience
- Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
Sean Walker, Enterprise Account ExecutiveRecorded: Oct 17 201933 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Chris Scheels, Director of Product Marketing, CyxteraRecorded: Oct 17 201938 mins
VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?
Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.
- VPNs cannot support your move to Zero Trust
- Managing VPNs is too complex for delivering granular access to a mobile workforce
- Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
Brent Smithurst, Product Marketing Manager, SUSERecorded: Oct 17 201948 mins
SUSE Cloud Application Platform is a modern application delivery platform that brings an advanced cloud native developer experience to Kubernetes. Developers can serve themselves and get apps to the cloud in minutes instead of weeks. SUSE Cloud Application platform eliminates manual IT configuration and helps accelerate innovation by getting applications to market faster. Streamlining application delivery opens a clear path to increased business agility, led by enterprise development, operations, and DevOps teams.
Join us in this webinar for an overview of SUSE Cloud Application Platform. We’ll discuss and demonstrate how the platform builds on Kubernetes to add easy one step deployment of cloud native applications from the CLI, UI, or Helm Chart Repository using a variety of languages, frameworks, and services most appropriate for the task. Other topics will include installation options on a variety of Kubernetes services, application autoscaling, logging, metrics, and much more. SUSE Cloud Application Platform is 100% open source technology – learn how to get started with it today!
Johna Till Johnson, CEO and Founder, Nemertes ResearchRecorded: Oct 17 201954 mins
5G is here. But what does it mean, and how can a new wireless standard transform enterprise organizations? Find out here. We'll delve into the changes 5G brings to wireless services, and how those changes will affect businesses today and going forward. And we'll provide practical next steps for organizations looking to move towards 5G.
Tom McNash, Senior Solutions Engineer, Cyren & Duncan Mills, Product Marketing Director, CyrenRecorded: Oct 17 201960 mins
Whether you use Office 365 or an on-premises gateway, have you been able to quantify how much malware, phishing and spam is evading your email security and getting through to your users? Cyren has developed an Email Security Gap Analysis test to measure how well a company’s in-place security is performing, and has just published a new, updated report with aggregated data on results from assessments done in 2019.
This webinar reviews the key statistics and general findings in that report, as well as case studies and segmented industry data, example emails and threats uncovered during assessments (appropriately anonymized), and it covers how to complete your own assessment. Webinar registrants will receive a complimentary copy of the report.
Simon Ratcliffe, CIO Advisor and Mentor, IT EvangelistRecorded: Oct 17 201938 mins
The role of the architect has changed dramatically in the past few years and is headed for even more change as the landscape of possible technology options is only going to increase. Faced with a list of options that is increasing almost daily across a highly competitive landscape, many architectural decisions have become an exercise in avoiding error rather than exploring possibility.
Whilst an acceptance of failure is becoming the norm in smaller development faced activities, architects must make big decisions that can affect the entire operation of an organisation. This webinar explores some ideas for architectural best practice and mechanisms for reducing risk whilst empowering architects to unleash some of the exciting new options available to them.
Danna Bethlehem, Director of Product Marketing, ThalesRecorded: Oct 17 201947 mins
The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).
This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
- What are the major attack vectors for cyber attacks
- Which access management technologies organizations are deploying to secure access to the cloud
- Which access management technologies IT professionals deem the most effective in securing access to the cloud
- The criteria IT professionals use to determine access policies for users
- Who are the internal stakeholders involved in Access Management deployments
Brian Jozefat, Crystal RicevutoRecorded: Oct 17 201930 mins
Users create an ever-increasing number of documents, presentations, drawings and other content that are stored in files. There is also no shortage of locations to store those files. Making sure that your users have seamless access to all those files, in any repository, is key to providing a productive user experience. In this session, we will demonstrate how Citrix Workspace provides access to all those repositories, including the native Citrix Content Collaboration repository, existing repositories on-premises and in the cloud, and repositories inside Workspace apps to those integrated into Explorer and Finder, all with a seamless experience.
Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, AkamaiRecorded: Oct 17 201957 mins
Businesses experience disengaging clients if their websites and mobile apps don’t respond in 2, 3 seconds. They lose revenue and get bad media coverage when customer experience breaks because of large scale unforeseen load and access from increased user traffic.
Be it an online sale event, a new financial service offering or a new game launch, every organization has planned or unplanned real-life situations where the user traffic increases 2X, 3X compared to normal days.
Pressure is on for app dev and infrastructure teams. As they transform to deliver better apps more frequently, their continuous delivery and Agile + DevOps journeys break too if end to end performance testing at scale is not done regularly to most closely replicate real world conditions and for peaks.
In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.
Join us on 17 Oct, 14:00 Singapore time to learn:
• Application performance needs in the accelerated digital world
• Continuous performance testing meets continuous delivery
• Modern performance testing trends
• How to be ready for the unexpected with 2X, 3X, 4X user traffic
Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon BlackRecorded: Oct 17 201960 mins
What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.
Attendees will learn how to:
- Automate the majority of successful data analysis procedure
- Map adversary techniques to detection coverage
- Test, validate, and continuously improve visibility
- Make threat hunting a repeatable process that drives better security outcomes
Joel Sierra, Sales Engineer at ProofpointRecorded: Oct 16 201939 mins
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?
Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.
Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:
1.Protect your people from email-based attacks
2.Gain visibility into who in your organization is getting the most attacks
3.Solve for user awareness through threat simulation and training
Elisabeth Thomas, Launch Product Marketing | Arun Trivedi, Wipro | Monica Kumar, Nutanix | Tyler Ramby, VeeamRecorded: Oct 16 201941 mins
It can be tricky to know how to modernize and mobilize business in the digital era. From retail to manufacturing, and transport to healthcare, digital transformation is changing the face of how many industries run, plan, and interact with customers, suppliers and partners.
The right strategy can increase revenue, reduce cost over time, and allow a business to remain agile. Join this panel of experts as they share different digital transformation success stories and use cases, and show you how it can aid expansion into global markets.
Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-TRecorded: Oct 16 201933 mins
VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.
Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.
What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
Kevin Haley | Eva Velasquez | Ryan LawlessRecorded: Oct 16 201955 mins
As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.
Topics will include:
- If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems
- Wi-Fi safety
- If You Collect It, Protect It: keeping customer/consumer data and information safe
Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at BitglassRecorded: Oct 16 201942 mins
Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?
Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.
What you will learn?
•Data protection challenges to be mindful of
•Managing digital transformation and unstructured data proliferation
•How Bitglass and Spirion's solutions work together to protect your data
Danny Cavion, Business Consultant and Michael Bettan, Practice Manager, Micro FocusRecorded: Oct 16 201950 mins
Save robotic work for the robots. Micro Focus RPA robots can mimic human actions to perform everyday tasks. But—they are faster, more accurate, and never sleep. So they can handle mundane, repetitive, error-prone work. And you can focus on more strategic things.
Join our webinar to:
• Learn why you need RPA and how you benefit
• Explore customer use cases for RPA
• Hear about the new Micro Focus RPA product
• See a demo of Micro Focus RPA and watch robots in action
Welcome your new robo workers, liberate human brainpower, and ignite enterprise productivity.
Myriam Fentanes and Phil Simpson, Red HatRecorded: Oct 16 201958 mins
Have you ever built a working application that automates a business process? Now's your chance to try it hands-on. In this workshop, we’ll take you through the steps required to build a simple application based on a real-world use case: automating the handling of credit card disputes.
We’ll use Red Hat® Process Automation Manager, a leading business process management (BPM) platform. Bring your laptop (no software installation required), and you’ll see how to get started with process modeling, decision modeling, and deploying your finished application to the cloud.
• How to create models of business processes and decisions using standard notations such as BPMN.
• How to convert models into fully working applications with Red Hat Process Automation Manager.
Myriam Fentanes, Principal technical marketing manager, Business Automation, Red Hat
Phil Simpson, Senior principal product marketing manager, Red Hat
Kireeti Valicherla, Paul CarleyOct 22 20199:00 amUTC45 mins
Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, InformaticaOct 22 20195:00 pmUTC30 mins
Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, MellanoxOct 22 20195:00 pmUTC75 mins
Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?
Watch this SNIA webcast to learn:
•How software-defined storage differs from integrated storage appliances
•Whether SDS supports block, file, object, or all three types of storage access
•Potential issues or pitfalls with deploying SDS
•How SDS affects storage networking
•Scale-up vs. scale-out vs. hyperconverged vs. cloud
Global networking needs of enterprises have shifted dramatically. It is no longer just about having a static and eminently fair and stable network infrastructure of manually configured routers and deterministic - yet static - MPLS.
The new digital enterprise model demands an underlying global network that is easy to consume, agile to react to business needs and simple to manage. Hence enterprises have turned to SD-WAN with alternative direct internet access (DIA) site-to-site connectivity that augments and replaces MPLS for business-critical applications.
Join us as we discuss:
>> How Teradyne leverages private and public internet connectivity to deliver an optimal application experience for all stakeholders
>> New, recently-released built-in technologies that enable Ayaka to deliver on the needs of WAN transformation for digital enterprises
>> What’s in it for network managers as they drive a Netops approach for their enterprises
>> How to deliver on ‘internet-first’ approaches connectivity, tracking the ‘cloud-first’ approach for applications
David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet SpillaneOct 22 20195:00 pmUTC60 mins
This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
Kate Holthouse, Sr. Value Engineer at SynitiOct 22 20193:00 pmUTC60 mins
The demonstration will focus on Syniti's SAP Solution Extension – SAP's Advanced Data Migration. You will see how to transform your project by streamlining the migration using an agile methodology in a web-based platform. This solution provides a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your SAP S/4HANA migration.
Tafi Makamure, Technical EngineerOct 23 20199:00 amUTC45 mins
One of the key obstacles in accelerating adoption of the cloud is ensuring the compliance and security posture of workloads in new cloud environments. Learn how to gain visibility and secure your workloads in modern hybrid or multi-cloud environments.
Join us for an introduction to Cisco Meraki and our cloud-managed IT products, including wireless APs, security appliances, switches, cameras, and EMM. You'll learn how cloud management offers greater reliability, easier management, and a lower TCO - and we'll show you a demo of the exciting features in the Cisco Meraki dashboard.
John Burke, CIO and Principal Research Analyst, Nemertes ResearchOct 23 20195:00 pmUTC60 mins
Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud
Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.
We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).
This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
Dr. Ritesh Mukherjee, Vice President of Product Management at 128 Technology with Dino Farinacci and Shawn ZandiOct 23 20195:00 pmUTC60 mins
The imminent advent of 5G, virtual reality (VR), connected cars, Internet of Things (IoT), and smart devices has moved us into the Experience Age. Consumers are now more informed and discriminating than ever before. Network deployments must mirror the adaptive and connected qualities of end users to succeed. In this webinar/panel discussion we will get perspective from network industry stalwarts on what features and functions networks must possess to create and deliver exceptional user experiences. It is time to reinvent the digital future to deliver exceptional user experiences.
David Elmaleh, Product Manager, Imperva and Andrew Shoemaker, Founder & CEO, NimbusDDOSOct 23 20195:00 pmUTC60 mins
Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live layer 7 DDoS attack which showcases how these attacks can be the most difficult to mitigate, and get a closer look at real-world DDoS incidents where threat preparedness was overlooked. Plus, you will learn how to investigate and understand the components of a DDoS attack so that when – not if – a DDoS attack hits, you’re prepared to answer any questions that come your way.
Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance StrategyOct 23 20196:00 pmUTC39 mins
For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
Tyler Moffitt, Sr. Threat Research Analyst, WebrootOct 23 201911:30 pmUTC45 mins
The year 2018 and the first half of 2019 saw a significant number of major events showcasing cyber-criminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.
Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.
In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.
We hope you can join us for this live, educational session.
Joel Vilaca | Cisco MerakiOct 24 20199:00 amUTC53 mins
Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer Wireless-Access Points, Security Devices und Features, Switches, Mobile Device Management und Überwachungskameras.
Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden.
Thomas Poppelgaard, Christiaan BrinkhoffOct 24 20192:00 pmUTC44 mins
Performance is always key for the end user, whether it’s on-premises, hybrid, or public cloud workloads. If your environment faces performance issues, you’ll be pleasantly surprised by the same performance when you move to the cloud. What is the most cost-effective sizing for your virtual machines to get the best performance? Are GPU workloads still relevant? What about WAN optimizers for cloud workloads, such as the HDX Enlightened Data Transport (EDT) protocol and Citrix SD-WAN? During this session, Citrix Technology Professionals (CTPs) will walk you through best practices gathered while deploying workloads on several clouds in addition to Citrix Cloud. Join this session to learn the fundamentals, gain insights into Citrix Virtual Apps and Desktop workloads, and ultimately get prepared to work on your first or second date towards Citrix Cloud services.
Chuck Petrie & Peter HaagensonNov 21 20194:00 pmUTC60 mins
Join Blue Medora experts, Chuck Petrie & Peter Haagenson, as they discuss the benefits of building a single view for end-to-end monitoring of your healthcare environment. Learn how monitoring Epic alongside the rest of your IT environment can increase reliability, improve productivity and lower cost of ownership.
Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoftOct 24 20195:00 pmUTC42 mins
Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.
Watch this webinar with a Veeva Vault Connector demo to learn how to:
- Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
- Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
- Deliver omnichannel customer interactions with integrated customer data and digital asset management.