Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Recorded: Feb 23 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Varun Santosh, Manager, Technical Marketing at VeloCloud Networks Recorded: Feb 23 2017 27 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Live 60 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • How Smartsheet operationalized Apache Spark with Databricks How Smartsheet operationalized Apache Spark with Databricks Francis Lau, Senior Director, Product Intelligence at Smartsheet Live 60 mins
    Apache Spark is red hot, but without the compulsory skillsets, it can be a challenge to operationalize — making it difficult to build a robust production data pipeline that business users and data scientists across your company can use to unearth insights.

    Smartsheet is the world’s leading SaaS platform for managing and automating collaborative work. With over 90,000 companies and millions of users, it helps teams get work done ranging from managing simple task lists to orchestrating the largest sporting events and construction projects.

    In this webinar, you will learn how Smartsheet uses Databricks to overcome the complexities of Spark to build their own analysis platform that enables self-service insights at will, scale, and speed to better understand their customers’ diverse use cases. They will share valuable patterns and lessons learned in both technical and adoption areas to show how they achieved this, including:

    How to build a robust metadata-driven data pipeline that processes application and business systems data to provide a 360 view of customers and to drive smarter business systems integrations.
    How to provide an intuitive and valuable “pyramid” of datasets usable by both technical and business users.
    Their roll-out approach and materials used for company-wide adoption allowing users to go from zero to insights with Spark and Databricks in minutes.
  • Reduce the Complexity of OpenStack Neutron Reduce the Complexity of OpenStack Neutron Charlie Gutierrez - Midokura, Frank Rego - SUSE Recorded: Feb 23 2017 60 mins
    Midokura’s award-winning Midokura Enterprise Management (MEM) technology provides a software layer directly within existing physical network hardware, turning physical machines into a virtual platform that can scale to hundreds of thousands of virtual ports. The MidoNet integration with SUSE OpenStack Cloud provides an integrated solution for rapid OpenStack deployment. Now, customers can enjoy the very best possible deployment experience with leading technology from Midokura and SUSE, built to scale right out of the box.
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap Live 75 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • Evaluating Skype for Business Evaluating Skype for Business John Hand - Global Microsoft Alliance Director | Dave Bottomley - UC Solutions Engineer Recorded: Feb 23 2017 62 mins
    Skype for Business is transforming the UC landscape, but how can organizations effectively evaluate Microsoft's UC offering? This session will look at the key steps to make an effective evaluation of Skype for Business.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic Recorded: Feb 23 2017 57 mins
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • Cyberangriffe verhindern - sensible Daten schützen Cyberangriffe verhindern - sensible Daten schützen Thomas Hemker, Matthias Senft Recorded: Feb 23 2017 59 mins
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Thomas Corvaisier (Greenspector), Frédéric Croisson (Deloitte), Karen Robinson (Save@Work) Recorded: Feb 23 2017 64 mins
    The 4th ICTFOOTPRINT free webinar has crucial information on ICT Calculation tools and Sustainable ICT insights on energy savings, on 23rd February 2017, 15:00 CET.

    Thomas Corvaisier (CEO of GREENSPECTOR) will introduce the concept of software eco-design, and tell us how it may help lowering the consumption of IT resources while preserving performance and user experience.

    Frédéric Croisson, from Deloitte Sustainability, will showcase the ICTFOOTPRINT.eu Self-Assessment Tool for Services (SAT-S), a useful, quick and easy-to-use tool that calculates the carbon footprint of your ICT services. The tool helps users not only to make informed decisions about how to make an ICT service sustainable, but also discover the impact of ICT devices & activities in terms of Green House Gas emissions and primary energy consumption. (SAT-S will be launched very soon).

    Karen Robinson will share some sustainable ICT practices and introduce the save@work initiative, which encourages public sector employee’s to come together in teams to reduce the energy consumption of their building by making small changes to their everyday energy consuming behaviours. Adding an element of competition to the project has been a significant driver in encouraging teams to really examine and challenge those unconscious energy consuming behaviours. The scale of working in a large office has also highlighted those practices that on their own seem to make almost insignificant savings but when applied across an office of over 300 people, have a very different impact.

    The webinar will be moderated by Silvana Muscella, Project Coordinator of ICTFOOTPRINT.eu and CEO of Trust-IT Services. Silvana has a broad experience in ICT sector, focusing on high-level strategy building, the delivery of multichannel platforms, business acquisition & development & strategic marketing for international clients.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 55 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Best Practices for Combining DevOps, Cloud and IaaS on Azure Best Practices for Combining DevOps, Cloud and IaaS on Azure David Hansford, Technical Solutions Professional, Microsoft Recorded: Feb 22 2017 37 mins
    In today's day and age, it's more important than ever to work at the forefront of cutting edge cloud technologies and continue to inspire and empower your IT organizations.

    Microsoft Azure IaaS (Infrastructure-as-a-Service) empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

    Join this webcast to learn how to:
    - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
    - Develop cutting edge “born in the cloud” applications
    - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment
  • SQL Server 2016: Just a Few of Our DBA's Favorite Things SQL Server 2016: Just a Few of Our DBA's Favorite Things Rodney Landrum, Consulting Services Manager, Ntirety Recorded: Feb 22 2017 59 mins
    Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates his favorite new features of the latest Microsoft SQL Server 2016 Service Pack 1.

    During the webinar, Rodney will touch on the following:

    • A demo of his favorite new features in SQL Server 2016 and SP1 including:
    o Query Store
    o Database Cloning
    o Dynamic Data Masking
    o Create or Alter
    • A review of Enterprise features that are now available in standard edition
    • New information in Dynamic Management Views and SQL Error Log that will make your DBAs job easier.
  • Four Ways to Simplify Database Management Four Ways to Simplify Database Management Mike Kelly, CTO SelectStar Recorded: Feb 22 2017 27 mins
    If there’s anything as important as making sure an app is running, it’s making sure the data underneath it is available as well. But the rapid changes in database technology and the quick adoption of cloud infrastructure have made that task extremely challenging for most database administrators and DevOps teams.

    In just 30 minutes, you'll learn:

    - How to monitor all database types (including SQL, NoSQL, cloud) in a single tool

    - How to get up to speed quickly on new database technologies without adding experts to your team

    - The fastest way to get an assessment of your organization’s overall database health

    - Simple tools that will drastically reduce the time you spend on database and infrastructure administration
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Recorded: Feb 22 2017 34 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • The Data Warehouse in the Age of Digital Transformation The Data Warehouse in the Age of Digital Transformation Neil Raden, Principal Analyst, Hired Brains Research Recorded: Feb 22 2017 50 mins
    In the past years of Big Data and digital transformation “euphoria”, Hadoop and Spark received most of the attention as platforms for large-scale data management and analytics. Data warehouses based on relational database technology, for a variety of reasons, came under scrutiny as perhaps no longer needed.

    However, if there is anything users have learned recently it’s that the mission of data warehouses is as vital as ever. Cost and operational deficiencies can be overcome with a combination of cloud computing and open source software, and by leveraging the same economics of traditional big data projects - scale-up and scale-out at commodity pricing.

    In this webinar, Neil Raden from Hired Brains Research makes the case that an evolved data warehouse implementation continues to play a vital role in the enterprise, providing unique business value that actually aids digital transformation. Attendees will learn:

    - How the role of the data warehouse has evolved over time
    - Why Hadoop and Spark are not replacements for the data warehouse
    - How the data warehouse supports digital transformation initiatives
    - Real-life examples of data warehousing in digital transformation scenarios
    - Advice and best practices for evolving your own data warehouse practice
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Recorded: Feb 22 2017 61 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Recorded: Feb 22 2017 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Recorded: Feb 22 2017 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud John Meadows - Talligent, Frank Rego - SUSE Recorded: Feb 22 2017 36 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Recorded: Feb 22 2017 36 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Real World IoT – Practical Advice from the Front Lines of IoT Implementation Real World IoT – Practical Advice from the Front Lines of IoT Implementation Christian Renaud Recorded: Feb 22 2017 32 mins
    Christian Renaud, Research Director, Internet of Things, discusses the vertical and horizontal approaches to the Internet of Things, the state of IoT deployments, 2016 IoT M&A, and a preview of what to expect at the upcoming Real World IoT event, 5-6 April at the Landmark London.