Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • A Year In Review - 2018 Disaster Landscape
    A Year In Review - 2018 Disaster Landscape
    Oliver Lomer, Senior Marketing Manager - Sungard AS Recorded: May 24 2019 17 mins
    When people think of disasters that disrupt business operations they often think of the extreme – major weather incidents, cyber-attacks or terrorist incidents for example – but are these really the main causes of disruption? Should businesses be focused on other threats to their operations? In this webinar Oliver Lomer dives into Sungard AS’ invocation statistics from 2018 to uncover the truth of the Disaster Landscape.
  • Big Data Fabric: Datenintegration und -Zugriff in Echtzeit
    Big Data Fabric: Datenintegration und -Zugriff in Echtzeit
    Thomas Niewel, Technical Sales Director bei Denodo Recorded: May 24 2019 31 mins
    Eine kürzlich veröffentlichte Studie von Forrester unterstreicht die Notwendigkeit einer integrierten Infrastruktur - dem "Fabric" - zur Unterstützung von Big Data.

    In der rasanten Entwicklung von Data Lakes und anderen Big Data Architekturen müssen Unternehmen jedoch darüber nachdenken, wie sie ihre Big Data Repositorien sinnvoll verwalten, um ihren Benutzern einen schnellen und einfachen Zugriff zu ermöglichen ohne Datensilos zu kreieren.

    Und genau hier kommt das Big Data Fabric ins Spiel:

    - Big Data Fabrics liefern mit minimalem Aufwand aussagekräftige Informationen,
    - Bieten End-to-End Sicherheit für die gesamte Unternehmensplattform,
    - Ermöglichen Echtzeit Datenintegration und Self-Service Funktionen für Business User
  • Automating Application Delivery across Hybrid Multi-Cloud
    Automating Application Delivery across Hybrid Multi-Cloud
    Blake Connell, Director of Product Marketing at Citrix & Ken Ross, Director Product Management at Citrix Recorded: May 23 2019 47 mins
    As applications move into the cloud from traditional data centers, they are not only moving to one but multiple clouds, diversity is king to prevent lock-in. They are also living in a hybrid fashion leaving some components on premises while others move to the cloud. This new reality requires a strategic solution to maintain control. This webinar provides solution to the challenges faces with visibility, management, and insight. How do I ensure the security of my applications? Where can we improve performance? How do control updates? You will leave this session prepared to confidently move your applications to the cloud but do it with a solid strategy.
  • Making the shift to unified endpoint management for workforce agility
    Making the shift to unified endpoint management for workforce agility
    Suzanne Dickson, Senior Director, Product Marketing, Citrix and Frank Srp, Senior Manager, Technical Marketing, Citrix Recorded: May 23 2019 62 mins
    Increasingly, more companies have recognized that unified endpoint management (UEM) is a critical component of their overall digital transformation as UEM allows for greater workforce agility.

    By managing all your users, devices, apps, and data from a single platform, Citrix helps you maximize user and IT productivity while helping to secure your information and reduce costs.

    In this webinar, you will learn how to:
    - Modernize Windows 10 management
    - Manage Windows 7, Windows 10, iOS, Android, ChromeOS, macOS and iOT endpoints from a single platform
    - Simplify and improve users’ onboarding experience
    - Provide users a consistent, secure approach to access all their apps (virtual, mobile, web, SaaS, native Windows) and data regardless of the device, network or location
    Leverage user-centric analytics that correlates device, application, network and data access information to proactively prevent security threats


    Suzanne Dickson, Senior Director, Product Marketing, Citrix
    Frank Srp, Senior Manager, Technical Marketing, Citrix
  • The CISO's Role in Technology Decisions
    The CISO's Role in Technology Decisions
    Scott King, Senior Director of Advisory Services at Rapid7 Recorded: May 23 2019 60 mins
    Every security leader runs into this challenge at multiple points in their career. How can you support your team and their technology needs, while ensuring alignment with the business and not overreaching to make vendor selections? This issue can easily put security leaders at odds with their teams charged with engineering and operating the technology that manages risk and enables the protection of company data and systems.

    Join Rapid7’s Scott King for an interactive webcast where he will share his personal experiences as the security leader for one of America’s largest energy companies and how he navigated these potentially treacherous waters.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: May 23 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • How to Defend HTTP/HTTPS Applications from DDoS Attacks
    How to Defend HTTP/HTTPS Applications from DDoS Attacks
    Rich Groves and Don Shin, A10 Networks Recorded: May 23 2019 62 mins
    DDoS attacks against encrypted web and application-based services continue to skirt traditional volumetric-focused DDoS defenses.

    To distinguish real users from malicious bots, organizations must implement a layered defense that provides full attack spectrum protection with minimal exposure of private data for HTTP and HTTPS services.

    Join our webinar to learn best practices to ensure your users have unfettered access to the applications that drive your business.

    In this webinar you will learn:

    • HTTP and HTTPS attack techniques
    • How layered DDoS and application security pipelines can achieve DDoS resilience
    • Mitigation strategies that prevent collateral damage against real users
    • Techniques that minimize the expense of decrypting attack traffic

    Featured presenters:
    Rich Groves, Director of Research and Development, A10 Networks
    Don Shin, Sr. Product Marketing Manager, A10 Networks
  • Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Marc Mombourquette and Michael Carcerano, Dell EMC Recorded: May 23 2019 50 mins
    Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400

    Existing data protection solutions targeted at the mid-size orgs sacrifice comprehensive coverage, efficiency, and support in the name of simplicity. The IDPA DP4400, including the new 8-24TB option, delivers a converged data protection solution that is the perfect mix of simplicity and power for SMB organizations and remote office/branch office (ROBO) environments. In addition, it offers the lowest cost-to-protect and is guaranteed under the Future-Proof Loyalty program.

    In this webinar, you’ll learn how Dell EMC’s IDPA DP4400 is not only receiving plaudits from industry experts, but also winning the trust of new and existing customers. According to IDC, both IDPA revenue and unit shipments have grown by more than 10x from 2017 to 2018 with an annual run rate exceeding $100 million in just six quarters in the market.

    The IDPA DP4400 is a turnkey data protection appliance tailor-made for mid-size organizations. It offers complete backup, deduplication, replication, recovery, search & analytics, system management—plus, cloud readiness with disaster recovery and long-term retention to the cloud—all in a convenient 2U appliance.

    Come learn how your organization can benefit from all that IDPA DP4400 has to offer.


    Presented by:
    Marc Mombourquette - Product Marketing, Dell EMC
    Michael Carcerano – Product Management, Dell EMC
  • NNT ITSM Integration for Cherwell
    NNT ITSM Integration for Cherwell
    Mark Kedgley Recorded: May 23 2019 6 mins
    NNT has integrated its award-winning Change Tracker ™ Gen7R2 with Cherwell's leading service management framework to enable a closed-loop environment for change management. Approved and authorized changes issued by Cherwell can be validated by NNT Change Tracker Gen7 R2, with a full audit trail of what actually changed and reconciled with the Change Request(s).

    By leveraging NNT’s Closed-Loop Intelligent Change Control Technology, repeated or recurring change patterns can be captured and identified as either harmless or potentially harmful as well, discriminating pre-approved changes from unexpected and unwanted changes. Pre-approved changes may also be forensically profiled ahead of time in order to spot any deviations that may indicate ‘insider threats’.

    This approach drastically improves the ability to spot potential breaches by reducing the “change noise”
    and exposing insider and zero-day malware activity. This approach also helps enable SecureOps.
  • What’s New in RabbitMQ 3.8?
    What’s New in RabbitMQ 3.8?
    Michael Klishin, RabbitMQ Software Engineer, and Karl Nilsson, RabbitMQ Software Engineer Recorded: May 23 2019 64 mins
    Recent releases of RabbitMQ have made the most popular open-source message broker even more rock solid. The team has made it easier to deploy and easier to operate from Day 2 on. As a de facto standard for message-based architectures, this is great news for teams building microservices and other distributed applications.

    But let’s face it: not everyone is running the latest version and taking advantage of these new stability and operational features. Now the next major version (3.8) is shipping and it has some breakthrough features for reliability and scaling. Are you ready?

    Join Pivotal’s Michael Klishin and Karl Nilsson, RabbitMQ Software Engineers, as they share what’s new in RabbitMQ 3.8. You’ll learn:

    ● How making RabbitMQ persistent and fault tolerant is evolving from mirrored queues to quorum queues
    ● What mixed-version clusters are and how they simplify upgrades
    ● How RabbitMQ 3.8 continues to make deploying and operating RabbitMQ easier
    ● What’s available in terms of OAuth 2.0 support, monitoring improvements, and more
    ● What features are in development for future versions and minor releases

    We look forward to you joining us.
  • Embedded Reporting 101
    Embedded Reporting 101
    Scott Anderson, Senior Solutions Consultant Shane Swiderek, Product Marketing Manager Recorded: May 23 2019 55 mins
    Guiding principles for adding reporting to your application

    This webinar will examine the fundamental methods and considerations to start an embedded reporting project. Most importantly, it will help you answer the tough questions that are critical to ensure your project’s success.

    Topics covered:

    -What type of reporting do you need? (static, interactive, and/or self-service reporting)
    -What level of embedding do you need? (separate reporting portal, an in-application reporting tab, or a fully embedded, inline reporting solution)
    -How do you deploy embedded reporting within your application? (best practices for shared security and access permissions, performance & load balancing, data architecture, and more)
  • Customer Briefing: Aerospike Client Services Overview
    Customer Briefing: Aerospike Client Services Overview
    Tom Meese, Director of Client Services Recorded: May 23 2019 38 mins
    Aerospike Client Services is a new suite of professional services, including a new highly innovative virtual and on-site training program - Aerospike Academy. Aerospike Client Services are designed to reduce friction and accelerate the time to value of putting applications built on the Aerospike database into a high scale production environment.

    Join us on May 23th at 10am PT to hear from Aerospike Director of Client services, Tom Meese, who will cover:
    -The Aerospike Client Services strategy
    -Service Packages for New Customers
    -Service Packages for Existing Customers
    -Aerospike Academy
    -How the Services packages can accelerate the deployment of Aerospike databases in large scale enterprise environments
  • Migrating to the Cloud Safely & Securely - Imperva Part 3
    Migrating to the Cloud Safely & Securely - Imperva Part 3
    Shawn Ryan, Sr. Product Marketing Manager, Imperva; Brandon Dunlap (Moderator) Recorded: May 23 2019 58 mins
    Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
  • Top 5 Best Practices for Automating Invoice Processing
    Top 5 Best Practices for Automating Invoice Processing
    Jim Maguire, ASG & Eric Howse, Zia Consulting Recorded: May 23 2019 61 mins
    Organizations continue to struggle with manual invoice processing, exception handling and data validation. The majority of invoices are still processed as “paper,” regardless of whether they arrive as printed or electronic versions such as PDFs or Word documents. Yet studies have shown that companies with automated invoice processing spend up to four times less per invoice.

    Whether it’s the paper cost or people cost, missed supplier discounts or late payment penalties, the savings can be significant for companies of all sizes. So, what does a best-in-practice solution really include?

    Join this webinar to learn how to:
    - Automate invoice processing from any source, in any form
    - Automatically handle exceptions
    - View your invoice status and KPIs in real time with end to end analytics
    - Integrate with SAP and store all documents in a modern content services platform, on premises or in a hybrid environment
  • GDPR One Year Later
    GDPR One Year Later
    Ilias Chantzos, Sr. Director, Government Affairs, Symantec and Ramses Gallego, Strategist, Symantec Recorded: May 23 2019 61 mins
    The General Data Protection Regulation (GDPR) has been in effect since last year. The GDPR places a number of onerous cybersecurity and data breach notification obligations for organizations globally with strong enforcement powers for the data protection authorities.

    Compliance with GDPR remains as challenging with today’s threat landscape making the risk of data breach bigger than ever. Join us as we bring together global Chief Information Security Officers to discuss, what's happened in the year since GDPR launched.

    Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance.

    We’ll also discuss the latest insights in these key areas:

    •. The latest GDPR guidance from data protection authorities on breach notifications.

    •. How is enforcement happening and the link between data protection and operational security

    •. Processing of personal data – Challenges posed by different data categories and the risks posed by shadow IT.

    •. Data Transfer requirements and how the regulatory environment is shaping

    Please Join Us, Register Today
  • Right Tool for the Job: Using Qubole Presto for Interactive and Ad-Hoc Queries
    Right Tool for the Job: Using Qubole Presto for Interactive and Ad-Hoc Queries
    Goden Yao, Product Manager at Qubole Recorded: May 23 2019 58 mins
    Presto is the go-to query engine of Qubole customers for interactive and reporting use cases due to its excellent performance and ability to join unstructured and structured data in seconds. Many Qubole customers use Presto along with their favorite BI tools, such as PowerBI, Looker and Tableau to explore data and run queries.

    Two key criteria to look for in a query engine for interactive analytics are performance and cost. You want best-in-class performance to meet the short deadlines of interactive workloads, while reducing and/or controlling costs.

    Qubole Presto is a cloud-optimized version of open source Presto, with enhancements that improve performance, reliability and cost. In this webinar, we’ll cover:

    - When to use Presto versus other engines like Apache Spark
    - How to enable self-service access to your data lake
    - The key advantages of Qubole Presto over Open Source Presto
    - Live demo of running interactive and ad hoc queries using Qubole Presto
    - How customers like iBotta, Tivo and Return Path leverage Qubole Presto
  • Scaling Cloud Forensics & Incident Response with OSQuery
    Scaling Cloud Forensics & Incident Response with OSQuery
    Sohini Mukherjee, Security Analyst & Andres Martinson, Sr. Security Engineer, Adobe Recorded: May 23 2019 50 mins
    An enterprise has a diverse environment (cloud instances, servers, workstations) in which to try and detect potential security incidents. The ability of an incident response team to work quickly and at necessary scale is imperative when incidents do unfortunately occur. After an initial compromise, attackers often move laterally in an environment, trying to establish a foothold and escalate privileges. While they try to remain stealthy, they almost always leave behind footprints. Detecting and analyzing these footprints quickly and accurately to scope the issue is critical.

    This webcast will explore a scalable approach developed by the Adobe security team that relies on open source tools like OSQuery. The goal was to develop techniques that can be leveraged to more quickly and easily investigate large groups infrastructure components for initial triage, basic forensic analysis, and to also help proactively detect threats. Attendees will learn about the techniques we developed that they can then go apply to their own environments to help with their incident response efforts in the cloud.
  • Salesforce and MuleSoft: Unlock your back office with Sales Cloud
    Salesforce and MuleSoft: Unlock your back office with Sales Cloud
    Christine Ooley, Product Marketing Manager at MuleSoft and Jimil Patel, Technical Product Marketing Manager at MuleSoft Recorded: May 23 2019 48 mins
    What if you could streamline and automate your business processes and modernize workflows like quote to cash and order fulfillment?

    In this webinar, learn how MuleSoft Anypoint Platform connects Sales Cloud to applications like SAP, Oracle, and NetSuite, allowing you to manage your complete business by unlocking your back office data through integration.

    Watch this webinar to:
    - See a live MuleSoft Flow designer demo of an order-to-cash cycle with Sales Cloud
    - Learn how to integrate Sales Cloud with back-office applications like SAP, Oracle, and NetSuite
    - Understand best practices to modernize and automate processes like quote to cash and order fulfillment
    - Hear about real-life MuleSoft customers transforming their business with Sales Cloud and ERP integration
  • Design Your Hybrid Cloud for the Customer or Fail
    Design Your Hybrid Cloud for the Customer or Fail
    Cameron Wyatt and Ian Tewksbury Recorded: May 23 2019 51 mins
    The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.

    In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.

    We'll cover:

    •How to build your cloud incrementally to accommodate future fixes and enhancements.
    •Why you need to consider your existing policies and procedures when defining your new cloud experience.
    •How to iteratively design and implement a successful hybrid cloud experience.

    Featuring:
    Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
    and
    Ian Tewksbury Consulting Architect, Red Hat Consulting, Red Hat
  • Live Tutorial: Optimize Cloud Costs with CloudCheckr
    Live Tutorial: Optimize Cloud Costs with CloudCheckr
    Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: May 23 2019 23 mins
    The promise of Cloud Computing is ideal... pay for what you use, and not a penny more. The reality is that you pay for what you order, whether you use it or not. Gartner estimates that enterprises overspend on the cloud by as much as 70%. Many times, they use Data Center mentality in the cloud, or they don't take advantage of long-term commitment discounts, or they have users who turn on services and forget about them.

    In this live tutorial, we will demonstrate how CloudCheckr can help reduce costs, often by 30% or more, by identifying idle, unused and unattached resources and through Right Sizing and purchase recommendations for reserved instances.

    CloudCheckr is a robust Cloud Management Platform that, in addition to Cost Optimization, provides Security & Compliance, Automation, and Invoicing capabilities. Look for our other tutorials on those topics.
  • What You Can’t See CAN Hurt You: Enhanced SSL Visibility
    What You Can’t See CAN Hurt You: Enhanced SSL Visibility
    Charlie Winckless, Presidio; Christian Clasen, Cisco Security; Douglas Hurd, Cisco Firepower; Kevin Stewart, F5 Networks Recorded: May 23 2019 53 mins
    How F5 Augments Your Cisco Security with Enhanced SSL Visibility

    Presidio, Cisco, and F5 will present on a combined solution for enhancing the security you already have with your Firepower and WSA deployments by providing enhanced SSL offload with F5’s SSL Orchestrator solution. The Webcast will cover use cases, advantages, and additional benefits that you can realize with the deployment of SSL Orchestrator in your network environment.
  • Gap Analysis Measures the Effectiveness of Your Email Security
    Gap Analysis Measures the Effectiveness of Your Email Security
    Stuart Grierson, Lead Senior Solutions Engineer and Duncan Mills, Product Marketing Director Recorded: May 23 2019 48 mins
    Whether you use Office 365, a cloud email security service or an on-premises gateway, you should periodically test its effectiveness. This will allow you to quantify how much malware, phishing and spam is evading your email security and getting through to your users.
    Cyren has developed an Email Security Gap Analysis assessment to measure how well a company’s in-place security is performing. Aggregated data on results from assessments done in 2018 have been published and this webinar will review findings in that report, including:
    • Key statistics
    • Case studies and segmented industry data
    • Example emails and threats uncovered during assessments (appropriately anonymized)
    You will also find out how to have your own gap analysis done free of charge.
  • 5G Orchestration and Network Management
    5G Orchestration and Network Management
    Babak Jafarian, PhD Recorded: May 23 2019 66 mins
    While traditional mobile networks have been built relying on a “monolithic” hardware designed and manufactured by distinct vendor and distinct technology requirements, 5G and future mobile network solution are going to be multi-vendor, multi-technology and multi-layer. This webinar describes the new concepts of network management and orchestration based on the introduction of SDN and NFV into operational networks. Also, considering heterogenous network deployment, provides an outlook for the new paradigm when deploying 5G networks. The main sections are as follow:
    •The main enablers for achieving network management and orchestration goals of 5G networks
    •Complexity derived from multi-technology and heterogenous network scenarios; including densification and how to address them
    •Insight about 5G automated network management and its requirements
  • Getting more from Azure Part 1: Virtual Machines
    Getting more from Azure Part 1: Virtual Machines
    John Noakes and James Wilson Recorded: May 23 2019 19 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    This webinar shares best practice for operating, managing and securing virtual machines through the Azure platform.

    Please visit uk.insight.com/azurewebinars to learn how Insight can help you optimise your Azure workloads or to speak to your Insight Account Manager today.
  • Endpoint Security with Dell Technologies
    Endpoint Security with Dell Technologies
    CJ Breaux - Systems Engineer, Dell EMC May 24 2019 5:00 pm UTC 60 mins
    On average, it takes an organization 108 days to detect a security breach. Endpoint security solutions must work with the way employees work today. They not only need to do the job of protecting data and preventing threats, but they should also enable worker productivity – not hinder it. Join us to learn how you can prevent, detect, and respond to threats faster and more efficiently with Dell SafeGuard and Response.
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer May 27 2019 8:00 am UTC 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Machine Learning & Artificial Intelligence: Behind the Buzz Words
    Machine Learning & Artificial Intelligence: Behind the Buzz Words
    Edwin Yuen, Anne McCarthy, Stephen Luedtke May 28 2019 4:00 am UTC 31 mins
    Artificial intelligence and machine learning are the latest buzz words – but what does it actually mean to you and what should you do about it? Watch this webinar to hear ESG analyst Edwin Yuen and our Splunk experts discuss:

    ● AI & ML trends
    ● Benefits of leveraging AI & ML
    ● Barriers to adoption and how to overcome them
    ● AI & ML approaches – what’s right for you?
  • La Data Intelligence contribue au succès de l’entreprise digitale
    La Data Intelligence contribue au succès de l’entreprise digitale
    Alain Bueno, Sales Specialist, Data Intelligence, ASG Technologies May 28 2019 7:30 am UTC 60 mins
    A l’ère du digital, la stratégie des entreprises est intrinsèquement liée aux données. Pourtant, les volumes, la diversité et la vélocité des données en constante augmentation constituent un défi permanent en matière de stratégies de gestion des données. Les entreprises doivent faire face à un double défi : satisfaire les besoins opérationnels (de type défensif) et répondre aux enjeux stratégiques (de type offensif). Lors de ce webinar, vous découvrirez l’état de l’art de la gestion des données et l’impact des tendances clés sur les offres ASG Data Intelligence.
  • Transformation digitale : Sécuriser l’expérience phygitale des visiteurs
    Transformation digitale : Sécuriser l’expérience phygitale des visiteurs
    Mélissa Lafitte (Cloudi-Fi) & Ivan Rogissart (Zscaler) May 28 2019 9:00 am UTC 60 mins
    Plus qu’un accès rapide et sécurisé à Internet, offrez de la valeur à vos visiteurs grâce au partenariat innovant entre Cloudi-Fi et Zscaler.

    Zscaler et la pertinence du modèle pour le retail

    • Pertinence du modèle Cloud Security pour le vertical Retail

    • Evolution des infrastructures Retail vers Zero Trust pour les Shops/Stores

    • Présentation de l’écosystème Zscaler

    Cloudi-Fi et la phygitalisation des points de vente à travers le smartphone

    • Introduction au Phygital

    • Réinventer le WiFi pour offrir une expérience omnicanale réussie

    • Présentation de la technologie Cloudi-Fi

    Rejoignez-nous pour ce webinaire de 45 minutes, qui vous permettra de découvrir comment les solutions conjuguées de Zscaler et Cloudi-Fi peuvent vous aider à améliorer et sécuriser l’expérience phygitale de vos clients.

    Ce webinaire sera présenté par Mélissa Lafitte (Cloudi-Fi) et Ivan Rogissart (Zscaler)
  • Intel and Maguay introduce Intel DCM for HPC Clusters
    Intel and Maguay introduce Intel DCM for HPC Clusters
    Ofer Lior, EMEA Business Development Manager and Dror Shenkar, Chief Architect May 28 2019 9:00 am UTC 60 mins
    In this webinar, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO.

    We will demonstrate some of the benefits of Intel® DCM managing your HPC Cluster:

    • Collects real-time accurate power and thermal consumption data that gives you the insights needed to manage your HPC clusters power usage and hotspots.
    • Monitors granular sub-component failure analysis and out of band real-time utilization data (CPU, disk, and memory). It reduces MTTR, increases uptime, and predictive component-level health management.
    • Intel® DCM SDK can be integrated into HPC job scheduler to optimize power performance while scheduling jobs in the HPC environment.
    • And more.
  • Is browser isolation the new ‘sandbox’ for security?
    Is browser isolation the new ‘sandbox’ for security?
    Brett Raybould, Solutions Architect, Menlo Security May 28 2019 9:00 am UTC 60 mins
    Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.

    Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Join us and Menlo Security to learn:
    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution
  • The Rise of Targeted Cyberattacks against SMBs and MSPs
    The Rise of Targeted Cyberattacks against SMBs and MSPs
    Kelvin Murray, Sr. Threat Research Analyst, Webroot May 28 2019 10:00 am UTC 60 mins
    Cybercriminals have long targeted MSPs, but in 2019 this trend reached worrying proportions.

    Learn about the key targeted cyberattacks MSPs have been facing this year and how best to protect your business—and your clients—from the damage they can cause.
  • Zero Trust & Securing Multicloud Environments
    Zero Trust & Securing Multicloud Environments
    Neil Briscoe - CTO Cloud Gateway May 28 2019 1:00 pm UTC 60 mins
    As the evolution of cloud technologies and providers jostle for position in their respective USPs, many enterprises are opening their eyes to multicloud to leverage the best-of-breed to cover all aspects of their business and IT needs. Along with this, we tend to create a trust boundary between either (a) the cloud and the user on the internet (b) the cloud and users on the enterprise network in hybrid architectures. But what about the inter-cloud security considerations, potential threats, disparate support teams and governance? In this session, we discuss some real-life scenarios, potential issues and solutions.
  • What's New with Service Virtualization 10.5?
    What's New with Service Virtualization 10.5?
    Koustubh Warty and Jeffrey Hughes May 28 2019 3:00 pm UTC 60 mins
    Service Virtualization is releasing version 10.5 with exciting new features including a huge focus on Developers - enabling the ease of use with Enhanced APIs, the New Eclipse Plugin, SVAsCode and the Jenkins Plugin. In addition, we have significantly enhanced our docker implementation to support Kubernetes, new database support for PostgreSQL and last but not the least customer driven reporting enhancements. These new features, along with others, will help your testing teams adopt and improve their Continuous Testing journey with the eventual goal of Digital Transformation. Join Jeff Hughes and Koustubh Warty for a complete discussion and demonstration of the latest features of SV 10.5.
  • 5 imperatives required to get to mission faster
    5 imperatives required to get to mission faster
    Brian Shimkaveg Account Manager in Intelligence Middleware, Red Hat May 28 2019 3:00 pm UTC 22 mins
    A key competitive advantage of the U.S. Intelligence Community (IC) is the use of powerful, innovative mission applications delivered to analysts on reliable and robust technology platforms. Unfortunately, legacy systems and processes may hinder their ability to adapt quickly to new threats and build capabilities to accommodate unknown future threats critical to our nation's security. This webinar will highlight 5 imperatives the IC must adopt including modern application development methodologies that will help transform its IT and compete with its adversaries.

    Red Hat has a unique understanding of the IC given our global customer reach and on-site security-cleared associates. Red Hat® software helps customers create and sustain thousands of enterprise applications critical to businesses, institutions, and governments.

    Join this webinar where we’ll cover:

    - Establishing and enact high standards
    - Rethinking acquisition and operations and maintenance (O&M)
    - Respecting the dev, trusting the ops
    - Getting modern stay modern
    - Owning your outcome
  • Architecting and delivering the operationally resilient bank
    Architecting and delivering the operationally resilient bank
    Gary Richardson, MD, Emerging Technology, 6point6 ; Aaron Regis, Solutions Engineer, DataStax May 28 2019 3:00 pm UTC 60 mins
    Building on the FCA/PRA discussion paper of July 2018, operational resiliency is now one of the 5 key priorities for the UK regulators for 2019/2020 as published in their annual business plans on 17 April 2019.

    "Technology is integral to the delivery of financial products and services. It is evolving more rapidly than ever before, bringing significant benefits for consumers, market participants and the wider economy. The disruption from technology outages and cyber-attacks is an ongoing challenge and cyber-enabled fraud is a focus of the Government’s economic crime reform agenda. The potential for harm is increased by complex and ageing IT systems, increasing use of third-party service providers and complexity of changes to systems and processes. " - FCA Business Plan 2019/2020

    Join 6point6 and DataStax as we explore how architecting and delivering the operationally resilient bank can be achieved by focusing on architecting and designing for failure, legacy workload offloading onto modern resilient data fabrics and adopting a multi cloud hybrid approach delivers value for the bank and ultimately benefits customers.

    Presenters:

    Gary Richardson, MD, Emerging Technology, 6point6
    With over 17 years’ of consulting experience, Gary leads a team of data scientists and data engineers in the agile development of Blockchain, AI and Machine Learning solutions. The focus of the team is bringing a collaborative approach to analytics, underpinned by machine learning and data engineering. He believes mainstream business adoption of AI solutions are the key to accelerating innovation enabling businesses to compete, reduce cost and ensure compliance.

    Aaron Regis, Solution Architect, DataStax
    Aaron previously worked as a Solutions Engineer in the Cyber Threat Analytics space and as a Technical Consultant implementing Financial Crime Detection software in the Financial Services sector. He is passionate about technology particularly Database technology.
  • GDPR: Data breach prevention & mitigation - Lessons learned in the past year
    GDPR: Data breach prevention & mitigation - Lessons learned in the past year
    Istvan Lám, CEO, Tresorit & Daniele Catteddu, CTO, Cloud Security Alliance May 28 2019 4:00 pm UTC 60 mins
    Organizations in and outside the EU had to take significant measures to revisit the way they stored, shared and processed personal data in preparation to the entry into force of the General Data Protection Regulation (GDPR) on 25 May last year. However, compliance with the GDPR is not a tick box activity, it requires continuous evaluation of data flows in and outside the company.

    This webinar brings together Daniele Catteddu, Chief Technology Officer of the Cloud Security Alliance (CSA) and Istvan Lám, CEO of Cloud encryption company, Tresorit to discuss the key learnings since the GDPR entered into force with focus on data breach prevention and mitigation.

    The speakers will reflect, in particular, on the following aspects:
    - Key learnings from data breach notifications & fines imposed so far
    - Best practices for breach detection and reporting
    - Challenges regarding the assessment of the severity of personal data breaches
    - The most common types of data breaches and how to mitigate their impact
    - Assessment of real-case data breaches, determination of what went wrong, and discussion on the implications for compliance with the GDPR going forward
  • Enabling Next Generation Patient Care with a Mobile First Network
    Enabling Next Generation Patient Care with a Mobile First Network
    Tim Vanevenhoven (Aruba), Jake Dorst (CIO, Tahoe Forest Health System) May 28 2019 5:00 pm UTC 60 mins
    Join us May 28th, 10am PDT to hear Tahoe Forest Health System CIO, Jake Dorst, share how they have worked with Aruba to strengthen their IT network infrastructure and save money with the goal of improving patient care. Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Enterprise-Grade Security for Containerized Applications with Red Hat & Aporeto
    Enterprise-Grade Security for Containerized Applications with Red Hat & Aporeto
    Jason Dobies & Marcus Hesse May 28 2019 5:00 pm UTC 60 mins
    How to Accelerate Business Agility with Zero Trust Security Posture

    Kubernetes-orchestrated microservices and containers is a boon for business agility. By enabling a more agile and distributed software architecture, Kubernetes allows businesses to release new features and capabilities faster than ever before. Red Hat OpenShift is the enterprise choice for a supported Kubernetes release.

    Distributed software architectures require a new approach to security. Aporeto secures all workloads on any infrastructure with identity-based access control, making it the enterprise choice for visualizing and protecting Kubernetes-orchestrated applications on hybrid infrastructures.

    Together, Red Hat OpenShift and Aporeto Identity-Powered Cloud Security enable organizations to achieve greater agility while implementing a Zero Trust security posture.

    Join this webinar to learn:
    - Security benefits of using Aporeto in Red Hat OpenShift
    - Benefits of adding open ID connect (OIDC) to any web service with Aporeto
    - Understanding the future of Red Hat OpenShift 4

    Speakers:
    Jason Dobies, Red Hat
    Jason has 18+ years of experience as a software engineer,12 of those being his time at Red Hat. He is currently working as a Principal Technical Marketing Manager on the Cloud Platforms team where he provides direction and technical advice for applications integrating with OpenShift. Prior to that, Jason's experience includes being a core contributor on multiple OpenStack projects and leading the Red Hat Satellite content management project.

    Marcus Hesse, Aporeto
    Marcus is an Open Source and Security Enthusiast, and a DevOps Engineer with 15 years of experience. Before joining Aporeto as a Principal Engineer, and driving forward the Kubernetes and Layer 7 development and integration efforts, he worked in FinTech, helping to modernize application deployments. As a previous Aporeto customer, he knows Aporeto can be paramount to achieve security and compliance in Kubernetes environments.
  • Customer Service Today: How ServiceNow is Revolutionizing Customer Experience
    Customer Service Today: How ServiceNow is Revolutionizing Customer Experience
    Ajay Gautam, Richard Norton, Meghan Lockwood May 28 2019 5:00 pm UTC 60 mins
    On Tuesday, May 28th, CSM Practice Lead, Ajay Gautam, and ServiceNow Architect, Richard Norton, are teaming up for a ServiceNow Customer Service Webinar to teach you how to revolutionize your customer experience.

    - Find out what your customers are looking for
    - Learn about customer frustrations (and how to prevent them) plus the customer journey and business drivers
    - Get insight on how ServiceNow CSM can help you
    - Review a handful of CSM use cases we see with our clients
  • Application Traffic Visibility - What You Can’t See Can Cost You
    Application Traffic Visibility - What You Can’t See Can Cost You
    Almas Raza, Product Marketing, A10 Networks May 28 2019 6:00 pm UTC 60 mins
    Apps are spanning across on-premises to multi-cloud. The path to digital transformation will enable organizations of all sizes to compete by using the right technology to drive innovation and time-to-market. The freedom to run applications on-premises and in multi-cloud can provide flexibility, simplify enterprise IT infrastructure, reduce cost and deploy innovative solutions that drive growth. But it also can have unique challenges.

    In this 45-minute webinar, you will learn:

    * Why traffic visibility plays a critical role in application delivery
    * The challenges in gaining deep insights into highly distribute applications on-premises and in multi-cloud
    * How visibility helps you secure your application, increase operational efficiency, and reduce administrative workload
  • Java Serialization: A Practical Exploitation Guide
    Java Serialization: A Practical Exploitation Guide
    Tod Beardsley, Research Director at Rapid7 and Jon Hart, Principal Security Researcher at Rapid7 May 28 2019 6:00 pm UTC 48 mins
    Java Serialized Objects (JSOs) are a mechanism to allow for data exchange between Java services. Because they also give attackers a stable and reliable vector for gaining remote control of systems running Java applications, they are increasingly responsible for vulnerabilities and public exploits against internet-accessible services. Join Tod and Jon as they discuss the exposure of Java Serialized Objects and the recent uptick in vulnerability research around JSO exploitation, culminating in Rapid7’s most recent research report, Java Serialization: A Practical Exploitation Guide.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem May 28 2019 6:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Bob Laliberte, Senior Analyst at ESG Inc. and Michael Leonard, Project Marketing at VeloCloud, now part of VMware May 29 2019 1:00 am UTC 60 mins
    For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.

    Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
  • 제로 트러스트 시대, 웹 보안의 新 패러다임 시만텍 웹 위협 격리 (Web Isolation)
    제로 트러스트 시대, 웹 보안의 新 패러다임 시만텍 웹 위협 격리 (Web Isolation)
    고재훈 부장, 시만텍코리아 SE본부 May 29 2019 5:00 am UTC 60 mins
    디지털 트랜스포메이션(Digital Transformation)이 기업 혁신의 화두가 된 오늘 날, 웹은 비즈니스 활동에 핵심적인요소로 자리잡고 있으며 이를 노린 웹 공격 또한 점점 더 지능화되고 있습니다.

    글로벌 사이버 보안 분야를 선도하는 시만텍은 이와 같은 흐름에 발맞춰 새로운 보안 과제로 떠오르고 있는 웹 보안관리 전략에 새로운 방향점을 제시하고자 합니다.

    이에 이번 웨비나에서는 최근 주목받고 있는 웹 위협 격리 기술에 대한 소개와 격리 기술이 주는 기술적인 혜택 및 웹 필터 기능과의 연동을 통한 시너지 효과를 소개하고자 합니다.
    웨비나에 참석하시어 시만텍의 웹 위협 격리 기술을 통해 웹 보안을 더 정교하고 스마트하게 제어함과 동시에 사용자의 웹 경험을 헤치지 않는 기술 구현을 확인해 보시기 바랍니다.

    감사합니다.
  • UC Network Monitoring & Troubleshooting
    UC Network Monitoring & Troubleshooting
    Alex Bahar, Senior Solutions Engineer May 29 2019 7:00 am UTC 60 mins
    APAC Timezone Webinar
  • Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Bob Laliberte, Senior Analyst at ESG Inc. and Michael Leonard, Product Marketing Manager May 29 2019 8:00 am UTC 60 mins
    For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.

    Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
  • Preparing for your journey to the Cloud – Assessment to Business Case.
    Preparing for your journey to the Cloud – Assessment to Business Case.
    Tim Lawrence, UKCloud & Mark Melvin, Shaping Cloud May 29 2019 10:00 am UTC 60 mins
    So you’ve decided you’d like to reap the benefits of Data Centre Modernisation, reducing costs, increasing your operational agility and spending more time focusing on your core business. But you may be left wondering what you need to do, what approaches you can take and some of the key pitfalls to avoid.

    Without a coherent plan, your use of cloud is tactical and piecemeal. It’s difficult to keep control of these new cloud services whilst also keeping your existing IT afloat. In effect things are getting worse and you need them to get better.

    That’s why here at UKCloud we have our Professional Services team – a handpicked group of our experienced multi-cloud experts who can make the process of creating a pragmatic, business-led and coherent cloud adoption plan a breeze.

    Learn more by registering for our upcoming webinar, hosted by Cloud Transformation expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud, will guide you through this process and help you begin your transformation journey with confidence.

    Agenda

    *How cloud is not the answer to everything.
    *Why the strategy and business case are critical to get the outcome you are looking for.
    *Customer Case Study.
    *An overview of how cloud assessments are performed.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE May 29 2019 10:00 am UTC 45 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.