Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Turn Your Data Center into Your Very Own Public Cloud Turn Your Data Center into Your Very Own Public Cloud Sanjay Jagad, Sr. Manager, Product Marketing, Cohodata; Suzy Visvanathan, Director, Product Management, Cohodata Live 60 mins
    Companies are actively looking to transform their highly virtualized data center into a dynamic on-premise private cloud that offers the same benefits as the public cloud. Today’s dedicated infrastructure offerings fail to address the growing demands and higher service levels needed for today’s applications. They lack the advanced capabilities like elastic scale, flexibility, management automation, and usage-based tracking to deliver IT as a Service (ITaaS) for their tenants. A modern dynamic data center necessitates the need for a modern software-defined infrastructure. An infrastructure that can be dynamically provisioned across a pool of compute, network and storage resources, thus reducing and eliminating the planning and complexity associated with application sizing, provides much more flexibility and allows for future proofing and investment protection.
    For companies considering whether or not to use the public cloud versus staying with or building their own data center, there are three primary factors affecting their decision: business needs, data security and total cost of operations (CAPEX/OPEX).
  • Containers: Best Practices and Data Management Services Containers: Best Practices and Data Management Services Keith Hudgins, Tech Alliances, Docker, Andrew Sullivan, Tech Marketing Engineer, NetApp, Alex McDonald, Chair SNIA-CSI Live 75 mins
    Now that you have become acquainted with basic container technologies and the associated storage challenges in supporting applications running within containers in production; let’s take a deeper dive into what differentiates this technology from what you are used to with virtual machines. Containers can both complement virtual machines and also replace them as they promise the ability to scale exponentially higher. They can easily be ported from one physical server to another or to one platform—such as on-premise—to another—such as public cloud providers like Amazon AWS. In this Webcast, we’ll explore “container best practices” that discuss how to address the various challenges around networking, security and logging. We’ll also look at what types of applications more easily lend themselves to a microservice architecture versus which applications may require additional investment to refactor/re-architect to take advantage of microservices.
  • How to Prepare for the Greatest Security Threats of 2017 How to Prepare for the Greatest Security Threats of 2017 Michael Landewe, Co-Founder, Avanan Cloud Security Live 60 mins
    2016 has been a milestone year for SaaS security threats, with a 3x increase in phishing attacks, 6x increase in email malware, and a 5x increase in ransomware attacks in the first half of the year alone. Why the sudden spike? What will the greatest SaaS security threats be in 2017? And most importantly, how can you best prepare for the threats that you'll face next year? Join this informative and educational web presentation to learn how to deploy a multi-vendor, defense-in-depth approach to protect all your SaaS applications from the greatest threats in the coming year. Whether SaaS email protection, SaaS file sharing and data leakage, compliance risk or protection from compromised credentials, you'll enter the new year with all the knowledge you need to make informed decisions about SaaS security.
  • 2017 Vulnerability Trends - What To Look Out For 2017 Vulnerability Trends - What To Look Out For Kasper Lindgaard, Director of Secunia Research at Flexera Software Recorded: Dec 7 2016 37 mins
    Year after year some of the trends for vulnerabilities remain unchanged while others arise or shift. In this webinar, Kasper Lindgaard, Director of Secunia Research at Flexera Software will discuss some of the most relevant topics in the year so far, as observed by his team of vulnerability research experts. Take-aways from this session:

    - Vulnerabilities on niche software are also making headlines
    - The ever growing risk of embedded applications
    - Why you should not neglect less common applications
  • The Threat Landscape – A Year in Review and a Look at What is Ahead The Threat Landscape – A Year in Review and a Look at What is Ahead Kevin Haley, Director Security Response, Symantec Recorded: Dec 7 2016 41 mins
    Once again it's been a bad year for computer security. But while we are focused on the increased threats of IoT devices as the year comes to an end, a lot of other significant security events and malware threats appeared all through the year. And they all have significance for next year.

    This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
  • How do you determine the economic value of your data? How do you determine the economic value of your data? Bill Schmarzo, CTO, Dell EMC Services Big Data Recorded: Dec 7 2016 49 mins
    Organizations struggle to answer this simple question: How effective is my organization at leveraging data and analytics to power my business? My presentation will provide a benchmark that organizations can use to address that question. Plus we’ll talk about how organizations can become more effective at exploiting the economic nature of data to optimize key business processes, uncover new monetization opportunities, and create a more engaging customer experience.
  • From the intelligence driven datacenter to an intelligence driven business From the intelligence driven datacenter to an intelligence driven business Matt Davies, Head of Marketing EMEA, Splunk, & Sebastian Darrington, EMEA Director, Big Data & Analytics Solutions, Dell EMC Recorded: Dec 7 2016 49 mins
    Leveraging Big Data and Analytics to create actionable insights.

    Splunk & Dell EMC will share insights into the challenges & opportunities customers are seeing in the market – with the ‘needs to’; reduce costs and improve efficiency within IT (operational analytics), improve Compliance (security analytics) & implement Shadow IT due to the business not receiving the right service from IT. CIO Priority is keeping the lights on and so on…

    Dell EMC & Splunk combined strengths are helping numerous organizations to ‘leverage Big Data and Analytics to create actionable insights’.
  • Caught in the Net: Effective Defence Against Phishing Attacks Caught in the Net: Effective Defence Against Phishing Attacks Greg Maudsley, Senior Director Product Marketing, Menlo Security Recorded: Dec 7 2016 56 mins
    Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.

    Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    Join this webinar to learn:
    · New phishing prevention techniques
    · How to stop ransomware, malware and drive-by-exploits enabled by email phishing
    · Updated security research findings
    · Real-life case studies for using isolation techniques to prevent phishing attacks

    Speaker Bio:
    Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
  • Silver Peak 2017 Crystal Ball Predictions (EMEA Version) Silver Peak 2017 Crystal Ball Predictions (EMEA Version) David Hughes, Founder and CEO Recorded: Dec 7 2016 39 mins
    Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball 2017 Predictions Webinar. David will share his predictions for 2017 along with insights on emerging trends that will shape the future of the networking industry.

    Attend this webinar and learn about:
    • Emerging trends that will shift your approach to networking
    • Revolutionary technologies that will enable WANs to autonomously connect users to applications
    • How end-user requirements are shaping the way SD-WANs are delivered
    • Creating a smart 2017 WAN strategy for your organization

    Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade. Register Today!
  • The Threat Landscape – Cybersecurity Trends in 2016 and Beyond The Threat Landscape – Cybersecurity Trends in 2016 and Beyond Sian John (Chief Strategist) - Symantec Recorded: Dec 7 2016 45 mins
    We’re starting to see the refining of techniques that have been built over a number of years. The past 5 years have been dominated by ransomware and economic espionage. While they haven’t gone away, cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have also started to become a part of the political landscape which has been particularly evident during US election where we have seen them being used for subversive purposes.

    This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
  • Il panorama delle minacce-retrospettiva sull'ultimo anno e uno sguardo al futuro Il panorama delle minacce-retrospettiva sull'ultimo anno e uno sguardo al futuro Antonio Forzieri, Global Cyber Lead Recorded: Dec 7 2016 53 mins
    Anche quest’anno la sicurezza informatica ha subito duri attacchi. L'attenzione verso le minacce che mirano ai dispositivi IoT è alta, ma nel corso dell'anno ci sono stati numerosi altri eventi negativi per la sicurezza e si sono diffusi nuovi malware. Tutto questo avrà ripercussioni sull’anno che sta per cominciare.

    Questo webcast riesamina il panorama delle minacce 2016 considerando anche tutto ciò che è importante ricordare mentre avanziamo verso il 2017.

    Registrati subito.
  • El panorama de las amenazas-Resumen del año y un vistazo a lo que está por venir El panorama de las amenazas-Resumen del año y un vistazo a lo que está por venir Ramsés Gallego - Symantec Strategist Recorded: Dec 7 2016 62 mins
    Por desgracia, el 2016 ha sido otro mal año para la seguridad informática. Si bien nuestro enfoque se centró en el aumento de las amenazas para los dispositivos del Internet de las cosas, a lo largo del año aparecieron diferentes amenazas de malware y varios eventos importantes en materia de seguridad. Todo esto tendrá una gran relevancia en el próximo año.

    Nuestro webcast analizará el panorama de las amenazas en 2016 y se centrará en los aspectos a recordar ante la llegada del 2017.

    Inscríbase ahora.
  • Adding Intelligence to Investigations (Focus on data breach investigations) Adding Intelligence to Investigations (Focus on data breach investigations) Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response Recorded: Dec 7 2016 61 mins
    Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

    Key takeaways:
    1. Understand the basic principles required to understand your data
    2. See how leveraging intelligence can get you to the answer faster
    3. Extract hidden links and relationships with analytics

    Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

    Presenters:
    - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
    - John Douglas, Technical Director, First Response

    Moderator:
    SC Leung, CISSP, CCSP, CISA, CBCP;
    Member, Asia-Pacific Advisory Council, (ISC)²
  • The Secrets of Staying Ahead of the Bad Guys The Secrets of Staying Ahead of the Bad Guys Smrithi Konanur, Global Product Manager at HPE Security & Priyank Kumar, Sr. Product Management at HPE Security Recorded: Dec 6 2016 64 mins
    With continued improvements in payments security through technologies such as P2PE and EMV, the PCI community has been effective at combating crime in a wide variety of traditional retail environments. As the use of stolen or fraudulent cards for in-person transactions becomes more difficult, however, criminals are increasingly shifting their focus to online activities, and the rapidly growing mobile payment sector. To stay ahead of the bad guys, merchants need solutions that are designed to reliably protect payment data within their environment, and reduce PCI scope without impacting business processes.

    Join this webinar to learn why any business that wants to remove sensitive data from their databases should understand these strategies on how they can eliminate exposure to cardholder data, reduce risks and PCI audit costs. You will learn:

    •How the threat landscape is evolving
    •What the attackers are doing differently
    •How to stay ahead of cyber thieves, while neutralizing the risk of payment data breaches
    •What is necessary to secure all e-commerce and mobile transactions
    •How to enable innovation and business growth while maintaining strong data protection
  • Getting More Out of vRealize Orchestrator: Introduction to vRealize Orchestrator Getting More Out of vRealize Orchestrator: Introduction to vRealize Orchestrator David D'Entremont Cloud Management Specialist Systems Engineer, VMware Recorded: Dec 6 2016 63 mins
    In this session, VMware Cloud Specialists will demonstrate how to quickly install and configure VMware vRealize Orchestrator, explain its basic features and capabilities, and show you how to create and run automated, configurable processes. Other topics will include:

    - Backing up the appliance
    - Managing workflows
    - Understanding policies and packages

    Join us to learn how to more effectively utilize VMware vRealize solutions to quickly get the most value from your VMware investment.
  • IoT Standardization and Implementation Challenges IoT Standardization and Implementation Challenges Professor Ahmed Banafa, College of Engineering, San Jose State University Recorded: Dec 6 2016 62 mins
    The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions. Additionally, large amounts of funding are being deployed at IoT startups. Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions. In current model, most IoT solution providers have been building all components of the stack, from the hardware devices to the relevant cloud services or as they would like to name it as “IoT solutions”, as a result, there is a lack of consistency and standards across the cloud services used by the different IoT solutions.

    As the industry evolves, the need for a standard model to perform common IoT backend tasks, such as processing, storage, and firmware updates, is becoming more relevant. In that new model, we are likely to see different IoT solutions work with common backend services, which will guarantee levels of interoperability, portability, and manageability that are almost impossible to achieve with the current generation of IoT solutions.

    Join Ahmed Banafa, Professor at SJSU and named as the "number one tech voice to follow" on LinkedIn, in this engaging and informative all-about-IoT webinar!
  • Silver Peak 2017 Crystal Ball Predictions Silver Peak 2017 Crystal Ball Predictions David Hughes, Founder and CEO Recorded: Dec 6 2016 39 mins
    Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball 2017 Predictions Webinar. David will share his predictions for 2017 along with insights on emerging trends that will shape the future of the networking industry.

    Attend this webinar and learn about:
    • Emerging trends that will shift your approach to networking
    • Revolutionary technologies that will enable WANs to autonomously connect users to applications
    • How end-user requirements are shaping the way SD-WANs are delivered
    • Creating a smart 2017 WAN strategy for your organization

    Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade. Register Today!
  • Maximize Microsoft Storage Performance on All-Flash NVMe Next-Gen Infrastructure Maximize Microsoft Storage Performance on All-Flash NVMe Next-Gen Infrastructure Supermicro; Subodh Bhargava, Program Manager of Storage Spaces, Microsoft; Vivek SarathyStorage Solution Architect, Intel Recorded: Dec 6 2016 61 mins
    How can All-Flash NVMe systems address your storage challenges? Get the latest details on the emerging All-Flash products and technologies from Supermicro and Intel. See the configurations and performance details for leading software defined storage solutions from Microsoft on All-Flash NVMe accelerated platform. Learn how to work with Supermicro and Intel on a custom assessment or proof of concept of All-Flash NVMe Next Generation systems. Accelerate your transition to a higher performance, more efficient and cost effective next generation storage architecture today.
  • Consolidating & Modernizing Your Oracle Environment Consolidating & Modernizing Your Oracle Environment Dion Harris Recorded: Dec 6 2016 39 mins
    Databases are continuing to grow rapidly, creating scalability and performance challenges and escalating costs. Learn how Dell EMC all-flash storage standardizes your databases and applications on a modern, consolidated platform, manages copy data efficiently and accelerates your time to market.
  • Infrastructure & Licensing Considerations for Hyperconverged Technologies Infrastructure & Licensing Considerations for Hyperconverged Technologies Nathan Biggs; House of Brick Technologies, CEO & Sam Lucido; Dell EMC, Director of Technical Marketing Recorded: Dec 6 2016 55 mins
    Advances in technology now have IT organizations evaluating hyper-converged solutions in lieu of building systems. Hyper-converged solutions integrate computers, networking, virtualization, flash storage, and management in one platform that accelerates deployment. In this session, we evaluate each component layer of these new hyper-converged technologies per the Oracle contract, with an eye to reducing rather than increasing database licensing quantities. Attending this session will give IT organizations a clear roadmap for managing database licensing, and offer next steps if additional resources are needed. DBAs and others attending this session will gain knowledge regarding how to apply licensing guidelines on hyper-converged platforms.
  • Containers vs. virtualization: The new Cold War? Containers vs. virtualization: The new Cold War? Senior Principal Software Engineer, Red Hat Recorded: Dec 6 2016 16 mins
    In this video, we’ll compare and contrast virtualization and container technologies, using Red Hat Enterprise Linux Atomic Host and Red Hat Enterprise Virtualization as our examples. We’ll detail a use-case map based on current and predicted feature sets of these technologies. You’ll see how, for many use cases, virtualization and container technologies often complement each other, leading to better performance, resilience, and flexibility.
  • The Right Transformation Model for European Businesses in 2017 The Right Transformation Model for European Businesses in 2017 Alexander Michael and Neil Kapoor, NetSuite Recorded: Dec 6 2016 52 mins
    Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.

    A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
  • Introducing New Generation of Flash-Enabled Data Domain Systems Introducing New Generation of Flash-Enabled Data Domain Systems Syed Saleem & Maciej Mianowski Recorded: Dec 6 2016 60 mins
    The new generation of Dell EMC Data Domain, the industry’s leading protection storage, has been designed to meet the challenges of the modern data centers, like big data, cloud and virtualization. Join our webinar to learn how the transformed Data Domain systems can help you modernize your data protection strategy.
  • BroadView Instrumentation Enabled Closed Control Loop In CORD BroadView Instrumentation Enabled Closed Control Loop In CORD Tom Tofigh, Architect, AT&T; Bhaskar Chinni, Principal PLM, Broadcom Dec 7 2016 6:30 pm UTC 60 mins
    “Central Office Re-architected as a Datacenter (CORD)” is a new design of a telco central office that replaces closed and proprietary hardware with software running on commodity servers, switches, and access devices. Analytics-CORD is an environment that provides tools for applications to program or actuate target probe primitives such as Broadcom based network switches. 

    BroadView Instrumentation is a software suite that enables advanced network analytics in a platform agnostic manner. BroadView Instrumentation provides deep observability of switches and network fabric in A-CORD environment. 

    In this webinar, we will discuss CORD architecture, A-CORD framework and how BroadView Agent integrated w/ A-CORD enables closed feedback loop in service provider networks. We will further discuss how BroadView Agent supports A-CORD use cases such as network level packet trace profile, end-to-end latency computation for real-time traffic, micro-burst detection and scalable monitoring of network fabric to prevent congestion.
  • No IT security staff? No problem. Learn how to outsource your network security No IT security staff? No problem. Learn how to outsource your network security Dan Sell Dec 7 2016 7:00 pm UTC 45 mins
    Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
    Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:

    •Meet all network security needs
    •Reduce management time
    •Eliminate upfront capital investment
    •Utilize subscription pricing for a predictable operating expense model
    •Gain valuable network reporting and expert insight
    •Have a network security professional manage it all
  • How to Build a Hybrid Cloud with AWS and VMware vSphere How to Build a Hybrid Cloud with AWS and VMware vSphere Brian Cha, Solutions Architect, SoftNAS Dec 7 2016 8:00 pm UTC 60 mins
    Gartner predicts hybrid clouds will be the most common cloud architecture by 2020. With AWS and VMware vSphere, companies have the ability to create a hybrid cloud architecture with ease. But what is the optimal storage architecture for a hybrid cloud? What’s the best way to build it? How do you guarantee your data will be highly-available and protected?

    This webinar will answer those questions. Specifically, we will cover:

    -Hybrid cloud architecture with AWS and vSphere
    -Use Cases: backup, disaster recovery and more
    -Demo: Learn how to replicate storage across vSphere and AWS
    -Common management interface across on-premises vSphere and AWS deployments

    **The first 100 attendees to register during the live webinar will receive a FREE $100 Amazon Web Services credit!**


    Presenters:
    Brian Cha, Solutions Architect, SoftNAS
  • Exploit Kits Don't Stop, Neither Should Your Business. Exploit Kits Don't Stop, Neither Should Your Business. Proofpoint Dec 8 2016 12:30 am UTC 60 mins
    Exploit kits don’t stop. Neither should your business with CERT Australia.

    Ransomware has one goal: to get your money. It locks away files until payment is made.
    Webinar invitation: December 8th at 11:30am AEST

    Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

    •Ransomware evolution
    •Why ransomware is surging
    •Where it comes from
    •How are actors bypassing common security controls
    •Should you pay or not? What to consider
    •CERT recommended migrations
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro Dec 8 2016 3:00 am UTC 60 mins
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Le paysage des menaces–Point sur l'année écoulée & sur ce qui nous attend demain Le paysage des menaces–Point sur l'année écoulée & sur ce qui nous attend demain Hervé Doreau, Directeur Technique – Symantec France Dec 8 2016 10:00 am UTC 60 mins
    Nous venons de vivre, une fois de plus, une année déplorable en termes de sécurité informatique. Mais bien que l'attention se concentre aujourd'hui sur les menaces toujours plus nombreuses pour les appareils IoT, l'année a été marquée par bien d'autres événements majeurs en matière de sécurité et d'attaques de malware. Et tous resteront des enjeux d'importance pour l'année à venir.

    Ce webcast passera en revue le paysage des menaces en 2016 en insistant sur les points à retenir pour 2017.

    Inscrivez-vous maintenant.
  • JLL – An Informatica Cloud Customer Journey JLL – An Informatica Cloud Customer Journey Phil Turton, Cloud Sales Lead, Informatica UK&I Dec 8 2016 11:00 am UTC 30 mins
    Learn why global real-estate business JLL chose to roll-out Informatica Cloud across their EMEA business. What was the first need that drove the purchase? What have they learned from the experience? Where do they intend to take the implementation next? Join Andy Crow, EMEA IT Development and Delivery Director as he explains his experience working with Informatica.
  • Die Bedrohungslandschaft – Rückschau auf das Jahr und ein Blick in die Zukunft Die Bedrohungslandschaft – Rückschau auf das Jahr und ein Blick in die Zukunft Thomas Hemker & Candid Wueest – Symantec Security Specialist Dec 8 2016 2:00 pm UTC 60 mins
    Wieder einmal war es ein schlechtes Jahr für Computersicherheit. Doch obwohl wir uns jetzt zum Jahresende verstärkt mit der erhöhten Gefahr durch IoT-Geräte beschäftigen, gab es im vergangenen Jahr eine Vielzahl anderer signifikanter Sicherheitsvorfälle und Malware-Bedrohungen. Und sie alle haben eine Bedeutung für das kommende Jahr.

    Dieser Webcast hält eine Rückschau auf die Bedrohungslandschaft 2016 – mit Schwerpunkt auf den Dingen, die wir für 2017 im Gedächtnis behalten sollten.

    Jetzt anmelden.
  • Converged Operations: Maximize the potential of Hyper-Converged Architecture Converged Operations: Maximize the potential of Hyper-Converged Architecture Eitan Segal, Global Architect, Dell EMC Dec 8 2016 2:00 pm UTC 45 mins
    Hyper converged infrastructure is starting to become the new norm in the IT space as customers are seeking for a solution which will help them solve the three main challenges; cost reduction, providing agility to the business and simplify datacenter operations.

    As we all know, technology alone cannot provide the full solution to the problem, that is why a new mode of operations is the key to maximize the full potential of a technology like; Hyper Converge.

    In our session, we will discuss:
    1. The new mode of operations?
    2. What are the main benefits while adopting new team structures and new processes
    3. Where to start
  • Introducing the Latest Release of Symantec Advanced Threat Protection: Email Introducing the Latest Release of Symantec Advanced Threat Protection: Email Jane Wong,Product Management,Gateway Security Group,Symantec & Nirav Shah, Email Security Product Marketing Manager, Symantec Dec 8 2016 4:00 pm UTC 30 mins
    Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks

    Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.

    Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:

    - How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.


    Register Today
  • Data Powers Ryder’s Journey to Cloud with Amazon Redshift Data Powers Ryder’s Journey to Cloud with Amazon Redshift Kamal Srinivasan, Director of DI, Ryder; Debashis Biswas, DI Lead, Ryder; Ann Rosen, Product Marketing, Informatica Dec 8 2016 5:00 pm UTC 60 mins
    Trucks bearing the Ryder logo likely pass you by every day. Ryder is relied upon, by over 50,000 customers and more than half of Fortune 500 companies, to manage their critical fleet, transportation and supply chain, with outstanding on-time delivery rate. Needless to say, data is the critical fuel for Ryder’s overall operations. Pun intended.

    Informatica will be hosting Ryder to discuss their journey to cloud with Amazon Web Services (AWS) and Amazon Redshift and the critical role data management plays in Ryder’s strategic cloud initiatives. In this webinar, we will discuss:

    - Cloud journey business drivers
    - Data management challenges across cloud sources such as Salesforce.com and AWS and and traditional on-premise data systems
    - Common hybrid cloud data management scenarios with Amazon Redshift
    - Best practices in hybrid cloud data management
  • Smarter Cybersecurity™ solutions start with next-gen protection Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Dec 8 2016 6:00 pm UTC 45 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc., & Mike Heberling, HEAT Software Dec 8 2016 6:00 pm UTC 60 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers
  • Re:Invent Re:Cap Re:Invent Re:Cap Mark Nunnikhoven, Vice President of Cloud Technology, Trend Micro Dec 8 2016 6:00 pm UTC 60 mins
    re:Invent 2016 was a whirlwind of announcements and new possibilities. AWS unleashed a torrent of new functionality across all 50+ services. Join leading cloud expert, Mark Nunnikhoven, as he reviews the highlights of the show, unearths the hidden gems, and discusses how these new features could impact your approach to security in the AWS Cloud.
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Hadeel Dabbaugh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator) Dec 8 2016 6:00 pm UTC 75 mins
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Dec 8 2016 7:00 pm UTC 45 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • Deploy & Manage a Modern Data Platform on Microsoft Azure Deploy & Manage a Modern Data Platform on Microsoft Azure Jennifer Wu, Director of Product Management, Cloudera and Daniel Karuppiah Director of Product Marketing Microsoft Dec 8 2016 7:00 pm UTC 60 mins
    Discover the new platform within the enterprise! The emergence of Big Data has driven the need for a new data platform within the enterprise.

    Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.

    Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.

    Join this webcast to:
    - See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
    - Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
    - Review common use cases for Cloudera on Azure
    - Discover customer benefits and success stories
    - Learn how to deploy and start recognizing value with Cloudera on Azure

    This webinar is part of the ‘8-part Azure Open Source’ webinar series dedicated to discussing various open source solutions available on Azure, to ensure you're successful with your Linux-based applications provided by our trusted partners like Cloudera, Datastax, Cloudbees, SUSE, Pivotal, and more.

    This webcast is part of our Realize more benefits with open source on Azure webcast series. Sign up for this session, or the entire series today!
  • How Viable is Google ColdLine Cloud Storage? How Viable is Google ColdLine Cloud Storage? Curtis Preston, Storage Switzerland Dec 8 2016 7:30 pm UTC 60 mins
    Google has recently announced expansion of their cloud storage service. It offers similar service levels as Amazon S-3 and Glacier, but with simplified pricing. How viable is their cloud storage product for the average customer? How do their service levels compare to Amazon and Azure service levels? What about pricing? Is it really that different? And what are some example use cases?

    Other questions center around applications that support these offerings. If an application supports Amazon, will it be easy for them to support Google? Is there anything about Google cloud storage that makes it easier or harder for service providers to work with them?
  • Simplifying Container Management with Habitat Simplifying Container Management with Habitat Ian Henry, Habitat Community Manager & Michael Ducy, Director of Product Marketing Dec 9 2016 6:00 pm UTC 60 mins
    Containers provide a delightful development experience. It’s easy to download a container image and get started writing code. But it’s a different story when you have to run containers in production at scale. That’s when all the hidden complexities become apparent and the real challenges begin. What tools are you going to use to build, deploy, run, and manage your containerized applications? How are you going to manage difference between environments like staging and production with a fleet of immutable objects? How will you effectively scale containerized applications once you’ve deployed them?

    Habitat, our open-source project for application automation, simplifies container management by packaging applications in a compact, atomic, and easily auditable format that makes it easier to deploy your application on various container runtimes. Once your applications are deployed, the Habitat supervisor simplifies the complexities of running in production environments with built-in abstractions for functions typically handled by external tooling, such as dynamic scaling and rolling updates.

    Join Ian Henry and Michael Ducy on Friday, December 9th at 10:00 AM PT, to learn how Habitat makes building, deploying, and running your applications in containers simple, no matter how complex the production environment.

    Join us to learn:
    - Why automation is critical to deploying in a containerized world and how - Habitat provides the minimum viable automation.
    - Why a strong container build system is important, and how the Habitat studio provides that system.
    - Why Habitat is the easiest way to build and run containers at scale, no matter the underlying container architecture.

    Who should attend:
    - Anyone new to containers
    - Anyone challenged by running containers in production at scale
  • Dev and Test Better in the Cloud Dev and Test Better in the Cloud Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Dec 9 2016 7:00 pm UTC 60 mins
    Support your IT and applications team better than ever!

    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Todd Kirk, Manager of Product Development, Brainstorm, Inc. Dec 9 2016 9:00 pm UTC 60 mins
    File sharing and cloud storage are quickly becoming commonplace in the modern business. However, it can be difficult to know when to use one tool over another and what advantages each provides. Moreover, technology is evolving quickly and keeping up to date on the latest and greatest can be extremely time-consuming for many professionals.

    Join us for a few minutes to find out how to take your productivity to the next level, and become a file, sync, and share Office all-star with OneDrive for Business Next Generation Synchronization and SharePoint 2016’s wide array of new cloud collaboration tools.

    In this webcast your will learn:
    - When and why to use particular tools for file sharing, storage, and collaboration
    - How OneDrive for business can help you get the most out of personal file storage
    - How to use some of the newest features to securely store, edit, and share your documents
    - How to make professional teamsites in minutes
  • Introducción a Amazon EC2 Introducción a Amazon EC2 Carlos Carús Dec 12 2016 4:00 pm UTC 60 mins
    Amazon Elastic Compute Cloud (Amazon EC2) es un Servicio Web de AWS que proporciona capacidad de cómputo con tamaño modificable en la nube. Está diseñado para ofrecer un auténtico entorno virtual de cómputo profesional y escalable que permite utilizar interfaces de servicios web para lanzar instancias con distintos sistemas operativos, cargarlas con su entorno de aplicaciones personalizado, administrar sus permisos de acceso a la red y ejecutar su imagen utilizando los sistemas que desee.

    En este webinar gratuito te mostraremos en directo los principales beneficios y uso de Amazon EC2 tales como control total sobre sus instancias, aumentar o disminuir la capacidad en minutos, posibilidad de elegir entre varios tipos de instancia, sistemas operativos y paquetes de software, pago por uso o funcionalidad de red sólida y segura para sus recursos informáticos.
  • What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) Mark Duhm, Hyperscaler Practice Lead; Rob Selby, Product Manager, Hyperscaler Services Dec 13 2016 9:30 am UTC 60 mins
    Not managed to go to Las Vegas this year to attend AWS re:Invent? Worry not, we are consolidating a week’s worth of presentations and announcements into just 30 mins of your time… Come join us to see how we have coped with this challenge!

    Duration: 30 mins + Q&A

    AWS has grown at a phenomenal rate since 2006 and released a total of 722 new features and services, just in the last year – how does one keep up you may wonder? Well, AWS re:Invent – the world’s largest AWS gathering – is a great starting point but of course, it’s about much more than feature releases – how do you figure out what is relevant to your business? How do you assess whether your business is ready to effectively use AWS? How do you take what is available and deploy it to your own benefit?

    In this webinar we discuss both the hottest ins and outs as well as the most thought provoking perspectives that came out of this years' re:Invent. Our Hyperscaler Practice Lead, Mark Duhm and Hyperscaler Services Product Manager, Rob Selby, will be covering a number of topics:

    - Key updates & announcements (and their relevance in today's marketplace)
    - The 'so what' to AWS strategy & roadmap updates
    - Relevant perspectives around AWS in a Hybrid Cloud world, Security and Migration

    This is your chance to get a very personal download on what's happened at re:Invent - don't miss out!

    Duration: 30 mins + Q&A (so come prepared!)

    Presenters:
    - Mark Duhm, Hyperscaler Practice Lead
    - Rob Selby, Product Manager, Hyperscaler Services