Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto NetworksRecorded: Mar 22 201955 mins
As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions ManagerRecorded: Mar 21 201945 mins
Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?
Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:
1. How teams are bringing automation to their vulnerability management program
2. How to prioritize prevention across your modern network, from remote workers to cloud environments
3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
4. Using the MITRE ATT&CK framework to assess your current detection capabilities
Deena Thomchick, Sr. Director, Cloud Security, SymantecRecorded: Mar 21 201952 mins
When Securing AWS the Top 5 Things to Consider
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.
As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.
Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:
- Monitor activity and security configurations
- Control access and prevent risky changes or privileged misuse
- Detect malicious insiders and compromised accounts
- Keep S3 buckets private and secure confidential data with DLP
- Defend S3 buckets from advanced malware threats
Michael Leonard & Jonathan BiggsRecorded: Mar 21 201955 mins
Managing the wide area network can be a challenge for small business that have limited IT resources. As the use of applications grows organizations need to add bandwidth and connect to the cloud with high performance. They need to ensure that critical traffic like voice is given high priority and that they have tools to ensure performance.
In this webinar with AT&T and VMware we will show you how you can improve the quality of your WAN and increase visibility into network performance while reducing the resources that you dedicate to managing your WAN. You will learn how you can access applications from the cloud with ease and get better voice quality for your remote sites. Together, AT&T is offering a cloud-delivered SD-WAN service to all of your business needs.
Join this webinar to:
Discover the benefits of cloud-delivered SD-WAN for your small business
Find out how other businesses like yours are implementing cloud-delivered SD-WAN
Learn about the AT&T SD-WAN NOW managed service offering
Rubrik Datos IO offers fast NoSQL data recovery, any-to-any data mobility, and cost savings to organizations that rely on Apache Cassandra, DataStax Enterprise or MongoDB. In this webcast we’ll do a deep dive into how Rubrik Datos IO can save time by automatically discovering and identifying your databases and tables, how to quickly build a test/dev database from production data, and how Datos IO saves 70% or more on secondary storage with semantic deduplication – a capability unique to Rubrik.
Brad Hinke, Director of Quality Services & Validation at PropelRecorded: Mar 21 201951 mins
If your company is thinking about buying software to help with product development and manufacturing, validation is a critical step for complying with FDA 21 CFR Part 11 and Part 820. But many firms often lack detailed expertise and experience to make sure their non-product software is validated. With lack of resources and direction, how can you make sure your software is validated at a reasonable cost.
Brad Hinke, Director of Quality Services & Validation at Propel will host a live webinar and provide guidance and best practices from real-life lessons on validation. Brad has worked with both small and large medical device firms in all aspects of validation and implementation.
In this webinar, learn the following:
- what software needs to be validated and lessons learned from past validation efforts
- frameworks for approaching validation
- steps you must do to be compliant with the FDA.
Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto NetworksRecorded: Mar 21 201943 mins
As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
Kevin Bender, ASG & Brad Steinmeyer, Zia ConsultingRecorded: Mar 21 201929 mins
As companies strive to make the Cloud a coherent part of their overall IT infrastructure, we often hear customers asking, “Are we taking the best approach to get the most from our Content?” Navigating the best path for your organization is more varied and compelling than ‘just moving content to the Cloud’.
Blending traditional and modern IT models can offer cost savings as well as the agility you need to compete in the digital world. Watch this webinar to hear ASG and Zia Consulting discuss best practices developed while helping organizations construct and implement successful cloud strategies:
• How Cloud migration can enhance IT agility and business competitiveness
• What Consolidation vs. Migration really means
• How Efficiency and Security can and should ‘work together’
• How to measure immediate gains that align with your long-term vision
• Why the Cloud is important as you drive digital transformation
Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro FocusRecorded: Mar 21 201932 mins
Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.
Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.
Join this webinar to learn about:
• Ransomware challenges and impact
• Why malware detection alone is not enough
• How to close the gap with holistic endpoint data and device management
Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web ServicesRecorded: Mar 21 201945 mins
With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.
In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:
>Leverage compliance policies for scanning images in your CI/CD pipeline
>Scan Kubernetes and Docker environments and visualize compliance posture
>Enforce runtime container compliance
>Investigate policy violations post-mortem by using forensics after container is disposed
Cloud, telecom, & mobility costs overwhelmed unprepared IT teams in 2018 with unbudgeted surprises. To avoid these costs at a time when the need for IT is growing rapidly, Amalgam Insights provides 7 trends and recommendations to counteract these challenges.
Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. DunlapRecorded: Mar 21 201960 mins
Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
Rohit Kelapure, Pivotal Consulting Practice LeadRecorded: Mar 21 201964 mins
Digital transformation includes replatforming applications to streamline release cycles, improve availability, and manage apps and services at scale. But many enterprises are afraid to take the first step because they don’t know where to start. In this webinar, Rohit will provide a step-by-step guide that covers:
● How to find high-value modernization projects within your application portfolio
● Easy tools and techniques to minimally change applications in preparation for replatforming
● How to choose the platform with the right level of abstraction for your app
● Examples that show how Java EE Websphere applications can be deployed to Pivotal Cloud Foundry
Dan Pitman, Principal Security Architect, Alert LogicRecorded: Mar 21 201949 mins
Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.
Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.
Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.
• Insights from Alert Logic's 2018 Critical Watch Report
• Realities for scaling threat detection & response across on-prem to cloud environments
• Understand how today’s vulnerabilities are being exploited
• Find out how to achieve the right level of leverage for the optimal level of investment
Radovan Gibala - Senior Systems Engineer, F5 NetworksRecorded: Mar 21 201954 mins
Hlavní prioritou pro organizace, které podporují strategii udržitelného zabezpečení, je identifikovat škodlivé boty a vytvořit proti nim ochranu. Zúčastněte se tohoto webináře a dozvíte se:
• jak boti infikují systémy, šíří se a napadají aplikace,
• jaké typy útoků na aplikace boti obvykle provádějí,
• jak se můžete bránit proti zlým botům, aniž byste zničili ty hodné.
Sledováním tohoto webináře souhlasíte, že Vaše osobní údaje budou sdíleny s F5 a zpracovávány v souladu se Zásadami o ochraně osobních údajů společnosti F5 (https://f5.com/about-us/policies/privacy-policy). Také souhlasíte, že Vás F5 může kontaktovat ohledně produktů, služeb a budoucích akcí F5, ale s možností se kdykoli odhlásit.
Marcel Leitel, Sales Engineer DACH CyrenRecorded: Mar 21 201958 mins
Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten im Januar und Februar ein großer Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen.
Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge.
David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloudRecorded: Mar 21 201919 mins
Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.
This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.
David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadowRecorded: Mar 21 201926 mins
With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?
End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.
SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:
•What are the available options: on-premise upgrades, migrate to cloud or do nothing?
•Best practice methodologies
•Cloud tooling options for migration acceleration
•Cloud migration framework for success
Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.
This webinar will primarily focus on cloud migration.
Kyle Jenner, Specialist AWS ArchitectRecorded: Mar 21 201948 mins
Are you considering migrating your data and databases to the cloud to help improve your operations? Do you need advice on architecting and planning a smooth and seamless migration?
Then sign up for our webinar on Thursday 21 March at 10am (UK), and learn how moving from proprietary database vendors to open source alternatives on AWS can help increase reliability and improve performance, while also providing backup and DR benefits. We’ll also reveal how you can optimise licensing for Oracle and MS SQL to maximise cost savings in the cloud.
Our webinar will be hosted by Rackspace specialist AWS architect, Kyle Jenner, who will cover:
• selecting the right database services in AWS
• optimising licensing for Oracle and MS SQL databases
• benefits and approaches to migrating to open source and managed services
• architecting for backup and DR in highly available solutions
So, complete the registration form and book your webinar place now. Join us to make the most out of your cloud migration journey. By attending, you will also be eligible to receive a credit voucher to use on the AWS platform.
Rackspace is an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner.
Simon Ratcliffe, Sean RobertsRecorded: Mar 21 201930 mins
Leading managed services provider Ensono talk about how to develop a cloud strategy and roadmap and how it is a critical element of your modernisation and transformation journey. Listen to Simon Ratcliffe and Sean Roberts discuss the crucial steps when moving applications and workloads to the cloud as well as other important topics.
Simon and Sean will cover area such as:
•IT Cloud Culture – big bang or evolution?
•Steps for moving applications and workloads to the cloud
•Bridging the gap in a hybrid world
•Steps to public cloud migration
•Security in the public cloud
•Budgeting in the cloud – how lots of organisations get this badly wrong and how to budget correctly.
If you have further questions for either Simon or Sean you can email them here.
Gregory Rabin - Systems Engineer, F5 NetworksRecorded: Mar 21 201966 mins
Pour les entreprises à la recherche d’une stratégie de sécurité durable, il est primordial de savoir identifier les bots malveillants et de s’en prémunir. Participez à ce webinar pour découvrir :
• Comment les bots infectent et attaquent les applications et se propagent
• Les types d’attaques généralement réalisées par les bots ciblant les applications
• Comment vous défendre contre ces bots malveillants sans affecter ceux qui sont inoffensifs
En regardant ce webinar, vos données personnelles seront partagées avec F5 et traitées conformément à la politique de confidentialité F5 (https://f5.com/about-us/policies/privacy-policy). Vous recevrez également des communications liés aux produits et services F5, vous pourrez vous désabonner à tout moment.
Lars Muller, CRM Partners AG, TIBCO MVPMar 25 20193:00 pmUTC37 mins
Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.
Watch this webinar to learn:
- The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
- Key decisions you need to make at the outset of your project that will minimize risks
- How to prepare your data for a successful migration
- How to test and execute your migration to ensure a smooth launch
Frank Thias - Principal Systems Engineer, F5 NetworksMar 26 20199:00 amUTC62 mins
Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:
• Wie Bots Anwendungen infizieren, verbreiten und angreifen
• Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
• Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.
Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, PivotalMar 26 20199:30 amUTC60 mins
The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.
In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:
- Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
- Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
- Outsourcing may save money in the short term, but is much more likely to contribute to low performance
- Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)
Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.
Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
Nelson Petrack, CTO, TIBO SoftwareMar 26 201910:00 amUTC36 mins
According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.
Watch this webinar with TIBCO CTO Nelson Petrack presenting:
-A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
-How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
-What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?
Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
Sihem Merah, ingénieure avant-vente, Denodo & Rick van der Lans, analyste indépendant et expert Big Data & BIMar 26 201910:00 amUTC60 mins
Selon le Gartner, deux tiers des projets big data des entreprises ne franchiront pas le stade du pilote et de l’expérimentation au cours des deux prochaines années, et finiront par être abandonnés. Et selon une étude de Capgemini, seulement 29% des projets big data en cours sont pleinement rentables… A l'évidence, ces entreprises n'ont pas envisagé la data virtualisation dans leur architecture.
Denodo et Rick van der Lans - analyste indépendant et consultant de renommée internationale sur des sujets big data et BI - vous invitent à en discuter durant ce webinar. Nous développerons les bonnes pratiques à mettre en place pour réaliser les promesses du Big Data et détaillerons comment la Data Virtualization simplifie et sécurise les initiatives Big Data, vous garantissant ainsi de rejoindre ces entreprises “data-driven” ou “insight-driven” qui, selon une étude Forrester, seront celles qui connaîtront la croissance la plus remarquable.
Anwendungen von AI und ML verbreiten sich rasant vom Silicon Valley bis an die Wallstreet. Ubuntu wird die führende Plattform für diese Vorhaben - von Entwickler-Workstations über Racks und Clouds bis zu Edge Computing mit intelligent verbundenem IoT. Aber mit neuen Trends in der Entwicklung entsteht eine Fülle neuer Technologien und Terminologien, die Entwickler erlernen müssen.
In diesem Webinar bietet Ihnen Canonicals Kubernetes Product Manager Carmine Rime:
- eine Erläuterung wichtiger AI/ML-Konzepte
- einen Einblick, warum AI Anwendungen und ihre Entwicklung die IT in Unternehmen grundlegend neu gestalten
- eine detaillierte Darstellung, wie Unternehmen DevOps Praktiken auf ihre ML Infrastruktur und Workflows anwenden
- eine Einführung in das AI/ML Portfolio von Ubuntu bis zur Canonical Distribution von Kubernetes und wie Sie sofort mit Ihrem Projekt beginnen können
Zusätzlich werden wir einige der folgenden Fragen beantworten:
- Was leisten Kubeflow, Tensorflow, Jupyter, Edge AI und GPGPUs?
- Wie unterscheiden sich AI und ML?
- Was ist ein AI Modell? Wie wird es trainiert? Wie kann man es entwickeln/optimieren?
Und am Ende werden wir uns in einer Q & A Session noch Zeit für die Beantwortung Ihrer Fragen nehmen.
Dan Goldstein, Product StrategyMar 26 201911:00 amUTC45 mins
Gartner estimates by the end of 2020 over 20 million Internet of Things (IoT) devices will be online. Every day the automotive, aviation, consumer goods and utilities industries (just to name a few) are pushing new boundaries in how customers interact with technology. While this evolution unlocks incredible potential, security and performance challenges put IoT device manufacturers and providers at risk of security incidents and unable to meet customers' rapidly growing expectations.
Security-wise many devices are still treated like machines from early in the century: release patches on Tuesdays and cross our fingers our users update. Performance-wise centralized cloud providers are not built to deliver ultra low-latent responses to millions of devices with a global footprint.
Join our webinar and take a look at how Cloudflare is helping IoT manufacturers and providers meet emerging security and performance challenges.
Kelvin Murray, Threat Expert, WebrootMar 26 201911:00 amUTC60 mins
With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.
Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.
Join Webroot’s Threat expert as he discusses topics such as:
•The rise of information stealers
•The changing face of ransomware
•Relentless phishing attacks
•The theft, trade and cracking of passwords
Catalin Voicu - Systems Engineer, N2WS und Daniela Kasabova - Inside Sales Representative, N2WSMar 26 20191:00 pmUTC60 mins
Das Versprechen der Cloud war immer eine mehr agile, kosteneffiziente und katastrophesichere Weise zu skalieren. Wie es aber immer wieder passiert, Versprechen kommen mit kleingedrucktes zusammen. AWS und jeder anderer Public Cloud Anbieter garantieren die Sicherheit und Verfügbarkeit der Infrastrukturebene aber nicht Ihrer Daten:
Nehmen Sie an unserer LIVE Session teil und erfahren Sie mehr über:
· Warum sollte man AWS Environments schützen und warum native Backups nicht genügend sind.
· Wie man eine einwandfreie, schnelle und granulare Daten-Wiederherstellung durchführt.
· Wie erreicht man Anwendungskonsistenz mit 100% Uptime
Mariusz Sawczuk – Specialist Systems Engineer, F5 NetworksMar 26 20192:00 pmUTC66 mins
Identyfikacja złośliwych botów i ochrona przed nimi jest priorytetem dla firm opracowujących zrównoważoną strategię bezpieczeństwa. Weź udział w tym webinarium, aby dowiedzieć się:
• W jaki sposób boty infekują, rozprzestrzeniają i atakują aplikacje
• Jakie rodzaje ataków na aplikacje są najczęściej przeprowadzane przez boty
• W jaki sposób możesz bronić się przed szkodliwymi botami, nie przeszkadzając tym dobrym
Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
Mark Elwood - Marketing Director, TeleWareMar 26 20192:00 pmUTC30 mins
Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.
So, why aren’t more businesses and employees getting more benefits out of mobile working?
Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.
Topics we plan to cover:
• The top 3 challenges employees face when working remotely
• Is GDPR holding you back unnecessarily?
• Which types of applications, unified communications and collaboration tools are making an impact
• Why cloud communication technology is crucial to mobility, productivity and connectivity
As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.
Marketing Director, Mark Elwood will host the session and he will be joined by experts:
• Steve Haworth – TeleWare CEO
• Nigel Simpson – Sales Manager
Matt Selheimer, Chief StrategistMar 26 20193:00 pmUTC58 mins
How to handle evolving threats and expanding compliance risks when you have resource constraints.
For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.
Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.
It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.
You really should check it out, unless you want to keep trying to make that SIEM tool work…
Ashwath Nagaraj (Founder & CTO, Aryaka)Mar 26 20194:00 pmUTC45 mins
As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?
In this webinar you will join industry experts to learn:
- Fundamental building blocks of a managed SD-WAN architecture
- Pros and cons for each of the different management and operational models
- Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
Any integration project can have gotchas, such as custom fields or duplicate records that can slow you down. Proper up-front planning can help you successfully manage the gotchas, reduce the time needed and achieve better results.
In this presentation, integration experts from LyntonWeb discuss:
- How to prepare for your HubSpot-Dynamics CRM integration project to get the results you want
- How to apply this advice to other marketing automation-CRM integration projects, including Salesforce integrations
When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.
Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
Srini Srinivasan, Co Founder and Chief Development OfficerMar 26 20195:00 pmUTC60 mins
The Aerospike Connect family of add-on modules as well a new REST-API now make it even easier to integrate the Aerospike Database into both new and existing enterprise infrastructure systems, helping customers modernize and optimize their data architecture. We are happy to announce that Aerospike Connect for Kafka and Aerospike Connect for Spark are our two newest add-on modules.
Join us on March 26 at 10am PT to hear from Aerospike Founder and Chief Product Officer, Srini Srinivasan, who will cover:
- The Aerospike Connect product strategy
- How Aerospike Connect for Spark enables companies to directly integrate the Aerospike database with their existing Spark infrastructure
- How Aerospike Connect for Kafka makes it easy for enterprises to exchange data bi-directionally between the Aerospike database and enterprise transactional systems at the edge and core
- How Aerospike REST Client can be utilized as an easy and standard interface for the Aerospike database that enables developers to work with the Aerospike data layer
Shane Swiderek, Brett Orr, Peter Girgis, Gavin AdamsMar 26 20195:00 pmUTC55 mins
Innovative IoT solutions are solving real-world problems, with data serving communities in ways you would never expect. Who would have predicted the hidden insights and cost savings waiting to be uncovered in our trash? Well, Bigmate! This IoT solutions provider turns real-time sensor data into insights.
Realizing the trash collection process was outdated and inefficient, Bigmate developed a system with IoT sensors providing location, temperature, and bin level monitoring to optimize trash pickup. Saving money, streamlining operations, and optimizing processes, IoT sensor data can help your business discover new ways to solve old problems.
Join our interactive webinar panel with Bigmate and AWS to learn:
-How city-wide IoT implementation is optimizing trash pickup
-How to translate raw data into actionable insights for users
-The ins and outs of Bigmate’s IoT platform
-Gavin Adams, Sr. Solutions Architect, IoT at Amazon Web Services
-Peter Girgis, Chief Technology Officer, Bigmate
-Brett Orr, General Manager, Bigmate
-Shane Swiderek, Product Marketing Manager, TIBCO Jaspersoft
Storage Switzerland, CarboniteMar 26 20195:00 pmUTC60 mins
The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.
Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.
In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.
Join us for this live event to learn:
1. Why switch to the cloud for enterprise backup?
2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
3. Why and where most solutions miss the mark
4. How Carbonite Server delivers the five critical capabilities
Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances)Mar 26 20195:00 pmUTC60 mins
Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
As telecommunications service providers increasingly turn toward open source to modernize and transform their networks, they face the prospect of tackling a do-it-yourself project or working with a vendor partner that can support the required technologies. This important choice can determine the success of these strategic modernization initiatives.
Join Heavy Reading principal analyst Roz Roseboro and Pano Xinos, Red Hat global lead for telecommunications solution marketing, to hear more about:
• Why open source is so prominent in the telecommunications industry.
• Pitfalls to avoid when deciding to work with open source technologies.
• What the future holds for service providers at the network edge.
Roz Roseboro, Principal Analyst, Cloud Infrastructure and Management, Heavy Reading
Pano Xinos, Global Telecommunications Solution Marketing Lead, Red Hat
Azhar Sayeed, Chief Architect, Global Telcommunications, Red Hat
John Allen, Sr. Systems Engineer, A10 NetworksMar 26 20196:00 pmUTC45 mins
The adoption of containers is an accelerating trend in the application deployment space and Kubernetes has become the de-facto standard for container orchestration and management. However, many are still learning about Kubernetes and how it can benefit their organization.
In this webinar you will learn to:
* Make your application development more agile
* Enhance security and compliance between microservices
* Correlate traffic flow and security
* Drill down to contextual data and quickly pin-point problem areas
Nicolas Masse, Technical Marketing Manager for API management, Red Hat. David Codelli Product Marketing Manager, Red HatMar 26 20196:00 pmUTC36 mins
Investment in application programming interface (API) management software increased by an average of 44% from 2012 to 2017, according to IDC.1 This growth reflects the tremendous importance of APIs to today’s businesses. While opening up digital assets promises new opportunities, companies must develop new processes to ensure that APIs are built efficiently and securely.
This session will cover Red Hat’s approach for API development. We’ll discuss how to:
- Use mocking to speed up and break dependencies.
- Use a contract-first approach for defining tests that will harden your implementation.
- Protect exposed APIs through a management gateway.
- Manage deliveries using a continuous integration/continuous delivery (CI/CD) pipeline.
Santosh Choudhary, AWS, and Michael Bukva, SUSEMar 27 20193:30 amUTC60 mins
In this session you will get an overview of how systems management, live patching and other high availability features provided by SUSE and AWS can help you maximise the uptime of your SAP HANA systems. We will demonstrate Live Patching of the kernel of a SUSE system running SAP HANA in AWS , driven by AWS Systems Manager, and the use of the CVE audit capability of SUSE Manager to identify the patches required to mitigate a serious vulnerability.