Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Best Practices on Operational Efficiency in Network Security Best Practices on Operational Efficiency in Network Security Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Recorded: Oct 26 2016 63 mins
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint

    Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • SD-WAN for Next-Generation Retail Networks SD-WAN for Next-Generation Retail Networks Ciaran Roche, CTO, Coevolve: Kangwarn Chinthammit, Director of Solutions, VeloCloud Recorded: Oct 26 2016 60 mins
    Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands.

    Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.
  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Recorded: Oct 25 2016 55 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Global Partner Evangelist Recorded: Oct 25 2016 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Recorded: Oct 25 2016 62 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Recorded: Oct 25 2016 61 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Recorded: Oct 25 2016 66 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • Tips on Anyalyzing and Modeling Complex Data Sets Tips on Anyalyzing and Modeling Complex Data Sets Scott Dallon, BrainStorm, Inc. Recorded: Oct 25 2016 20 mins
    Discover how businesses turn big data into meaningful insights to help make organizations work smarter, and make better decisions faster.

    Join Scott Dallon to learn tips on analyzing and modeling complex data sets!
  • Best Practices: Architecting Security for Microsoft Azure VMs Best Practices: Architecting Security for Microsoft Azure VMs Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Oct 25 2016 61 mins
    Do you know if your workloads are secure? Do you have the same security and compliance coverage across all of the cloud platforms and datacenters running your critical applications? Are you having to design your security framework each time you deploy to a new region or datacentre?

    Whether you’re working with multiple cloud environments or exclusively on Azure, there are certain things you should consider when moving assets to Azure. As with any cloud deployment, security is a top priority, and moving your workloads to the cloud doesn’t mean you’re not responsible for the security of your operating system, applications and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your Azure environment is secure.

    Register for this impactful webinar as we discuss step-by-step what you need to do to secure access at the administrative, application and network layers.

    In this webinar, we will take a look at:
    • The Shared Security Model: What security you are responsible for to protect your content, application, systems and networks
    • Best practices for how to protect your environment from the latest threats
    • Learn how traditional security approaches may have limitations in the cloud
    • How to build a scalable secure cloud infrastructure on Azure
  • Transformation zum modernen Rechenzentrum mit Software Defined Storage Transformation zum modernen Rechenzentrum mit Software Defined Storage Mike Unruh, SDS Advisory Systems Engineer Recorded: Oct 25 2016 41 mins
    Keine Lust mehr auf die Herausforderungen im Zusammenhang mit der Ausführung eines Rechenzentrums mit herkömmlichen Infrastruktur?

    Dell EMC ScaleIO Software defined Block Storage auf standard-Serverhardware bietet hohe Performance, massive Skalierung und erstklassige Flexibilität.

    Wählen Sie aus 3 verfügbaren Optionen, um Sie;
    1. Vollständige Flexibilität: ScaleIO auf Ihrer Auswahl von Server, Switch und Rack
    2. Vorab validierte: ScaleIO in Kombination mit leistungsstarken Dell PowerEdge-Servern
    3. Sofort einsetzbare, vollständig entwickelte Lösung von VCE

    Sie können jetzt Ihre geschäftlichen Ziele erfüllen, und gleichzeitig erheblich vereinfacht den Prozess der Beschaffung und Bereitstellung eines Server-SAN
  • CA PPM in der Praxis – Teil 1: Applikation Portfolio Management CA PPM in der Praxis – Teil 1: Applikation Portfolio Management Peter Säckel/Advisor PPM/CA Technologies Recorded: Oct 25 2016 42 mins
    Wie stellen Sie sicher, dass sich all Ihre Applikationen an Ihren Geschäftszielen ausrichten?
    Passen Sie Ihr Budget für Applikationen regelmäßig an die aktuelle Geschäftsstrategie an?

    Dieses Webinar möchte aufzeigen, wie Sie eine komplette Übersicht zu Ihrer Applikationslandschaft erhalten, diese objektiv hinsichtlich Geschäftszielen bewerten und dabei Redundanzen oder unnötige Applikationen identifizieren.

    Das damit verbundene Einsparungspotential könnte in sinnvolle Innovationen oder Unternehmenstransformation eingesetzt werden.

    Diese Webinar-Reihe beginnt mit dem Thema Applikation Portfolio Management und wird sich in weiterführenden Webinaren mit ausgewählten Themen aus der PPM-Welt ergänzen.
  • Why Alert Logic? A DevOps Approach to Security Why Alert Logic? A DevOps Approach to Security Wayne Moore, Head of Information Security, Simply Business Recorded: Oct 21 2016 2 mins
    Simply Business is their name because it reflects their motto. “Protection should be simple.” That practice has earned Simple Business the position as UK’s favourite business insurance broker, with over 300,000 businesses and landlords protected. They’re proud of the award-winning claims service, which is, after all, the proof of the pudding. Their Head of Information Security, Wayne Moore, is also proud of is the security posture they have achieved with Alert Logic while leveraging the most agile cloud infrastructure for their business, Amazon Web Services. Watch the Simply Business video where you’ll learn how they made it happen.

  • 2016 Alert Logic Cloud Security Summit - NYC Highlights 2016 Alert Logic Cloud Security Summit - NYC Highlights Alert Logic Recorded: Oct 21 2016 4 mins
    View highlights from our recent Cloud Security Summit in NYC.

    The Summit focused on security and compliance challenges in a cloud environment and how organizations can close security gaps to de-risk greater cloud adoption, including how security can enable each stage of their cloud journey.

    Learn more best practices for AWS and security at one of our upcoming Summits: https://www.alertlogic.com/summit/
  • Why Alert Logic? Security for Financial Institutions Why Alert Logic? Security for Financial Institutions Mark Beatty, CIO & Security Officer at Penns Woods Bancorp Recorded: Oct 21 2016 2 mins
    Penns Woods Bancorp, Inc. is the bank holding company for Jersey Shore State Bank (JSSB) and Luzerne Bank (LUZ). As a growing financial institution, they understand they are in the pool of prime targets for cyberattacks. Watch this video to hear why Mark Beatty, CIO & Security Officer at Penns Woods Bancorp relies upon Alert Logic to detect intrusions and thwart breaches.

  • Azure HyperCloud: Cost Reduction, Increased Agility and Improved Scalability Azure HyperCloud: Cost Reduction, Increased Agility and Improved Scalability Kevin Orbaker, Microsoft Recorded: Oct 21 2016 57 mins
    Want consistent management across your on-premises and cloud resources and to quickly deploy new scalable solutions? This session will focus on how you can leverage the hypercloud to extend and modernize your database infrastructure.

    In this session, Kevin Orbaker (MTC Architect, Irvine) shares his experience leveraging the cloud and discusses:

    Hybrid Cloud Services
    How to increase the scale of your database with automatic response
    How to write once and deploy anywhere, on-premises or in the cloud
    How to scale operations while reducing application and OS footprint
  • Why Alert Logic? Agility and Security, Without the Risk Why Alert Logic? Agility and Security, Without the Risk Brett King, Head of Service Delivery of FunkyPigeon.com Recorded: Oct 21 2016 4 mins
    Brett King, Head of Service Delivery of FunkyPigeon.com, WH Smith’s online personalised greeting card and gift company, discusses why his organisation trusts Alert Logic for managed security services. In this video, Brett talks about the security and compliance challenges they faced and why they made the decision to outsource to Alert Logic for security-as-a-service, enabling his team to focus on continued business growth.

  • What's Next in Emerging Tech? [Emerging Tech Virtual Summit] What's Next in Emerging Tech? [Emerging Tech Virtual Summit] Eric Horvitz, Technical Fellow & Managing Director, Microsoft Research Recorded: Oct 21 2016 30 mins
    By the end of this event, you’ll be asking, “what’s next?” In this final session of our virtual summit, Technical Fellow & Managing Director at Microsoft Research, Eric Horvitz, will discuss the next generation of emerging technology, with a particular eye to artificial intelligence.
  • Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Tereza Nemessanyi, Microsoft, Kevin O’Brien, GreatHorn and Kristen Smith, littleBits Recorded: Oct 21 2016 27 mins
    In this session, you’ll hear about innovative ways start-ups are using emerging technologies. Microsoft’s own Entrepreneur-in-Residence will tell us what’s happening in the start-up world, and two start-up moguls, Kevin O’Brien of GreatHorn and Kristen Smith of littleBits, will tell us how their companies are using emerging tech.

    In a constantly-evolving world of technology, it's near impossible to stay up to date with all the new advancements in tech. Whether you're launching a start-up, working for one, or in the planning stages, join us to hear from entrepreneur experts in cyber security, cloud communication, infrastructure, inventions and more!
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Recorded: Oct 21 2016 36 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Nowe modele Data Domain Nowe modele Data Domain Daniel Olkowski, Systems Engineer, EMC Recorded: Oct 21 2016 49 mins
    Nadszedł czas na odświeżenie prawie wszystkich modeli Data Domain.
    Co się zmienia?
    Które modele mają nowsze wersje?
    W czasie piątkowej, porannej kawy dowiesz wszystkiego o najważniejszych zmianach w Data Domain!
  • Data Governance: Behalten Sie die Kontrolle über Ihre Daten Data Governance: Behalten Sie die Kontrolle über Ihre Daten Stefan Girschweiler, Presales Consultant Recorded: Oct 21 2016 51 mins
    Data Governance definiert die Regeln und Prozesse für das Management der Daten im Unternehmen und hat die Aufsicht über alle Unternehmensdaten. Daten werden über mehrere Abteilungen hinweg eingesetzt und benötigen somit eine einheitliche Definition und zentrale Regeln zur Aufrechterhaltung der Datenqualität.
  • Using App SaaSification as a key to build digital infrastructure Using App SaaSification as a key to build digital infrastructure Suresh Subramanian, Solutions Architect Sr Manager, Cloud Oct 26 2016 1:00 pm UTC 90 mins
    The greatest value the cloud offers is the ability to use technology to scale business processes quickly and make them more consumable. It enables them to run as a service, giving developers and operators more flexibility to stand up a service, sort out what works and what doesn’t, and ultimately improve the user experience. As they say in Silicon Valley, it allows developers to “fail fast” and repeat.

    The so-called “SaaSification” of business is driving innovation and smart organizations get this—they are seizing the moment, creating dynamic services on a platform, consumable by large groups of users at any time. According to some recent industry analyst estimates, 34 percent of enterprises will have 60 percent or more of their applications on a cloud platform within two years.

    During this webcast you will learn:
    -How App SaaSification allows companies to use their new found IT “assets” in ways they haven’t before
    - How App Saasification saves the companies from having to buy any additional infrastructure or expensive platforms. Instead, they were able to scale up and down cost-effectively to offer an additional, value-added product that enhanced customers’ viewing experience
  • Tech Talk: Protecting Your Business From a Destructive Cyberattack Tech Talk: Protecting Your Business From a Destructive Cyberattack Alex Almeida Oct 26 2016 3:00 pm UTC 45 mins
    Threats to the business are evolving quickly. Learn EMC's solution to protect your business from a destructive cyber attack
  • HPE Security Fortify SCA and SSC, new features to power a DevOps SDLC HPE Security Fortify SCA and SSC, new features to power a DevOps SDLC Michael Right, Sr Product Manager, Fortify and Emil Kiner, Product Manager, Fortify Oct 26 2016 3:00 pm UTC 60 mins
    As threats evolve, so must application security. HPE Security Fortify continues to create and pioneer new features and functionality to further automate and streamline your app security testing program. Learn about new static scanning advances that align with DevOps requirements. Hear how scan analytics can further enhance and refine advanced auditing processes to increase the relevancy of security scan results.
  • Defending Your Wi-Fi Airspace Against Threats: Tips You Need to Know Defending Your Wi-Fi Airspace Against Threats: Tips You Need to Know Ryan Orsi, Director of Strategic Alliances Oct 26 2016 4:00 pm UTC 60 mins
    Organizations across all industries are facing increased pressure from customers, vendors, and employees to offer Wi-Fi access. While offering this service provides significant gains, businesses cannot forget about the critical security measures needed to defend against wireless threats.

    Join Ryan Orsi, Director of Strategic Alliances, as he delves into the top challenges of deploying enterprise-grade, secure Wi-Fi, and the key solutions within reach of all organizations.
  • Your Journey To Cloud Native Made Simple Your Journey To Cloud Native Made Simple Mark Williams, CTO at Redapt Inc, Sasha Jeltuhin, Dir of Technology at Apprenda, Scott Whitright, Cisco Oct 26 2016 4:00 pm UTC 60 mins
    As software becomes the competitive currency of the enterprise, investments are being made to embrace new distributed cloud applications, implement cloud platforms, and automate infrastructure provisioning. However, organizations are facing many challenges in regards to setting the correct path toward cloud native, delivering high quality & agile applications, all while keeping up with the increasing pace of business without sacrificing governance and operational efficiency.

    Cisco, Apprenda and Redapt have joined hands to offer an end-to-end solution to alleviate these challenges and transform your datacenter into a secure, policy-driven application cloud platform.

    Join us to learn:

    • Where your organization currently fits on the cloud maturity model and what strategies can help you succeed at improving your cloud capabilities

    • How enterprises can effortlessly cloud enable existing monolithic Java and/or.NET applications in addition to running docker based cloud native applications

    • How to drive rapid development through DevOps, including continuous integration (CI) and continuous delivery/deployment (CD)

    • Approaches to leverage both IaaS and PaaS to automate service provisioning, security, compliance and governance

    • Ways to drive order of magnitude improvements in infrastructure utilization, developer productivity, organizational agility, and governance

    • And more!
  • Netflix: The Journey to Efficiently Securing Your Video Stream Netflix: The Journey to Efficiently Securing Your Video Stream Jonathan Stern, Applications Engineer at Intel & Scott Long, Sr. Software Engineer at Netflix Oct 26 2016 4:30 pm UTC 60 mins
    Netflix engineers were faced with a challenge: how do you protect the privacy of your customers while serving over a third of all internet traffic in the US? Intel and Netflix engineers discuss the scale of the challenge and how it was solved using Intel® software ingredients and the latest Intel® Xeon® processors. This session includes details of the analysis performed, the software ingredients used, and the record setting results of this collaboration.
  • Solving Today's Mobile and IoT Security Challanges Solving Today's Mobile and IoT Security Challanges Jon Garside, Product Marketing Manager & Rich Boyer, CIO, NTT i3 Oct 26 2016 5:00 pm UTC 60 mins
    IoT devices are on your network. Do you know how what to do with them?

    View this webinar to dive into the NTT i3 Global Threat Intelligence Report, and how to combat new IoT concerns and security gaps. Learn more about:
    Misconceptions in the security model for wired vs. wireless networks
    Managing policies for IoT in the enterprise using contextual data
    The value of device roles and real-time enforcement for IoT

    Rich Boyer, CISO at NTT Innovation Institute Inc. (NTT i3), and Jon Garside, Product and Solutions Marketing Manager at Aruba will lead this technical discussion – don’t miss it!
  • Defeating Polymorphic Phishing Defeating Polymorphic Phishing George Anderson | Director of Product Marketing Oct 26 2016 5:00 pm UTC 45 mins
    Phishing has long been one on the most successful ways of compromising users and also organizations’ networks. This webinar looks at the state of Phishing today, recommends what people, processes and technology can do to minimize the risks. And discusses a new Real-Time Anti-Phishing solution that is defeating this highly effective compromise.
  • DR Strategies For Hyperconverged Architectures DR Strategies For Hyperconverged Architectures Curtis Preston, Storage Switzerland Oct 26 2016 5:00 pm UTC 60 mins
    Hyperconverged infrastructure products promise to bring the best of virtualization to an easy-to-manage platform. One question is what they do to solve one of the greatest challenges modern IT environments have: DR? Virtualization itself has done wonderful things for DR, but hyperconvergence promises to take things further. Is what VMware and Hyper-V offer good enough? If not, is hyperconverged infrastructure the answer? That’s what W. Curtis Preston, Senior Analyst from Storage Switzerland and Mike Lyon, Service Delivery Manager from Scale Computing will discuss in this live webinar.
  • Improve Web Performance and Site Protection: Migrate from Akamai to Incapsula Improve Web Performance and Site Protection: Migrate from Akamai to Incapsula Divr Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Oct 26 2016 5:00 pm UTC 60 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:
    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.
  • Automated Redaction & Video Management in the Cloud Automated Redaction & Video Management in the Cloud Jeff King, JPS Solutions Architect, Microsoft Oct 26 2016 6:00 pm UTC 60 mins
    See how innovative technologies are transforming public safety. Video has become a powerful tool in law enforcement.

    Law enforcement agencies as well as private citizens now use video to protect themselves. The current challenge is in how agencies can effectively manage all this video. Curating thousands of hours of video can be a costly and resource-intensive process. Agencies are looking to new technologies to help them automate their video management processes. On-premises video management solutions are moving to more cost-effective, cloud-based services. Through the intelligence, elasticity, and hyperscale of cloud computing, services can now automatically extract spoken content, redact faces and objects, enable facial recognition, stabilize shaky video, and detect motion from video.

    Join this webcast to learn how to:

    Expand cloud capabilities beyond video storage to encompass automated video management.
    Leverage cloud services without having to throw out your agency's existing video management platforms.
    Leverage machine learning and compute at scale to perform automated redaction, object detection, text transcription, and facial recognition.
    This webcast is part of our Empowering digital transformation in law enforcement webcast series. Sign up for this session, or the entire series today!
  • Cloud-Based Applications Aid Police & Citizen Engagement Cloud-Based Applications Aid Police & Citizen Engagement Jeff King, JPS Solutions Architect, Microsoft Oct 26 2016 8:00 pm UTC 60 mins
    Leverage your community relationships for better policing!

    With recent terrorist attacks, law enforcement agencies are investing in new, sensor-based technologies (surveillance systems, drones, etc.) and location-based data feeds to gather intelligence and respond proactively to public safety concerns.

    A key challenge for law enforcement is how to tap into the vast amount of data being generated by private citizens. Videos, photos, and social media posts, created using smartphones, have the potential to provide first responders with information that could aid in their efforts. In this webcast, hear how the Miami-Dade police department has developed a new smartphone application, the Community on Patrol (COP) app, which deputizes the county's 2.6 million residents and improves community relations.

    You'll gain an overview of the COP technology, as well as lessons learned by Miami-Dade County in the development and launch of their new smartphone application. You'll see how the citizens of Miami-Dade are communicating directly with their real-time crime center to send videos and photos, make 911 calls, and submit tips to police for response and follow-up.

    Join this webcast to learn how to:

    Implement best practices for building a citizen and police mobile collaboration platform.
    Leverage the elasticity of cloud computing to develop smart phone technologies.
    Maximize the potential of apps to fight terrorism, reduce crime, and improve public safety.
    This webcast is part of our Empowering digital transformation in law enforcement webcast series. Sign up for this session, or the entire series today!
  • Digital or Dead Digital or Dead Thomas Meyer, IDC European Research & Mike Shaw, Director Strategic Marketing, HPE Oct 27 2016 10:00 am UTC 75 mins
    According to Thomas Meyer at IDC, about one third of companies won’t survive the next decade. There is a shift in the way companies are working; innovation is coming from every direction. If you are not being disruptive, it can very well be a case of Digital or Dead in the next decade.

    Join this webinar to gain insight on the thrivers versus survivors, how to help your company become a digital player, and the competencies you need to thrive.

    The speakers for this webinar are:

    Thomas Meyer manages IDC's IT Research in Europe. This includes coverage of software, services and hardware markets focused on topics such as datacenter transformation, cloud computing, virtualization, business continuity, sustainability and print services. Additionally Meyer also manages IDC Europe's cross-domain Practices which provide insight and advisory on 3rd Platform industry transformation such as Internet of Things, Cloud, Mobility, Big Data and Customer Experience IT to ICT vendors and end users.

    Mike Shaw is Director of Strategic Marketing at Hewlett Packard Enterprise. He is part of the team creating thought leadership in the areas of Big Data, the Enterprise of the Future, and the Digitization of Everything. During his 30 years HPE; Mike has been an R&D section manager working on HPE’s Business Process Management product; led a business planning team in HPE Software; managed the world-wide marketing of all HPE Software’s Business Service Management products and latterly; been a key contributor to Enterprise 2020 - HPE’s project to define the enterprise of the future (www.enterprise2020.com); and has led Hewlett Packard Enterprise's research into digitalization and its use in customer experience, products and operations. Mike has a degree in Physics from the University of Manchester and a Masters in Control Engineering and Operations Research from Cambridge University and lives in the United Kingdom.
  • Cloud HR – Why It Needs To Be An Integrated Element Of Your IT Landscape Cloud HR – Why It Needs To Be An Integrated Element Of Your IT Landscape Phil Turton, Cloud Sales Lead, Informatica UK&I Oct 27 2016 10:00 am UTC 30 mins
    Moving your HR applications to the cloud is a well-trodden path with vendors such as Workday, SuccessFactors and Cornerstone amongst the early cloud pioneers. This webinar talks to the importance of integrating cloud HR applications together and back to your wider business architecture. We will discuss the advantages and some of the potential hurdles to making integration a real success.
  • Software Defined Storage: Bringing Remote and Branch Offices Together Software Defined Storage: Bringing Remote and Branch Offices Together Dr Stefan Radtke, CTO Dell EMC Isilon Oct 27 2016 10:00 am UTC 45 mins
    Organizations are experiencing unprecedented data growth - while data is geographically distributed, organizations are under pressure to provide global visibility and cost effective management for all unstructured data, regardless of the location. Enterprises with branch and regional offices are further challenged with dispersed islands of storage that are costly and inefficient, while being difficult to reliably maintain and protect.

    Learn how you can expand your data lake by consolidating data from remote office locations to your core data center, through simple Software Defined Storage – enhancing protection, and introducing business Analytics.
  • Spotlight on Europe: Secure Your Network for Scale and the Cloud Spotlight on Europe: Secure Your Network for Scale and the Cloud Ray Wong, Solutions Architect, EMEA, VeloCloud Networks Oct 27 2016 1:00 pm UTC 60 mins
    Security continues to be top of mind as enterprises and service providers work to implement Software-Defined WAN (SD-WAN). Security is a critical requirement for enterprises as they rely more on the Internet for wide area networking, leverage the cloud for applications and services, and adopt new SD-WAN and NFV technologies for increased agility.

    SD-WAN architectures are different and Cloud-Delivered SD-WAN offers a unique multi-pronged approach to accommodate the needs of all sizes of enterprises including the largest, as well as the service providers that serve them. Join this webinar to learn about new approaches with SD-WAN that both strengthen and simplify your security posture.
  • Top Sales Enablement Tools that Accelerate the Sales Cycle Top Sales Enablement Tools that Accelerate the Sales Cycle Scott Dallon, BrainStorm, Inc. Oct 27 2016 2:00 pm UTC 15 mins
    Sales enablement tools help increase sales and drive business growth. These tools help sales teams deliver the right message to their prospects at the right time.

    Join Microsoft as they discuss sales enablement tools that increase your sales team collaboration and productivity.
  • Comenzando a usar AWS Comenzando a usar AWS Rubén Ruiz Oct 27 2016 3:00 pm UTC 60 mins
    Comenzar a usar los servicios de AWS puede parecer un desafío, pero no necesita ser asi. Participe de este Webinar y aprenda los conceptos básicos para empezar a utilizar la plataforma de servicios de Cloud de AWS. Después de un breve resumen, presentaremos los servicios básicos como Amazon EC2 y Amazon S3 y además tendremos demostraciones prácticas de cómo configurar y utilizar estos ambientes.
  • Automation in the Age of Digital Transformation Automation in the Age of Digital Transformation Carl Lehmann, 451 Research Manager; Kelly Christensen, Nintex Product Marketing Manager Oct 27 2016 3:00 pm UTC 60 mins
    Organizations of all types and sizes are currently enamored with (or plagued) by a new IT buzzword –Digital Transformation. The cloud, mobile and social network era is indeed affecting the way organizations run their business. Big data and the Internet of

    Things (IoT) also have firms investing wildly to keep up, or scratching their heads trying to figure out what to do.
    In this webinar Carl Lehmann, Hybrid IT analyst at 451 Research will discuss digital transformation from both business and technical perspectives by:

    • Describing digital transformation and how it is used to create competitive advantage
    • Discussing why and how enterprises are pursuing such initiatives
    • Identifying the critical technology needed for execution
    • Revealing how workflow automation accelerates new ways of doing business

    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of workflow automation for IT and business transformation.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie, Global Solutions Manager, Deena Thomchick, Sr. Director Cloud Security & Linda Park, Sr. Product Manager Oct 27 2016 4:00 pm UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Best of Microsoft Ignite Best of Microsoft Ignite Siunie Sutjahjo - Senior Product Manager for Skype for Business, Microsoft | John Hand - Global Microsoft Alliance Director Oct 27 2016 4:00 pm UTC 60 mins
    Microsoft Ignite 2016 was sold out. If you missed a ticket to the biggest Microsoft show on earth, or you couldn't get to Atlanta, GA. The this will be the next best thing.
  • Agile for Speed, productivity and … happiness  Agile for Speed, productivity and … happiness  Longda Yin, Principal Agile Consultant Oct 27 2016 5:00 pm UTC 60 mins
    Agile employees outperform so-called “hard workers” by nearly 20 percent, and research from Korn Ferry found that companies with more agile executives had 25 percent higher profit margins than their peers. Given the pervasiveness of agile in software development circles, and the pervasiveness of software as the backbone for every business today, it’s no surprise that agile tenets have pervaded employee expectations about the workplace. It’s why some of our agile coaches encourage customers to use employee happiness as a productivity metric.  
    Agile cultures are engaging cultures, and engaging cultures produce engaged employees. Are you ready to get going? We can help. Join us on Thursday, October 27, 10am PST / 1pm ET for this engaging webinar.
  • How to Ensure Your Backups Are Not Held Ransom by Ransomware How to Ensure Your Backups Are Not Held Ransom by Ransomware Jason Leiva Solutions Architect, Veeam & Stephane Estevez Product Marketing, Quantum Oct 27 2016 5:00 pm UTC 60 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, 2016 is the year of ransomware!

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.