Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Recorded: Aug 21 2019 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Recorded: Aug 21 2019 49 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Towards Autonomous Fine-Grained Network Management
    Towards Autonomous Fine-Grained Network Management
    Dr. Kevin Tang Recorded: Aug 21 2019 32 mins
    The current Internet is largely a heterogeneous network in the sense that it is a network that is formed by many different networks owned by different identities. Its ability to work with vastly different technologies under very different circumstances in parallel certainly has brought crucial flexibility and incentives for its growth. On the other hand, its heterogeneity has also led to rigid and coarse management which makes Internet’s performance insufficient to support the fast growing traffic with increasingly stricter quality of service requirements. Today, with the rise of cloud computing and software-defined networking, it is now possible to move towards autonomous fine-grained network management. In this talk, we birefly examine opportunities that come from three different aspects: space (finer traffic split), time (faster network load balancing) and application (route different applications differently). We study both the idealized fine-grained network management, which sets a limit for the best possible outcome, and algorithms that take into account important practical factors to approach that limit. The talk ends with some example virtual network functions (VNFs) that can be built under fine-grained network management to further improve network performance
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Recorded: Aug 21 2019 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Automating Operations: Impact of  AI, Machine Learning and Low-Code Development
    Automating Operations: Impact of AI, Machine Learning and Low-Code Development
    Phil Simpson Senior Principal Product Marketing Manager, Red Hat Prakasha Aradhya Director of Product Management, Red Hat Recorded: Aug 21 2019 49 mins
    Business process automation technology is rapidly emerging as a key to success in digital transformation projects. Automation is no longer just a set of business operations workflow items. A collaborative convergence of analytics, artificial intelligence or machine learning (AI/ML), robotic process automation (RPA), low-code development, etc. is changing the marketplace. Businesses are recognizing the value of this unified view in automating operations and decisions to improve the efficiency and agility of business operations—and thereby competitiveness and the bottom line.

    Join us for this session, where we'll explore:

    -Exploiting data analytics to make well informed decisions.
    -Building intelligent, context-sensitive applications.
  • Quantifying Risk in Today’s Computing Infrastructures
    Quantifying Risk in Today’s Computing Infrastructures
    Vincent Rais, Director of Resiliency Services, Uptime Institute and Todd Traver, Vice President, IT Optimization and Strategy Recorded: Aug 21 2019 62 mins
    The complexity of today’s hybrid environments increases risk – what do you need to look for?

    Despite the promised simplicity provided by the cloud and other technologies, the majority of IT loads still run inside enterprise data centers, leading to challenges in managing workloads across the hybrid architectures emerging between these facilities and the cloud. We’ll discuss what we are seeing, along with the challenges, focus areas and important critical success factors necessary to reduce risk and provide resiliency and uninterrupted application availability.
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Recorded: Aug 21 2019 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Recorded: Aug 21 2019 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Recorded: Aug 21 2019 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Recorded: Aug 21 2019 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • MoneySupermarket Delivers Intelligent Marketing for the Empowered Consumer
    MoneySupermarket Delivers Intelligent Marketing for the Empowered Consumer
    Marina Zennaro and Tom Smith, Product Marketing Salesforce. Clara Toombs, Head of CRM Strategy, MoneySuperMarket Recorded: Aug 21 2019 31 mins
    Watch this session from Salesforce World Tour, London where the product leaders and trailblazer MoneySuperMarket show how the #1 marketing platform is enabling intelligent marketing and driving growth for one of the UK’s leading price comparison websites, an established member of the FTSE 250.
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Recorded: Aug 21 2019 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Protecting your Portal from File-based Malware
    Protecting your Portal from File-based Malware
    John Stevenson Recorded: Aug 21 2019 32 mins
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Recorded: Aug 21 2019 51 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Recorded: Aug 21 2019 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • 제로트러스트 세상에서 보안 태세 정의하기
    제로트러스트 세상에서 보안 태세 정의하기
    김 현 도, Senior Solution Engineer, Akamai Technologies; 한 준 형, Technical Account Manager, Akamai Technologies Recorded: Aug 21 2019 57 mins
    일반적으로 제로트러스트 접근방식에는 접근시도과 신원 확인, 그리고 기기확인이라는 3가지 핵심 축으로 살펴볼 수 있습니다.

    이전 웨비나에서는 아이덴티티 기반 접근 방식을 클라우드 프록시와 함께 사용하여 내부 어플리케이션에 보다 안전하게 액세스 하는 방법을 살펴보았습니다.

    이번 웨비나는 두가지 파트로 나뉘어 집니다. 첫번째 부분에서는 앞서 언급한 3가지 제로트러스트 접근 핵심축에 대해 좀 더 자세히 알아보고 사용자와 접근 장비에 대한 의미에 대해 더 살펴보는 과정을 통해 제로 트러스트 아키텍처를 구현하는 방안에 대해 알아보겠습니다.

    두번째 부분에서는 Web에서 API로 전환되는 보안의 트렌드에 대해 살펴보겠습니다.
    여기서 우리는 모바일 어플리케이션의 폭발적인 증가와 함께 웹에서 API로 공격이 이동하는 API의 공격 트랜드와 Credential Fraud의 라이프 사이클을 살펴볼예정입니다.

    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    발표자: 한 준 형, Technical Account Manager, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • 2019년 클라우드 보안 위협 보고서: 최신 클라우드 보안 동향 파악
    2019년 클라우드 보안 위협 보고서: 최신 클라우드 보안 동향 파악
    김봉환 상무 , 시만텍코리아 SE 본부 Recorded: Aug 21 2019 63 mins
    현재 클라우드 보안이 현실에 올바르게 대응하고 있다고 생각하십니까?

    시만텍은 클라우드 보안 환경에 대한 인식과 관련하여 전 세계 보안 의사 결정자를 대상으로 설문 조사를 실시하고, 그 결과를 시만텍이 모니터링한 경험적 데이터 소스와 비교했습니다.

    클라우드 보안 전문가들이 함께하는 웹 세미나에 참여하십시오. 김봉환, 시만텍 수석 시스템 엔지니어링 관리자가 아래와 같은 내용을 논의합니다.

    • 2019년 클라우드 보안 위협 보고서의 주요 내용
    • 보안 위협 관련 실제 사례와 클라우드 보안에 대한 인식이 갈수록 진화하는 클라우드 보안 위협에 적절하게 대응하는지 여부
    • 제로 트러스트 보안 아키텍처를 통해 갈수록 확장되는 공격 범위에 대응하고 베스트 프랙티스 구현을 지원하는 방법
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Recorded: Aug 21 2019 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • The Risks From Unsecured Networks (APAC)
    The Risks From Unsecured Networks (APAC)
    Jonathan Barnett, Sales Engineer Recorded: Aug 21 2019 19 mins
    ** This is an APAC focused webinar **

    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Akamai’s latest Melbourne scrubbing centre and Prolexic enhancements
    Akamai’s latest Melbourne scrubbing centre and Prolexic enhancements
    Jason Hatch, Senior Director Product Management, Security and Performance, Asia Pacific & Japan, Akamai Aug 22 2019 2:30 am UTC 30 mins
    On February 2018, GitHub survived the largest DDoS attack ever recorded with Akamai Prolexic. Today, Akamai continues to invest in its DDoS mitigation capacity and capabilities with the launch of its newest scrubbing centre in Melbourne, Australia. Launched in August 2019, this will become an integral part of the Prolexic DDoS mitigation platform that will now have 19 scrubbing centres deployed globally.

    Join us on 22 Aug, 12:30PM Sydney time to learn:

    - What this means to Prolexic customers
    - Why it is better to protect your data center from DDoS attacks at the Edge
    - How zero-second mitigation SLA is achieved
    - Upcoming innovations to increase platform flexibility and simplify overhead
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • Learn How To Align Your Security with Business Outcomes
    Learn How To Align Your Security with Business Outcomes
    Jeff Pollard, VP & Principal Analyst, Forrester Research and Girish Bhat, Director, Product Marketing, Splunk Inc. Aug 22 2019 5:00 am UTC 54 mins
    Security is now becoming a top priority for businesses worldwide, driven by the challenges posed by digital disruption and the continuously expanding threat landscape. Well architected security is regarded as a strategic advantage and security executives are adopting risk and operational driven metrics to communicate and gain mindshare with corporate boards.

    However, aligning security with business outcomes while handling corporate velocity, key innovations, the skills shortage and budgets is still a work in progress. There has been a dearth of guidance on tools and techniques to develop strategies to align security with corporate and business goals.

    Join this thought leadership Splunk webinar, featuring Forrester, to hear from guest speaker Jeff Pollard, VP and Principal Analyst at Forrester Research and Splunk’s Girish Bhat to understand:

    •How to talk to your board about security
    •How aligning security has helped businesses
    •Forrester’s CISO Strategic Canvas
    •How to apply lessons learned to your own organization
  • Kristin Demo Test
    Kristin Demo Test
    Kristin Casey, Director Marketing, WWT Aug 22 2019 5:00 am UTC 7 mins
    This is to demo the BT platform to the team so everyone can see how it works. We want to make sure it doesn't have the same challenges we have with webex event center.
  • 2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    髙岡隆佳, 株式会社シマンテック、エバンジェリスト Aug 22 2019 6:00 am UTC 60 mins
    クラウドセキュリティに関するお客様の認識は、現状と一致していますか?

    シマンテックは、クラウドセキュリティを取り巻く環境についての認識を把握するために、世界中のセキュリティに関する意思決定者を対象に調査を行い、その結果とシマンテックが監視する実際のデータを比較しました。

    株式会社シマンテックのエバンジェリストである髙岡隆佳が、以下についてご説明します。

    • 『2019 年クラウドセキュリティ脅威レポート』の主な内容。
    • セキュリティ脅威の実例、およびクラウドセキュリティに対する認識と進化し続けるクラウドの脅威とのギャップ。
    • ゼロトラストセキュリティアーキテクチャを使った、進化し続ける攻撃への対処方法と、実装のためのベストプラクティス。
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief podcast Aug 22 2019 8:00 am UTC 21 mins
    On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal.
  • Core Banking System Offloading with DataStax Enterprise
    Core Banking System Offloading with DataStax Enterprise
    Maciej Stępień, CEO at Braintri, & Nicolas Soum, DataStax Aug 22 2019 1:00 pm UTC 39 mins
    Load from electronic banking puts strain on your core systems. In this webinar we discuss how to capture data changes in mainframe-based core banking system and replicate them to DataStax Enterprise (DSE) in real time using automatically generated C++ code. Electronic channels are redirected to DSE using existing legacy APIs. The presentation will discuss solution design, innovative approach to automatic code generation and lessons learned from the platform implementation.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • Security Maturity: Bridging the Talent and Skills Gap
    Security Maturity: Bridging the Talent and Skills Gap
    Chris Noell, Senior Vice President, Engineering, and Joey Peloquin, Director, Product Management Aug 22 2019 3:00 pm UTC 60 mins
    Companies of every size and across every industry need to have appropriate resources and solutions to defend against cyber attacks. For many organizations, the myriad of security technologies and solutions, and the volume and tenacity of cyber threats, can make the challenge seem overwhelming to manage on their own. Budgets are tight — it can be a struggle to keep security solutions current, let alone maintain an appropriate number of qualified staff or incorporate critical up-to-date threat research and intelligence in day-to-day operations.

    Join this webinar to hear security experts speak plainly about the challenge of maturing security programs in the age of the talent and skills gap, and alternative solutions that don’t involve the implementation of disparate tools or onboarding of expensive outsourcing providers. SIEMless Threat Management from Alert Logic provides the right level of coverage for the right resources, designed to fit your security needs, without breaking the bank.
  • Meraki Automation – Multi-Org Management
    Meraki Automation – Multi-Org Management
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Aug 22 2019 3:00 pm UTC 45 mins
    Meraki’s Dashboard is a great and powerful tool for network management and monitoring but it’s limited by the very thing that makes it powerful; it has to be everything to everyone and that granularity can make it overwhelming to use on a day-to-day basis. All enterprises, large and small, have their own way of doing things and this pertains to network management and monitoring as well. In this session, you’ll be introduced to APIs, code, and tools that will allow an organization to build out dynamic interactions with the Meraki platform that aligns with the way that their teams do the business of networking.
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Aug 22 2019 5:00 pm UTC 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Microsoft Azure 2 Virtual Machines
    Microsoft Azure 2 Virtual Machines
    Donald E Hester & Robert DeRoeck Aug 22 2019 5:00 pm UTC 90 mins
    Our next session in our continuing series of webcast on Microsoft Azure. In this session we cover virtual machines and virtual machine management. Session will include demos.
    Virtual Machine Planning, Creating Virtual Machines, Virtual Machine Availability, Virtual Machine Extensions
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Accelerating Modernization With Google Anthos
    Accelerating Modernization With Google Anthos
    Chris Kang, Field Solutions Engineer at Google and Mike Koleno, CTO of Cloud Practice, Solstice Aug 22 2019 5:00 pm UTC 45 mins
    Google Cloud's introduction of Anthos promises to bring the best of managed Kubernetes to the cloud infrastructure of your choice, whether you are running private, public or hybrid cloud. This is the first offering of its kind provided by a public cloud provider. We will debunk the myths and provide a real-time look into how Anthos is being deployed and received in the enterprise field today.
  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Aug 22 2019 5:00 pm UTC 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Aug 22 2019 5:00 pm UTC 210 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Brian McClain, Assoc. Principal Product Marketing Manager & Tyler Britten, Sr. Principal Technologist, Pivotal Aug 22 2019 5:00 pm UTC 60 mins
    As the popularity of microservices continues to rise, so does the need for an efficient means of intercommunication. Features such as service discovery, client-side load balancing, and circuit breakers become invaluable tools as the complexity of your landscape grows. Thus, the rising popularity of the service mesh as means of delivering those capabilities.

    While this technology space is still young, Istio and Envoy have already become the tools that many use to solve these problems. The Pivotal Application Service (PAS) integration with these solutions introduced weighted routing and guaranteed service identity—and now we’re bringing these features to Pivotal Container Service (PKS) via the new Pivotal Service Mesh.

    In this webinar, we’ll explore why a service mesh matters and how Pivotal Service Mesh works, and we’ll give you a sneak peak into its future.
  • Control Your Digital Transformation with IT4IT Value Streams
    Control Your Digital Transformation with IT4IT Value Streams
    Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro Focus Aug 22 2019 5:00 pm UTC 60 mins
    Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?

    The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.

    Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.

    Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
  • Gigamon Part #2 - Unleash the Power of True Application Visibility
    Gigamon Part #2 - Unleash the Power of True Application Visibility
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator) Aug 22 2019 5:00 pm UTC 60 mins
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • Key Considerations for a Successful Zero Trust Security Strategy
    Key Considerations for a Successful Zero Trust Security Strategy
    Jimmy Xu, Director, DevSecOps and Cloud Security, Trace3 and Mark Jimenez, Technical Director, Aporeto Aug 22 2019 5:00 pm UTC 60 mins
    Enabling an effective cloud migration strategy requires rethinking static, perimeter-centric data center security for a dynamic and scalable solution that includes protection for every end point in the cloud. A Zero Trust security model is particularly effective for cloud-based applications because it calls for enterprises to leverage microsegmentation and granular perimeter enforcement based on users, their locations and other data to determine whether to trust a user, machine or application seeking access to a particular part of the enterprise. However, most organizations typically have a hybrid environment with applications on-prem as well as in the cloud making a Zero Trust implementation challenging. What is needed is a new identity-based approach to cloud security that enables a Zero Trust posture for any infrastructure, and any workload at scale.

    Aporeto provides comprehensive cloud network security through microsegmentation and secure access to applications and infrastructure using identity rather than IP addresses for a Zero Trust security solution. In this 60 minute webinar Trace3 and Aporeto will discuss the Zero Trust security framework components and what to consider to enable a successful cloud security strategy.

    In this webinar you will learn how:
    Aporeto’s SaaS-based platform allows you to build and enforce distributed policies enabling authentication, authorization and encryption regardless of infrastructure

    Policies remain portable and persistent across workloads including containers, Kubernetes, serverless, service mesh and VMs

    Aporeto provides complete visualization and centralized management of application security across hybrid environments from a single tool
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Aug 22 2019 5:00 pm UTC 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Gaining Decrypted Visibility in Public Cloud with Amazon VPC Traffic Mirroring
    Gaining Decrypted Visibility in Public Cloud with Amazon VPC Traffic Mirroring
    Steve Perkins and Erik Freeland of Nubeva & Anoop Dawani of AWS Aug 22 2019 5:00 pm UTC 60 mins
    Encryption of all traffic in the cloud is a widely adopted best practice. The new TLS 1.3 standard with Elliptic-Curve Diffie Helman (ECDH), perfect forward secrecy and ephemeral keys renders most traditional decryption methods ineffective and out-of-band decryption essentially impossible. Combined with the distributed and elastic nature of cloud computer architectures and the use of third party services, enterprises have been forced to choose between security and visibility or between security and modern architectures.


    Join us for a “How To” webinar covering the newest possibilities for decryption in the public cloud. During the session, Steve Perkins, Chief Product Officer and Erik Freeland, Director of Customer Success at Nubeva, will discuss the complications and opportunities surrounding the new TLS 1.3 protocols. They will walk through how organizations can implement encryption best practices and also gain full decrypted traffic visibility for intrusion detection, threat hunting, incident response and beyond with the newly announced Amazon VPC traffic mirroring and industry-leading open source monitoring tools.