Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
The infrastructure you manage with Chef is a complex machine. This complexity is mirrored in the cookbooks you develop and the data stored in your Chef server. It is an ongoing effort to keep track of the state of that machine and to keep up with all the functionality included in your (many) cookbooks. However, the right tools can help. With them, you can develop code faster, maintain cleaner code, and better understand your existing code.
In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will demonstrate how better editor and debugger tools can improve your work life. He’ll show you how the right text editor can make it easier to write code. Next, he’ll demonstrate how tools like Rake and Guard can consolidate tasks and automate tests. Finally, he’ll show you how Pry can help you to debug your recipes.
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
Gestionar la salud en el centro de datos tiene 4 pilares principales: Monitoreo, Análisis, Diagnóstico y Resolución.
En esta sesión estaremos cubriendo estos 4 pilares y por qué son importantes. In this session we will cover these main pillars and why they are important. Les enseñaremos como podemos usar sensores embebidos en el silicio disponible a través de interfaces estandarizadas en sus servidores, ayudando a los profesionales de TI a comenzar a agregar estos pilares en su entorno ya que ayudarán a maximizar con la reducción del tiempo medio de reparación (MTTR) para evitar interrupciones. En el caso de los servidores actuales, vamos a explicar la forma de acceder a ellos de manera remota y solucionar sus problemas con Intel Virtual Gateway.
Aspectos Importantes de los 4 Pilares:
•Monitoreo: Monitoreo automatizado de la salud de los servidores, alertas de fallas, Tablero de visualización y más.
•Análisis: Causa raíz con los detalles de la salud de los servidores, reporte de fallas de dispositivos con indicador de severidad, historial de comportamiento.
•Diagnóstico: Acceso Remoto a través de vKVM, acceso “in-band” integrado, detalles de la salud a nivel componente.
•Resolución: Encendido y apagado remoto, vMedia remoto.
Today’s technology leaders need to tackle the big trends—cloud, big data, the Internet of Things, mobility, social media—while lowering IT spend year over year. That’s a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs. This enables you to deliver software- defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more—all while maintaining the freedom to choose which platform to run on.
In this session you will learn more about the main kinds of software-defined storage technology landscape you’ll likely deploy:
Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.
Many organizations have been taking advantage of virtualization and cloud technologies to reduce server counts, and gain operational advantages. When it comes to business critical workloads such as those running Oracle, migration to virtualization and the cloud has encountered more resistance, and roadblocks.
This presentation will examine industry trends in virtualization and cloud computing for enterprise workloads, such as Oracle, SAP, PeopleSoft, MS SQL Server, etc. Case studies will be presented that explore the advantages of a cloud strategy for mission-critical applications. Strategies for minimizing risk, and maximizing benefits will be provided.
Richard Fichera, VP & Principal Analyst, Forrester Research, Inc. with IT Execs from Paycor & Monterey Peninsula College
Are you considering an x86 server for a new business-critical application, or are you thinking of migrating an existing Unix RISC application to x86? x86 systems and CPU technology have evolved rapidly over the last several years and this platform is now capable of running workloads previously associated with larger proprietary UNIX systems. In addition, both Windows and Linux, the principal operating environments for these servers, have matured to the point where the combination of x86 server and these OS' can handle workloads associated with the largest UNIX systems from as little as three years ago.
Tune into this live webcast with our guest Forrester analyst Richard Fichera as he speaks to the underlying trends driving modern infrastructure, when to consider moving from Unix to Windows or Linux changing principal operating environments, what to look for in an x86 platform and porting guidance. Rich will be joined by two IT executives who will share their business challenges, their decision-making process, and the business benefits they have achieved with their chosen database server solution, followed by a live Q & A.
Ken Moreau, Solutions Engineer, Violin Memory and Carol Bassett, Product Marketing, HP
IT departments are under constant pressure to decrease time-to-data that drives business decisions and allows quick reaction to new market opportunities. Exponential database growth has led to a performance and availability crisis for business critical applications that cannot be solved with software tuning. The problem is I/O and can be solved only by increased I/O through a combination of more powerful servers and a breakthrough in storage performance.
Please join us on this webcast to introduce you to a new, integrated high performance database solution from HP, Violin Memory and Red Hat that solves the I/O issues for business-critical OLTP and BI/DW applications.
Kirk Bresniker, HP - VP, Business Critical Systems, HP and Rory McInerney, Intel - VP, Intel Architecture Group
Data-intensive workloads, such as business processing and decision support, are placing x86 enterprise application environments under tremendous stress - inadequate scaling to handle demanding workloads and exponential data growth; insufficient reliability to handle large single system databases and high density virtualization; and increased management complexity due to server sprawl. Join HP's Kirk Bresniker, Chief Technologist VP, Business Critical Systems, and Intel's Rory McInerney, VP, Intel Architecture Group, as they discuss the features inside the Xeon E7 processor & the ProLiant DL980 G7 server that enable greater scalability and reliability, break-through management efficiencies, & leadership performance, and what this can mean for your business.