Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:
- How does GDPR change the way security is approached by both Internet application developers and security professionals?
- What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?
- How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?
Day 3 of 3 day series:
Day 3 - Focus on Security side of GDPR from a technology perspective
~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
~ Day 2 – Focus on Privacy side of GDPR from a technology perspective
Eric Greenfeder, Primitive Logic Chief Architect
Nathan Wenzler, AsTech Consulting, Chief Security Strategist
Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
Robert Shields, Informatica Director Product Marketing for Data Security
Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.
NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.
Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:
•The challenges of utilizing large quantities of valuable yet unstructured data
•How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
•How Watson understands customer language and provides understandable responses
Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?
Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:
- How to monitor services and apps built on top of containers
- The benefits of transparent instrumentation for metric collection
- Using dashboards to quickly see and share performance data
- How to quickly determine the what and the why of what’s happening in your environment
Last week it was uncovered that an intern at Apple leaked some of the iPhone's source code was leaked on GitHub.
The code was for iBoot, a component of the iPhone's OS. While it was an older version of iOS 9 and Apple has declared the leak shouldn't be of concern to the average user, the community has been scratching their heads wondering how sensitive code from a conglomerate like Apple could accidentally be made public.
We hear about data leaks and security breaches almost on a weekly basis now, but when it comes to something so widely used by global consumers, it poses an even bigger concern that human error could potentially have disastrous results.
Join this expert panel with moderator Jeanne Morain, Digital & Cloud Strategist, iSpeak Cloud, and panelists James Jardine, CEO & App Security Consultant, Jardine Software, and Don Cox, Advisory Board Member at Netswitch Technology Management and Virtual Rehab, Inc.
They will discuss and explore the following:
- What are the potential ramifications of such a breach?
- Dark web
- Company costs and impact on brand and PR
- What are action items companies can do to prevent such a breach from happening?
With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.
As a small team, building a service based around wireless sensors can be a daunting task. IoT products specifically can be fraught with distractions in the early days: decisions around what wireless link; what embedded processor; and what cloud and device management service can complicate things for even the most-experienced technical founders. Small teams getting a product to market must be disciplined and focus on solving problems core to their value proposition.
In this webinar, team members from Helium, Wallo, and Google Cloud IoT Core will share details on how to approach building connected applications and getting first prototypes into the field faster.
Join us to learn:
1. Prototyping best practices for IoT connected products
2. Explanation of Google Cloud IoT Core and Helium
3. The foundational elements of a sensing and control application
Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.
Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.
In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.
This Amalgam Insights webinar is generously sponsored by Valicom
MÁS CAPACIDAD DE ALMACENAMIENTO POR MENOS
¿Por qué optar por un enfoque de software para el almacenamiento empresarial?
Adoptar correctamente el enfoque de almacenamiento definido por software deberá proporcionarte una solución altamente ampliable que reduzca de manera radical los costes de almacenamiento tanto en gastos de operaciones como de capital. También tiene que ser una solución sencilla, resistente y flexible, y ofrecer una funcionalidad líder del sector.
In today’s business world, communication matters more than ever. People want to communicate in new ways everyday: more channels, more devices, more flexibility. But these demands rely on a new generation of technology, operating in real-time. What happens if the technology isn’t reliable? Digital services to customers are unreachable. Phones stop working. Video conferences crash.
A small outage can have a big impact. Businesses need to react quickly and get to the root cause to find a solution. They need to ensure their UC is reliable, and optimized.
Unified communications are the arteries and veins of your organization and its connection to the outside world. Internally, you can’t function properly when there are problems. Externally, you’re paralyzed when there’s an outage. Unified communications keep the heart of the organization pumping.
Without effective communications and collaboration capabilities, employees are at a competitive disadvantage with slower product development and decision making overall. Reliable communications and collaboration infrastructure that helps employees work efficiently enables your organization to breathe.
2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
En los ultimos diez años el perfil de trafico en redes cambio por completo comparado con los diez años anterior. El “internet of things” (IoT), variaciones y numero de dispositivos conectados a la red, video, imagenes, voz, transacciones de tarjeta de credito, wifi y mucho mas han cambiado las funciones requeridas que redes deben ofrecer. En comercio, especificamente, se deben ofrecer funciones para separar el tipo de trafico que se maneja sobre la misma red. La habilidad de separar trafico de PCI, guest wifi y voz es critico para ofrecer los servicios necesarios dentro de una tienda al por menor. Es aqui donde segmentacion de trafico juega un rol importante dentro de la red.
Este webinar cubrira los siguientes topicos:
- Que es segmentacion en relacion a SD-WAN
- Importancia de segmentacion en tiendas al por menor, ilustrado con usos de caso
- Demostracion de segmentacion en SD-WAN
With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.
Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.
Don’t leave it to chance – register now.
Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.
Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
Featuring Timothy Edgar, former national security and intelligence official, cybersecurity expert, privacy attorney and civil liberties activist; and Brett Dorr, Director of Solutions Engineering at Virtru.
You've got until May 25, 2018 to comply with GDPR guidelines. Are your email and file sharing systems ready?
In this session, privacy attorney Timothy Edgar and data protection advisor Brett Dorr will provide valuable insights and actionable advice to help you ensure you’re prepared.
Join us, to understand the relevant areas of concern — especially if you are considering or have already made a move to the cloud.
Attend this webinar to learn:
- How GDPR affects all companies doing business in the EU
- Why email protection is important in GDPR
- Key areas related to data protection for emails and files
- What GDPR says specifically about encryption, key management, and access control
- Technical solutions to help you enable compliance when exchanging personal data by email
We’re looking forward to answering your GDPR data protection questions.
The General Data Protection Regulation (GDPR) requires a strong information governance (IG) foundation to enable organizations to identify where personal data exists and the risks associated with it. Achieving compliance is about effectively setting, managing and auditing data related policies and processes – how a business collects and uses data. Strong data governance will be key as will ensuring that policies and rules are enforced and monitored.
This session will focus on how Information Governance and Stewardship are critical for ongoing GDPR compliance and addresses key areas such as article 16, article 32 and more.
Join this webinar to learn more about how to:
- Enforce governance policies through business processes
- Automatically apply and enforce your data quality processes and controls on all data in all systems in your organization
- Apply predictive processing and a guided experience through machine learning
- Improve data quality as required by article 16 immediate remediation, and ensure rule bindings associated with personal data have a high priority.
About the presenter:
Scott Wenzel has over 25 years of technology experience, helping companies integrate, manage, and improve the quality of their data. Scott specializes in Data Governance, Data Integration and Data Quality applications on multiple database and BI platforms and has extensive experience in Regulated Industries, Public Sector, Healthcare, Insurance, and Utility industries. He has spoken at numerous seminars and conferences (SAP SAPPHIRE, ASUG and others) on these and other related topics.
Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.
But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:
* Critical areas of GDPR risk in email
* How to defend email systems and protect data in the face of spiraling attacks
* Why having the right archive and backup strategy is important
* The importance of a business continuity plan for email
About the Speaker:
Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:
1. No hardware, no software, or deployment hassle
2. Improved Business Agility
3. Dynamic DR and Workload Mobility
4. Simplified Management
5. Significantly Lower TCO
Are you looking for ways to improve the effectiveness of your digital marketing efforts? Having the insight to provide the most relevant engagement across each touchpoint along a customer journey is key. Naveen Punjabi, Strategic Technology Partnerships of Data and Analytics, from Google, and Erin Franz, Technology Alliances Manager, at Looker will share how you can drive actionable marketing campaigns and establish a data-driven, self-service marketing culture by integrating data from across your enterprise to power your marketing campaigns.
During this webinar, learn how to:
• Access marketing and customer data from anywhere using Informatica Intelligent Cloud Services
• Load marketing and customer data into BigQuery to power marketing analytics
• Visualize and garner insights into all your marketing and customer data with Looker
The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.
For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.
In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.
Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.
W tym miesiącu został ogłoszony nowy model Data Domain DD330.
•Dla kogo jest przeznaczony?
•Jakie środowiska zabezpiecza?
•Jakie nowości wprowadza?
Zapraszam na 30 minutową dyskusję gdzie powiemy o wszystkich szczegółach nowego DD3300.
Piątek, 23 luty, 10:00, 30 minut.
Całość informacji w trakcie porannej kawy!
Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.
Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?
Endpoints were compromised.
In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.
Register for our webinar and learn:
•How cyberattackers bypassed legacy security solutions in recent attacks
•What you can do to reliably reduce the risk of successful attacks
•How to prevent unknown threats from compromising your systems, even unpatched ones
How to address the unknown of Zero-day threats and cryptoware variants.
Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.
Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.
Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.
By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.
With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt
Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über
- Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
- Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
- Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
85% of organisations are committed to a multi-cloud architecture. The other 15% are probably doing it by accident. However, with every additional cloud comes increased operational complexity, a new set of interfaces, and another potential security loophole to worry about.
Help your organisation nullify these challenges and succeed in a multi-cloud world by providing the key principles, solutions, technologies, and tools that enable you to deliver services consistently, efficiently, and securely across all your clouds.
In this webinar, you will learn:
5 key principles including abstraction, standardisation, and automation ‒ the new imperatives for network operations
How planning for a multi-cloud architecture will help you avoid the pitfalls of disparate environments across multiple cloud providers
Common use cases that will give you the confidence to deploy your cloud apps in a fast, controlled, and more secure manner
In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.
Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
SaaS offerings are already all around us and are more than a longtime discussed "buzzword". Product maturity and market demand grow dramatically and no matter if your customer is a SMB, from Mittelstand or a big DAX enterprise. Cloud is the new normal and most companies are going all-in with a cloud-first strategy. The demand for SaaS-Offerings increases along with this thread.
But how to start as an Independent Software Vendor? Which options exist to propose a SaaS-offering? Which channel is the right one and which platform supports best to succeed in the market?
Bernd, Co-Founder and CTO of Dynatrace, will take viewers through the journey of transformation journey of his company to succeed in the ever-changing competitive world of Software.
Time will be left after the presentation (20 minutes) for open questions and dialogue.
There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.
•Understanding your cloud provider’s security model and where you need to assume security responsibility
•Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
•Best practice ideas for ensuring security in any cloud environment
This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.
Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
•A real-world customer journey for complete data security in SaaS.
•Common threats leading to data leaks from popular SaaS apps.
•Benefits of adopting a platform approach to SaaS security.
Today’s businesses require greater responsiveness and agility in meeting fast-paced, user-driven demand for products, services, and information. In turn, applications need to be designed, developed, deployed, and changed quickly when needed and be exposed to multiple channels, including mobile. To get apps to market fast and adapt them on the fly, low-code development tools and approaches are emerging to take the burden off IT and let the business self-serve.
In this session we'll discuss:
-How a wide range of technologies are coming together to enable the development of low-code, mobile, cloud-enabled, business automation solutions.
-Red Hat's approach to building these process-driven, mobile applications.
- Examples from some of Red Hat's most successful customers.
95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,
The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.
During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
-2018 Global Cloud Data Security Findings
-Compliance and cloud security: How will this work?
-A shift in the budget: Where is IT spending their money?
-Country breakdown of IT cloud security: Who is doing the best?
-What can you do to secure the cloud and comply with regulations?
Introducing the OMG’s Data Residency Maturity Model
With the rise of managed IT services and cloud computing, sensitive data is regularly moved across countries and jurisdictions, which can be in direct conflict with various international, national or local regulations dictating where certain types of data can be stored (e.g., the European Union’ General Data Protection Regulation, or GDPR). Data residency is also a consideration of data owners responsible for protecting and securing data from unintended access.
The Object Management Group® (OMG®), a technology standards consortium, launched a working group in 2015 to address the challenges of data residency and define a standards roadmap to help stakeholders manage the location of their data and metadata.
Given the complexity of the issue, a stepwise improvement plan is necessary. This webinar will introduce a new Data Residency Maturity Model (DRMM) proposed in December 2017. Similar to the Capability Maturity Model (CMM) invented in 1990 at the Software Engineering Institute (SEI), the DRMM contains five maturity levels aimed at helping an organization improve their practices and governance of data residency. The OMG seeks feedback on the DRMM and calls on all interested parties to contribute to this work.
While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
different network, end-point and gateway technologies.
Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.
The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
(the other being e-mail).
Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.
We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!
During the live demo will walk you through what Sysdig Secure can do:
-Implement application and service aware policies
-Block incoming attacks and container break-ins
-Audit executed commands
-Intrusion forensics: pre and post attack investigation
-Unify monitoring & security workflows
As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.
In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.
Here is a preview of the top 3 predictions that is bound to surprise you.
- AI will not improve security. You will need Hybrid-AI.
- The US voting system will undergo major changes
- A major corporation will get caught with its sticky hands in the cookie jar
With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.
To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.
About our speaker:
Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
Microsoft Cognitive Services helps day-to-day developers create powerful applications with the capability to think and process information like humans. Learn first-hand about Microsoft Cognitive Services and how you can easily build customer-facing AI applications with Vision, Language, Speech, Knowledge and Search functionality.
We will also provide an overview of the Cognitive Services API collection (30 APIs), share how customers are using Cognitive Services APIs today and provide demonstrations of how powerful these APIs can be when combined with real world applications.
Specifically, you’ll see:
- Our collection of 30 APIs and how to get started in minutes
- A real-world demo of using AI to solve business problems
- All the API Keys you can take advantage of, falling under Vision, Speech, Language Knowledge and Search and how to leverage these to innovate your existing technologies.
Many MSPs have long-standing enterprise clients that have hesitated to move to the public cloud. They are held back by legacy on-premises applications and the huge logistical undertaking of migrating them. This has made it difficult for the traditional MSP to embrace the cloud and develop services around the new technology.
As Enterprises move through their hybrid cloud journey, many will rely on a trusted partner to support them, which presents new opportunities for MSPs to break into the cloud and grow their businesses.
In this webinar, we run through some of the reasons your customers are ready for hybrid cloud adoption, the challenges they’ll face, and the client services you can offer to help overcome them.
Attendees will see examples of how the Nevada National Security Site (NNSS) monitors its security posture using Splunk Enterprise. Showcasing real-time dashboards gives the NNSS IT/Cyber Operations the ability to monitor and alert on insider threat activities, incident response, network forensics and more. Using available logs, network flows and other metrics and sources of data commonly found in most environments, the attendee will gain an understanding of how to use Splunk Enterprise for detecting IOCs and create a more mature security posture.
Many customers are transforming their big data analytic capabilities with Hortonworks – through Hortonworks Data Platform (HDP) for data at rest and through Hortonworks DataFlow (HDF) for data in motion. HDP provides a comprehensive platform to help you modernize traditional Data Warehouses to scalable Data Lakes to extend your big data analytic reach.
In the webinar, we’ll discuss:
- How to accelerate Data Lake insights and develop business relevant analytics.
- Transform your data journey by accelerating Modern Data Warehousing with HDP on IBM Power Systems.
- Some use cases of customers who have benefited by getting more data faster, enabling valuable analytics for better and quicker decision making.
IBM and Hortonworks have teamed up for a joint webcast to help you modernize Data Warehouses to Data Lakes using HDP as well as share some customer success stories.
IBM Systems Cognitive Solution Technical Leader, IBM
Arun Kumar Lakshminarayanan
Partner Solutions Engineer APAC, Hortonworks