Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Recorded: Feb 22 2018 58 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Speakers:
    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Customer Support through Natural Language Processing and Machine Learning
    Customer Support through Natural Language Processing and Machine Learning Robin Marcenac, Sr. Managing Consultant, IBM, Ross Ackerman, Dir. Digital Support Strategy, NetApp, Alex McDonald, SNIA CSI Recorded: Feb 22 2018 60 mins
    Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.

    NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.

    Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:

    •The challenges of utilizing large quantities of valuable yet unstructured data
    •How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
    •How Watson understands customer language and provides understandable responses

    Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
  • Benefits of a Cloud-First Approach for Modern Enterprises
    Benefits of a Cloud-First Approach for Modern Enterprises Todd Bernhard, Product Marketing Manager Recorded: Feb 22 2018 24 mins
    Is a cloud-first approach right for your organization? Cloud-first offers a leaner, more efficient, and more manageable approach to enterprise functionality than legacy architecture.

    In this webinar learn more about the benefits of having and cloud-first approach, and how it can positively impact your business.
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Recorded: Feb 22 2018 54 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • [Panel] When iOS Code is Leaked: How Companies Can Manage App Security
    [Panel] When iOS Code is Leaked: How Companies Can Manage App Security Jeanne Morain, James Jardine, Don Cox Recorded: Feb 22 2018 62 mins
    Last week it was uncovered that an intern at Apple leaked some of the iPhone's source code was leaked on GitHub.

    The code was for iBoot, a component of the iPhone's OS. While it was an older version of iOS 9 and Apple has declared the leak shouldn't be of concern to the average user, the community has been scratching their heads wondering how sensitive code from a conglomerate like Apple could accidentally be made public.

    We hear about data leaks and security breaches almost on a weekly basis now, but when it comes to something so widely used by global consumers, it poses an even bigger concern that human error could potentially have disastrous results.

    Join this expert panel with moderator Jeanne Morain, Digital & Cloud Strategist, iSpeak Cloud, and panelists James Jardine, CEO & App Security Consultant, Jardine Software, and Don Cox, Advisory Board Member at Netswitch Technology Management and Virtual Rehab, Inc.

    They will discuss and explore the following:

    - What are the potential ramifications of such a breach?
    - Dark web
    - Company costs and impact on brand and PR
    - What are action items companies can do to prevent such a breach from happening?
  • The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My!
    The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My! Marci Parker, Garrison Ball, Meghan Lockwood Recorded: Feb 22 2018 54 mins
    With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
  • 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
    2018 Disaster Recovery Checklist - 5 Key Areas to Improve Storage Switzerland, Unitrends Recorded: Feb 22 2018 63 mins
    Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.
  • Best Practices for IoT Prototyping
    Best Practices for IoT Prototyping Mark Phillips, Helium, Travis Hagens, Google Cloud, & Sunil Shah, Wallo.io Recorded: Feb 22 2018 52 mins
    As a small team, building a service based around wireless sensors can be a daunting task. IoT products specifically can be fraught with distractions in the early days: decisions around what wireless link; what embedded processor; and what cloud and device management service can complicate things for even the most-experienced technical founders. Small teams getting a product to market must be disciplined and focus on solving problems core to their value proposition.

    In this webinar, team members from Helium, Wallo, and Google Cloud IoT Core will share details on how to approach building connected applications and getting first prototypes into the field faster.

    Join us to learn:
    1. Prototyping best practices for IoT connected products
    2. Explanation of Google Cloud IoT Core and Helium
    3. The foundational elements of a sensing and control application
  • IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed
    IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed Hyoun Park and Valicom Recorded: Feb 22 2018 61 mins
    Recommended Audience: CFOs, CIOs, IT Directors, Network Directors, Telecom Directors, Mobility Directors, Enterprise Architects, Procurement Directors

    Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.

    Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.

    In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.

    This Amalgam Insights webinar is generously sponsored by Valicom
  • Optimizando costos y mejorando la eficiencia del Storage en el Data Center
    Optimizando costos y mejorando la eficiencia del Storage en el Data Center Cesar Lorca, SUSE Systems Engineer Recorded: Feb 22 2018 70 mins
    *Esta es la segunda sessión del webinar*

    MÁS CAPACIDAD DE ALMACENAMIENTO POR MENOS
    ¿Por qué optar por un enfoque de software para el almacenamiento empresarial?

    Adoptar correctamente el enfoque de almacenamiento definido por software deberá proporcionarte una solución altamente ampliable que reduzca de manera radical los costes de almacenamiento tanto en gastos de operaciones como de capital. También tiene que ser una solución sencilla, resistente y flexible, y ofrecer una funcionalidad líder del sector.

    Únase a nosotros en este Webinar y saiba más.
  • UC Optimization for Pros
    UC Optimization for Pros Tim Poindexter, VP Marketing | Dave Bottomley, Senior Solutions Engineer Recorded: Feb 22 2018 53 mins
    In today’s business world, communication matters more than ever. People want to communicate in new ways everyday: more channels, more devices, more flexibility. But these demands rely on a new generation of technology, operating in real-time. What happens if the technology isn’t reliable? Digital services to customers are unreachable. Phones stop working. Video conferences crash.

    A small outage can have a big impact. Businesses need to react quickly and get to the root cause to find a solution. They need to ensure their UC is reliable, and optimized.

    Unified communications are the arteries and veins of your organization and its connection to the outside world. Internally, you can’t function properly when there are problems. Externally, you’re paralyzed when there’s an outage. Unified communications keep the heart of the organization pumping.

    Without effective communications and collaboration capabilities, employees are at a competitive disadvantage with slower product development and decision making overall. Reliable communications and collaboration infrastructure that helps employees work efficiently enables your organization to breathe.
  • Stateful containers for DevOps and Beyond
    Stateful containers for DevOps and Beyond Michael Mattsson - Container Technical Marketing Engineer & Stacey Gilmore Product Marketing Recorded: Feb 22 2018 42 mins
    2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
  • SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion
    SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion Tony Banuelos, Product Manager Recorded: Feb 22 2018 33 mins
    En los ultimos diez años el perfil de trafico en redes cambio por completo comparado con los diez años anterior. El “internet of things” (IoT), variaciones y numero de dispositivos conectados a la red, video, imagenes, voz, transacciones de tarjeta de credito, wifi y mucho mas han cambiado las funciones requeridas que redes deben ofrecer. En comercio, especificamente, se deben ofrecer funciones para separar el tipo de trafico que se maneja sobre la misma red. La habilidad de separar trafico de PCI, guest wifi y voz es critico para ofrecer los servicios necesarios dentro de una tienda al por menor. Es aqui donde segmentacion de trafico juega un rol importante dentro de la red.

    Este webinar cubrira los siguientes topicos:

    - Que es segmentacion en relacion a SD-WAN
    - Importancia de segmentacion en tiendas al por menor, ilustrado con usos de caso
    - Demostracion de segmentacion en SD-WAN
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey
    The clock is ticking: GDPR: Act now to accelerate your GDPR journey Robert Arandjelovic and Sunil Choudrie, Symantec Recorded: Feb 22 2018 49 mins
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
  • Panel Discussion: The Road to a Data-Driven Business
    Panel Discussion: The Road to a Data-Driven Business Jen Stirrup, Gordon Tredgold, Joanna Schloss, & Lyndsay Wise Recorded: Feb 22 2018 62 mins
    Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
  • GDPR Data Protection: Your Checklist for Email and File Sharing Protections
    GDPR Data Protection: Your Checklist for Email and File Sharing Protections Timothy Edgar, Privacy Attorney & Brett Dorr, Director of Solutions Engineering at Virtru Recorded: Feb 21 2018 49 mins
    Featuring Timothy Edgar, former national security and intelligence official, cybersecurity expert, privacy attorney and civil liberties activist; and Brett Dorr, Director of Solutions Engineering at Virtru.

    You've got until May 25, 2018 to comply with GDPR guidelines. Are your email and file sharing systems ready?

    In this session, privacy attorney Timothy Edgar and data protection advisor Brett Dorr will provide valuable insights and actionable advice to help you ensure you’re prepared.

    Join us, to understand the relevant areas of concern — especially if you are considering or have already made a move to the cloud.

    Attend this webinar to learn:
    - How GDPR affects all companies doing business in the EU
    - Why email protection is important in GDPR
    - Key areas related to data protection for emails and files
    - What GDPR says specifically about encryption, key management, and access control
    - Technical solutions to help you enable compliance when exchanging personal data by email

    We’re looking forward to answering your GDPR data protection questions.
  • Critical Building Blocks for GDPR Compliance
    Critical Building Blocks for GDPR Compliance Scott Wenzel, BackOffice Associates Recorded: Feb 21 2018 26 mins
    The General Data Protection Regulation (GDPR) requires a strong information governance (IG) foundation to enable organizations to identify where personal data exists and the risks associated with it. Achieving compliance is about effectively setting, managing and auditing data related policies and processes – how a business collects and uses data. Strong data governance will be key as will ensuring that policies and rules are enforced and monitored.

    This session will focus on how Information Governance and Stewardship are critical for ongoing GDPR compliance and addresses key areas such as article 16, article 32 and more.

    Join this webinar to learn more about how to:
    - Enforce governance policies through business processes
    - Automatically apply and enforce your data quality processes and controls on all data in all systems in your organization
    - Apply predictive processing and a guided experience through machine learning
    - Improve data quality as required by article 16 immediate remediation, and ensure rule bindings associated with personal data have a high priority.

    About the presenter:
    Scott Wenzel has over 25 years of technology experience, helping companies integrate, manage, and improve the quality of their data. Scott specializes in Data Governance, Data Integration and Data Quality applications on multiple database and BI platforms and has extensive experience in Regulated Industries, Public Sector, Healthcare, Insurance, and Utility industries. He has spoken at numerous seminars and conferences (SAP SAPPHIRE, ASUG and others) on these and other related topics.
  • GDPR and Email: How To Tackle The Risk In Your Inbox
    GDPR and Email: How To Tackle The Risk In Your Inbox Marc French, Senior Vice President & Chief Trust Officer, Mimecast Recorded: Feb 21 2018 50 mins
    Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.

    But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:

    * Critical areas of GDPR risk in email
    * How to defend email systems and protect data in the face of spiraling attacks
    * Why having the right archive and backup strategy is important
    * The importance of a business continuity plan for email

    About the Speaker:
    Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
  • Are you ready for the new MFA requirements for PCI Compliance?
    Are you ready for the new MFA requirements for PCI Compliance? Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec Recorded: Feb 21 2018 25 mins
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • The Best VMware Public Cloud Backup & DR Options
    The Best VMware Public Cloud Backup & DR Options Storage Switzerland, Druva Recorded: Feb 21 2018 55 mins
    5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
    Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:

    1. No hardware, no software, or deployment hassle
    2. Improved Business Agility
    3. Dynamic DR and Workload Mobility
    4. Simplified Management
    5. Significantly Lower TCO
  • Building a Marketing Analytics Platform with Informatica, Google Cloud & Looker
    Building a Marketing Analytics Platform with Informatica, Google Cloud & Looker Naveen Punjabi, Strategic Technology Partnerships, Google & Erin Franz, Technology Alliances Manager, Looker Recorded: Feb 21 2018 51 mins
    Are you looking for ways to improve the effectiveness of your digital marketing efforts? Having the insight to provide the most relevant engagement across each touchpoint along a customer journey is key. Naveen Punjabi, Strategic Technology Partnerships of Data and Analytics, from Google, and Erin Franz, Technology Alliances Manager, at Looker will share how you can drive actionable marketing campaigns and establish a data-driven, self-service marketing culture by integrating data from across your enterprise to power your marketing campaigns.

    During this webinar, learn how to:
    • Access marketing and customer data from anywhere using Informatica Intelligent Cloud Services
    • Load marketing and customer data into BigQuery to power marketing analytics
    • Visualize and garner insights into all your marketing and customer data with Looker
  • Healthcare orgs: Slay the risks of data-enabling your care providers
    Healthcare orgs: Slay the risks of data-enabling your care providers Mitchell Parker, Indiana University Health, Information Security & Compliance & Salim Hafid, Product Marketing, Bitglass Recorded: Feb 21 2018 59 mins
    The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.

    For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.

    In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.

    Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.
  • Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo?
    Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo? Daniel Olkowski, Dell EMC Feb 23 2018 9:00 am UTC 60 mins
    W tym miesiącu został ogłoszony nowy model Data Domain DD330.
    •Dla kogo jest przeznaczony?
    •Jakie środowiska zabezpiecza?
    •Jakie nowości wprowadza?
    Zapraszam na 30 minutową dyskusję gdzie powiemy o wszystkich szczegółach nowego DD3300.

    Piątek, 23 luty, 10:00, 30 minut.
    Całość informacji w trakcie porannej kawy!

    Zapraszam,
    Daniel Olkowski
  • How to Build IoT solutions Quickly & Easily
    How to Build IoT solutions Quickly & Easily Olivier Bloch, Sr. Program Manager for Microsoft Azure IoT Feb 23 2018 6:00 pm UTC 75 mins
    Are you interested in building innovative IoT solutions to help your company improve efficiencies or create new revenue opportunities – but not sure where to start?

    Whether you’re an app developer, cloud developer or just looking for your next moonlighting project, come learn about the nuts and bolts of Azure IoT development from the experts.

    In this webinar, presented by Olivier Bloch, Sr. Program Manager for Azure IoT at Microsoft, you will learn:

    - How to get started using Azure IoT Hub, IoT Starter Kits and SDKs.
    - How to connect your first devices to Azure IoT Hub.
    - How to manage devices at scale with IoT Hub device management.
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints
    Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints Lawrence Chin, Financial Services Security Architect & Joel Boyd, Director of Endpoint Protection Feb 26 2018 5:00 pm UTC 60 mins
    It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?

    Endpoints were compromised.

    In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.

    Register for our webinar and learn:
    •How cyberattackers bypassed legacy security solutions in recent attacks
    •What you can do to reliably reduce the risk of successful attacks
    •How to prevent unknown threats from compromising your systems, even unpatched ones
  • A Silver Bullet for Zero-day and Ransomware Attacks
    A Silver Bullet for Zero-day and Ransomware Attacks Jason Rose, Senior Security Consultant Feb 26 2018 6:00 pm UTC 60 mins
    How to address the unknown of Zero-day threats and cryptoware variants.

    Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.

    Takeaways:
    Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.

    Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.

    By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.

    With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
  • Cyber Security Update 2018
    Cyber Security Update 2018 Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional Feb 27 2018 9:00 am UTC 60 mins
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • 5 Key Principles for Managing the Multi-Cloud Maze
    5 Key Principles for Managing the Multi-Cloud Maze Matthew Prickett - Cloud Systems Engineer, F5 Networks Feb 27 2018 10:00 am UTC 60 mins
    85% of organisations are committed to a multi-cloud architecture. The other 15% are probably doing it by accident. However, with every additional cloud comes increased operational complexity, a new set of interfaces, and another potential security loophole to worry about.

    Help your organisation nullify these challenges and succeed in a multi-cloud world by providing the key principles, solutions, technologies, and tools that enable you to deliver services consistently, efficiently, and securely across all your clouds.

    In this webinar, you will learn:

    5 key principles including abstraction, standardisation, and automation ‒ the new imperatives for network operations
    How planning for a multi-cloud architecture will help you avoid the pitfalls of disparate environments across multiple cloud providers
    Common use cases that will give you the confidence to deploy your cloud apps in a fast, controlled, and more secure manner
  • HGST SVR2U24 NVMe Storage Server
    HGST SVR2U24 NVMe Storage Server Manfred Berger, HGST - Sr. Mgr. Business Development Platforms EMEAI Feb 27 2018 10:00 am UTC 45 mins
    In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.

    Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
  • Selling SaaS - AWS Customer Tips and Tricks
    Selling SaaS - AWS Customer Tips and Tricks Bernd Greifeneder, Co-Founder and CTO, Dynatrace | Richard Sappe, Snr Business Development, AWS Marketplace Feb 27 2018 1:00 pm UTC 60 mins
    SaaS offerings are already all around us and are more than a longtime discussed "buzzword". Product maturity and market demand grow dramatically and no matter if your customer is a SMB, from Mittelstand or a big DAX enterprise. Cloud is the new normal and most companies are going all-in with a cloud-first strategy. The demand for SaaS-Offerings increases along with this thread.

    But how to start as an Independent Software Vendor? Which options exist to propose a SaaS-offering? Which channel is the right one and which platform supports best to succeed in the market?

    Bernd, Co-Founder and CTO of Dynatrace, will take viewers through the journey of transformation journey of his company to succeed in the ever-changing competitive world of Software.

    Time will be left after the presentation (20 minutes) for open questions and dialogue.
  • The Ins & Outs of Your Ever-Evolving Cloud Security Strategy
    The Ins & Outs of Your Ever-Evolving Cloud Security Strategy Dan Pitman, Senior Solution Architect, Alert Logic Feb 27 2018 2:00 pm UTC 60 mins
    There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.

    Highlights include:

    •Understanding your cloud provider’s security model and where you need to assume security responsibility
    •Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
    •Best practice ideas for ensuring security in any cloud environment

    This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
  • Prevent Costly Data Leaks From SaaS Apps
    Prevent Costly Data Leaks From SaaS Apps Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks Feb 27 2018 2:00 pm UTC 60 mins
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • New Approaches to Creating Modern Business Applications
    New Approaches to Creating Modern Business Applications Phil Simpson, Senior Product Marketing Manager, Red Hat Feb 27 2018 4:00 pm UTC 60 mins
    Today’s businesses require greater responsiveness and agility in meeting fast-paced, user-driven demand for products, services, and information. In turn, applications need to be designed, developed, deployed, and changed quickly when needed and be exposed to multiple channels, including mobile. To get apps to market fast and adapt them on the fly, low-code development tools and approaches are emerging to take the burden off IT and let the business self-serve.

    In this session we'll discuss:
    -How a wide range of technologies are coming together to enable the development of low-code, mobile, cloud-enabled, business automation solutions.
    -Red Hat's approach to building these process-driven, mobile applications.
    - Examples from some of Red Hat's most successful customers.
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • Where’s My Data? Managing the Data Residency Challenge
    Where’s My Data? Managing the Data Residency Challenge Claude Baudoin, owner, cébé IT & Knowledge Management Feb 27 2018 4:00 pm UTC 60 mins
    Introducing the OMG’s Data Residency Maturity Model

    With the rise of managed IT services and cloud computing, sensitive data is regularly moved across countries and jurisdictions, which can be in direct conflict with various international, national or local regulations dictating where certain types of data can be stored (e.g., the European Union’ General Data Protection Regulation, or GDPR). Data residency is also a consideration of data owners responsible for protecting and securing data from unintended access.

    The Object Management Group® (OMG®), a technology standards consortium, launched a working group in 2015 to address the challenges of data residency and define a standards roadmap to help stakeholders manage the location of their data and metadata.

    Given the complexity of the issue, a stepwise improvement plan is necessary. This webinar will introduce a new Data Residency Maturity Model (DRMM) proposed in December 2017. Similar to the Capability Maturity Model (CMM) invented in 1990 at the Software Engineering Institute (SEI), the DRMM contains five maturity levels aimed at helping an organization improve their practices and governance of data residency. The OMG seeks feedback on the DRMM and calls on all interested parties to contribute to this work.
  • Securing Today’s Enterprise The Proof is in the Proxy
    Securing Today’s Enterprise The Proof is in the Proxy Timothy Chiu - Senior Director of Product Marketing, Symantec Feb 27 2018 6:00 pm UTC 30 mins
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • ESG Tests vArmour for Securing Multi-Cloud Workloads
    ESG Tests vArmour for Securing Multi-Cloud Workloads Tony Palmer, Sr. Lab Analyst at ESG; Faraz Aladin, Sr. Director of Marketing at vArmour Feb 27 2018 6:00 pm UTC 60 mins
    The Analysts at Enterprise Strategy Group just wrapped up testing of the vArmour DSS Distributed Security System across physical, virtual, cloud, and container platforms and the results are in.

    Join ESG Senior Lab Analyst, Tony Palmer, along with vArmour Senior Director of Marketing, Faraz Aladin, for a detailed review of the vArmour solution and to see how it performs in the areas of:

    --Application identification, inspection, and protection across a combination of infrastructure platforms

    --Scalability to match compute resources and throughput requirements

    --Automatic security provisioning for new assets

    --Deception capability, ease of use, and efficiency
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Feb 27 2018 6:00 pm UTC 60 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • CEO Insights: 2018's Top Cyber Security Predictions
    CEO Insights: 2018's Top Cyber Security Predictions Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Feb 27 2018 6:00 pm UTC 60 mins
    As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

    Here is a preview of the top 3 predictions that is bound to surprise you.
    - AI will not improve security. You will need Hybrid-AI.
    - The US voting system will undergo major changes
    - A major corporation will get caught with its sticky hands in the cookie jar

    With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

    To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

    About our speaker:
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Amplifying Human Ingenuity with Intelligent Technology
    Amplifying Human Ingenuity with Intelligent Technology Giampaolo Battaglia (Product Marketing Manger), Paul Stubbs, AI Product Marketing, Microsoft Feb 27 2018 6:00 pm UTC 75 mins
    Microsoft Cognitive Services helps day-to-day developers create powerful applications with the capability to think and process information like humans. Learn first-hand about Microsoft Cognitive Services and how you can easily build customer-facing AI applications with Vision, Language, Speech, Knowledge and Search functionality.

    We will also provide an overview of the Cognitive Services API collection (30 APIs), share how customers are using Cognitive Services APIs today and provide demonstrations of how powerful these APIs can be when combined with real world applications.

    Specifically, you’ll see:

    - Our collection of 30 APIs and how to get started in minutes
    - A real-world demo of using AI to solve business problems
    - All the API Keys you can take advantage of, falling under Vision, Speech, Language Knowledge and Search and how to leverage these to innovate your existing technologies.
  • Grow Your MSP Business by Helping Customers Build a Hybrid Cloud
    Grow Your MSP Business by Helping Customers Build a Hybrid Cloud Todd Bernhard, Product Marketing Manager Feb 27 2018 7:00 pm UTC 45 mins
    Many MSPs have long-standing enterprise clients that have hesitated to move to the public cloud. They are held back by legacy on-premises applications and the huge logistical undertaking of migrating them. This has made it difficult for the traditional MSP to embrace the cloud and develop services around the new technology.

    As Enterprises move through their hybrid cloud journey, many will rely on a trusted partner to support them, which presents new opportunities for MSPs to break into the cloud and grow their businesses.

    In this webinar, we run through some of the reasons your customers are ready for hybrid cloud adoption, the challenges they’ll face, and the client services you can offer to help overcome them.
  • Essentials to Creating Your Own Security Posture Using Splunk Enterprise
    Essentials to Creating Your Own Security Posture Using Splunk Enterprise Richard McKee, Cyber Security Incident Response Team, Principal Cyber Security Analyst Feb 28 2018 6:00 am UTC 30 mins
    Attendees will see examples of how the Nevada National Security Site (NNSS) monitors its security posture using Splunk Enterprise. Showcasing real-time dashboards gives the NNSS IT/Cyber Operations the ability to monitor and alert on insider threat activities, incident response, network forensics and more. Using available logs, network flows and other metrics and sources of data commonly found in most environments, the attendee will gain an understanding of how to use Splunk Enterprise for detecting IOCs and create a more mature security posture.
  • Ускорение разработки для СУБД при помощи XtremIO
    Ускорение разработки для СУБД при помощи XtremIO Denis Serov Feb 28 2018 8:00 am UTC 60 mins
    Вы узнаете, какие уникальные преимущества дает XtremIO для сред разработки на примере СУБД Oracle.
    Мы также рассмотрим отличительные особенности XtremIO X2, особенно ценные для данной среды.
  • Modernizing Data Warehouses to scalable Data Lakes with IBM and Hortonworks
    Modernizing Data Warehouses to scalable Data Lakes with IBM and Hortonworks Ashish Kumar - Systems Cognitive Solution Technical Leader & Arun Kumar Lakshminarayanan Partner Solutions Engineer Feb 28 2018 8:00 am UTC 60 mins
    Many customers are transforming their big data analytic capabilities with Hortonworks – through Hortonworks Data Platform (HDP) for data at rest and through Hortonworks DataFlow (HDF) for data in motion. HDP provides a comprehensive platform to help you modernize traditional Data Warehouses to scalable Data Lakes to extend your big data analytic reach.

    In the webinar, we’ll discuss:

    - How to accelerate Data Lake insights and develop business relevant analytics.
    - Transform your data journey by accelerating Modern Data Warehousing with HDP on IBM Power Systems.
    - Some use cases of customers who have benefited by getting more data faster, enabling valuable analytics for better and quicker decision making.

    IBM and Hortonworks have teamed up for a joint webcast to help you modernize Data Warehouses to Data Lakes using HDP as well as share some customer success stories.

    Presenters:
    Ashish Kumar
    IBM Systems Cognitive Solution Technical Leader, IBM
    Arun Kumar Lakshminarayanan
    Partner Solutions Engineer APAC, Hortonworks