Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Databases: The Neglected Technology in DevOps
    Databases: The Neglected Technology in DevOps Sanjay Challa - Head of Product Marketing. Datical Recorded: Aug 15 2018 62 mins
    Much has been written about software delivery in DevOps, with much less focus on the database. However, DevOps can—and should—play an equally critical role in both software and database development. In this webinar, we examine how DevOps can be used for database development and delivery, factors influencing DevOps’ role in database delivery, and some of the technologies designed to help.


  • Take the Safer Road: Best Practices in SaaS Application Security
    Take the Safer Road: Best Practices in SaaS Application Security Doug Cahill (ESG) Recorded: Aug 15 2018 40 mins
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • HIPAA-Aware Security Breach Prevention Policies for Email
    HIPAA-Aware Security Breach Prevention Policies for Email Simon Reddington, Technical Product Manager, Healthcare Practice Recorded: Aug 15 2018 32 mins
    Healthcare is the number one industry where employees are the predominant data security breach and compliance threat. 62% of breaches tend to be associated with unintentional outbound email misdelivery. In the context of ever increasing expectations on healthcare workers and reliance on electronic communication, it has become critical for IT security professionals to develop strategies to mitigate security breaches related to the release of protected health information (PHI).

    Join this summit session to learn how organizations are automating security breach policy oversight with pre-defined, HIPAA-aware data leak prevention policies that can be rapidly configured and then applied to a healthcare organization’s entire local or distributed workforce.

    Presenter Info:

    Simon Reddington, Technical Product Manager, Healthcare Practice

    Simon is a Technical Product Manager at Mimecast. Prior to joining Mimecast in 2013, he held technical roles at companies such as WorkShare and Fuel-IT Ltd. He has domain expertise around cloud computing and virtualized environments, Windows Server, Microsoft Exchange, and network administration. He holds a BSc in Computer Science, with Honors, from the University of Essex.
    David Hood, Cyber Security Strategist and Director of Technology Marketing, Healthcare Practice
    David is a Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.
  • Single Realm Multi-Cloud Security Management with Palo Alto Networks
    Single Realm Multi-Cloud Security Management with Palo Alto Networks Peter Meister, Sr. Director, Research & Strategy Recorded: Aug 15 2018 59 mins
    Customers across the globe are moving past mono-cloud operations and driving fast to consume cloud capabilities from multi-cloud providers. As clients start to use this broad multi-cloud fabric, it becomes ever more important to start to look at new and innovative ways to centralize management and security.

    In this session we will cover the new paradigm of thinking around Realm Management, the ability to manage multi-cloud infrastructure security from one central point of management and start collapsing the cloud providers down to a mission-critical cloud fabric. With the Palo Alto product family under the VM Series platform in coupling with Panorama, we are able to bring to life a single pane of glass management initiative that allows for central security, control and management of Microsoft Azure and Amazon Web Services in one console. We will review the technical architecture surrounding this solution and discuss, in-depth, the principal around realm management of multi-cloud and how best to centralize security once and push across many cloud providers at scale.

    Enterprise customers are moving quickly to multi-cloud consumption, and single realm security management will optimize and enhance the way they manage enterprise cloud security going forward.
  • Cloud Security Foundations
    Cloud Security Foundations Doug Cahill (ESG) Recorded: Aug 15 2018 33 mins
    Cloud access security brokers (CASB) provide visibility and control for cloud applications (SaaS, PaaS, and IaaS), and an increasingly important part of a CASB solution is to extend data loss protection for data stored in the cloud.

    In this session, ESG Senior Analyst Doug Cahill, will discuss cloud trends and how deploying enterprise-class DLP and CASB solutions together can provide key value for your business, including:

    - Cloud Adoption Trends
    - Who is the “user”?
    - Understanding The Shared Responsibility Security Model
    - The Role of DevOps in Cloud Security
    - The Rise of the Cloud Security Architect
  • Salesforce Monitoring Best Practices
    Salesforce Monitoring Best Practices Angelique Medina, Sr. Product Marketing Manager, ThousandEyes Recorded: Aug 15 2018 40 mins
    Salesforce is a SaaS leader, powering Customer Service, Marketing and Sales for enterprises all over the globe. Yet too many organizations run into user experience issues due to external dependencies such as ISPs, DNS and secure web gateways impacting availability and performance. Without visibility into those dependencies, you’re operating blind and exposed to a large business continuity risk.

    Join us for our third webinar in our SaaS series where we’ll share:

    -How Salesforce service delivery works and monitoring best practices to de-risk adoption and ensure optimal performance
    -Real-world use cases where Network Intelligence uncovered the root cause of performance issues
    -Hands-on demonstrations of using ThousandEyes for Salesforce visibility
  • What's Breaking Your VMware Backups? And How You Can Fix Them Quickly
    What's Breaking Your VMware Backups? And How You Can Fix Them Quickly George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Aug 15 2018 60 mins
    Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder.

    Please join George Crump, Lead Analyst at Storage Switzerland and our guest speaker W. Curtis Preston, Chief Technical Architect at Druva, for a discussion on the new challenges with VMware backups, and how to address them successfully.

    The Top 5 Reasons VMware Backups Still Break
    * Lack of Auto-Discovery
    * Lack of Full Cloud Support
    * Too Much Backup Infrastructure
    * Expensive and Complicated Disaster Recovery
    * No VMware on AWS Support
  • Enhance Application Security with Automated, Open-Source Security Management
    Enhance Application Security with Automated, Open-Source Security Management Dave Meurer, Alliances Technical Manager at Black Duck by Synopsys, Kamala Dasika, Pivotal Recorded: Aug 15 2018 60 mins
    Almost every major company uses or builds software containing open-source components today—96% of them, according to a report from Black Duck by Synopsis. The same report revealed that 78% of the apps that were audited had at least one vulnerability, including several that were reported nearly six years ago! Needless to say, not having solid open-source use policies and procedures in place for your developers poses a significant risk to any enterprise.

    Black Duck and Pivotal collaborated to deliver a secure and simple user experience for rapidly building and deploying applications so that developers can benefit from the many advantages of using open source in their apps with confidence.
    Join Dave Meurer from Black Duck and Kamala Dasika from Pivotal as they discuss:

    - Key security concepts you need to know pertaining to cloud-native application development
    - How to simplify and automate open-source security management for your applications and reduce license, operational risk, or policy violations

    Dave Meurer, Alliances Technical Manager at Black Duck by Synopsys, leads solution development, enablement, and evangelism for Synopsys Software Integrity Group.

    Kamala leads GTM with Pivotal Cloud Foundry Technology partners. She has been working at Pivotal since 2013 and has previously held various product or engineering positions at VMware, Tibco, SAP, and Applied Biosystems.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    BlackDuck Privacy Statement:
    https://www.blackducksoftware.com/legal/privacy

    This webinar:
    https://content.pivotal.io/webinars/aug-15-enhance-application-security-with-automated-open-source-security-management-webinar
  • Advanced Threat Protection: Email Best Practice Recommendations Webinar
    Advanced Threat Protection: Email Best Practice Recommendations Webinar Jimmy Lin Recorded: Aug 15 2018 50 mins
    The purpose of this webinar is to make sure our ATP Email customers are aware of all the services within this solution and that they are configured to our recommended best practices.

    The ATP Email solution consists of the following services:

    Click-time URL Protection
    Cynic sandboxing
    Auto remediation for Office 365
    Advanced Email Analytics
    Phishing Readiness
  • Top Drivers for SD-WAN Adoption
    Top Drivers for SD-WAN Adoption Scott Raynovich, Principal Analyst, Futuriom Recorded: Aug 15 2018 45 mins
    Huge demand for cloud services means huge demand for wide area network (WAN) connectivity, security, and bandwidth. It has also changed enterprise network architectures and created new challenges for Chief Information Officers (CIOs) and IT managers in charge of building networks and purchasing bandwidth for their company. The need for fast, secure access to cloud applications, demand for services and app agility, and the desire to leverage Internet connectivity is boosting demand for software-defined WAN (SD-WAN), which has more flexibility and better economics than traditional WANs.

    Tune in as Futuriom Principal Analyst R. Scott Raynovich recaps the findings of its recent SD-WAN Growth Outlook, detailing what’s driving fast adoption for SD-WAN technologies.
  • Adote uma arquitetura de aplicações que garanta o sucesso
    Adote uma arquitetura de aplicações que garanta o sucesso Wagner Brunca Recorded: Aug 15 2018 68 mins
    A tecnologia digital melhora significativamente a economia e as capacidades de cada negócio, mas apenas mediante a assimilação das regras e dos sistemas que regem as experiências digitais, as operações digitais, os ecossistemas digitais e a inovação digital. Quando os líderes empresariais veem a tecnologia como um ativo empresarial que é fundamental para o sucesso, estão em condições de se transformar. Os benefícios são enormes: aqueles que os alcançam conseguem envolver seus clientes, criar ofertas, aproveitar sócios e operar seus negócios dez vezes mais rápido e dez vezes mais barato.
    Acompanhe-nos neste webinar e conheça elementos da arquitetura de aplicações modernas que todos os líderes empresariais deveriam conhecer: nuvem, API, microsserviço, análise, IoT e automatização.
  • IT Steps Up: Strategic Enabler of Transformation
    IT Steps Up: Strategic Enabler of Transformation Melanie Posey & Dan Thompson, 451 Research and Charisse Richards, Iron Mountain Recorded: Aug 15 2018 60 mins
    State of Transformation: Hybrid IT Progress Report from the perspectives of the IT executive and the IT practitioner. Organizations are accelerating their digital transformation efforts to keep pace with changing customer expectations. In the digital era, business innovation is highly IT-dependent, thus creating an expanded role for IT organizations in today’s enterprises. Forward-looking IT leaders are embracing the challenge, which entails not only the traditional IT task of “keeping the lights on” but also development and maintenance high-performance hybrid IT environments that provide the scale, speed and operational efficiency required to harness the potential of data and data-centric technologies to drive business value and competitive differentiation.

    In this session, Melanie Posey and Dan Thompson of 451 Research and Charisse Richards of Iron Mountain will discuss:
    • Hybrid IT: an update on uptake
    • Key attributes of “strategic” IT organizations and the role of IT as a as a strategic enabler of digital transformation
    • Hybrid IT and the role of third-party service providers in harnessing the big data beast
    • IT/line-of-business alignment in the digital era
  • Understanding the Limitations of Microsoft O365 Security
    Understanding the Limitations of Microsoft O365 Security Mike Osterman (Osterman Research) Recorded: Aug 15 2018 26 mins
    Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

    In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

    - Organizations’ key priorities for securing O365
    - Barriers to adoption and full migration of users
    - Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

    Presenter: Mike Osterman, CEO and Founder, Osterman Research
  • The State of Cybersecurity in the Healthcare Industry
    The State of Cybersecurity in the Healthcare Industry Juanita Koilpillai, Mark Rasch and Dr. Jerald Dawkins Recorded: Aug 15 2018 62 mins
    In this session we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature.
    In this session we will examine:
    - What are the vulnerabilities to the Healthcare sector?
    - What are the NIST Cybersecurity Framework implications?
    - What are some immediate best practices?
  • The Future of Work in the 21st Century: Multigenerational Teams
    The Future of Work in the 21st Century: Multigenerational Teams Monique Morrow, President & Co-Founder, The Humanized Internet Recorded: Aug 15 2018 51 mins
    The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.

    Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.

    Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
  • Mastering Policy Setting and Control in the Cloud
    Mastering Policy Setting and Control in the Cloud Andras Cser (Forrester) Recorded: Aug 15 2018 28 mins
    Extending the necessary control and policies in the cloud can be a daunting task for many enterprise customers. But with the right tools in place, it doesn’t have to be that way.

    Join guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting. In this 30-minute session, Andras will discuss:

    - The need to protect SaaS data… AND across the IaaS and PaaS platforms
    - The importance of automation
    - The pros and cons of the architectural approaches

    Presenter: Andras Cser, Vice President, Principal Analyst serving Security and Risk professionals, Forrester
  • Speed to Value: How To Justify Your Big Data Investments
    Speed to Value: How To Justify Your Big Data Investments Amit Duvedi, VP of Business Value Engineering, Qubole Recorded: Aug 15 2018 55 mins
    Every investment in big data, whether people or technology, should be measured by how quickly it generates value for the business. While big data uses cases may vary, the need to prioritize investments, control costs and measure impact is universal.

    Like most CTOs, CIOs, VPs or Directors overseeing big data projects, you’re likely somewhere in between putting out fires and demonstrating how your big data projects are driving growth. If your focus, for example, is improving your users’ experience you need to be able to demonstrate a clear ROI in the form of higher customer retention or lifetime value.

    However, in addition to driving growth, you’re also responsible for managing costs. Here’s the rub-- if you’re successful in driving growth, your big data costs will only go up. That’s the consequence of successful big data use cases. How then, when you have success, do you limit and manage rising cloud costs?

    In this webinar, you’ll learn:

    - How to measure business value from big data use cases
    - Typical bottlenecks that delay time to value and ways to address them
    ​- Strategies for managing rising cloud and people costs
    - How best-in-class companies are generating value from big data use cases while also managing their costs
  • Getting DNS Out of the Garage: Moving Up to Enterprise Scale
    Getting DNS Out of the Garage: Moving Up to Enterprise Scale Jonathan Lewis, VP Product Marketing at NS1 & Eric Hanselman, Chief Analyst at 451 Research Recorded: Aug 15 2018 59 mins
    Internal DNS has become a performance and operational bottleneck for modern enterprises. Legacy systems typically come in 2 flavors - either a “build your own” solution using complex, open-source platforms, or expensive, proprietary appliances. Each option presents its own significant challenges and ignores needs like traffic management and application optimization.

    Join 451 Research and NS1 as we explain why DNS is a huge opportunity for enterprises looking to improve their automation, scale, and application performance initiatives. This webinar will present an in-depth overview of the changing digital landscape, how it’s affected by internal DNS, and practical alternatives for you to look at, today.
  • Tokenization: Ready for Prime Time
    Tokenization: Ready for Prime Time Mark Royle, Sr. Manager, Solutions Partner Marketing & Eric Wolff, Sr. Manager, Product Marketing, Thales eSecurity Recorded: Aug 15 2018 61 mins
    The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats. Individuals and businesses need to combat these threats to secure their own assets and reputations as well as to comply with increasingly numerous and rigorous regulations, such as GDPR. Among the tools that protect the data itself by making it unusable, should it be stolen, is tokenization. Tokenization protects sensitive data by substituting non-sensitive data.

    In this webinar, we will examine the key elements of a tokenization solution as well as reviewing several example use cases.

    • Understand the problems tokenization addresses
    • Describe the architectures needed to support tokenization
    • Review relevant tokenization use cases
  • Automatización:  Imprescindible para la transformación digital
    Automatización: Imprescindible para la transformación digital Marcelo Devesa y Mauricio Romero Recorded: Aug 15 2018 41 mins
    El mundo actual de los negocios es más competitivo que nunca, ya que los avances en tecnología afectan a todas las industrias. Para seguir siendo relevante, usted debe liberar recursos para centrarse en los imperativos estratégicos que generan ingresos, retienen clientes y aumentan la agilidad.
    Por esa razón, la automatización debe ser el punto #1 en su paquete de Transformación Digital. En una era de disrupción digital, no hay lugar para la complacencia. La automatización no solo le permite hacer frente a la transformación digital, sino que le permite capitalizarla.
    Acompáñenos en este Webinar y conozca cómo las soluciones de automatización de CA logran todo esto al automatizar todos los procesos de negocio para hacer realidad una empresa ágil totalmente automatizada que le permita entre otras cosas, liberar sus recursos para tareas más estratégicas.
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018 John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Aug 15 2018 75 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Evaluating a modern BI platform
    Evaluating a modern BI platform Josh Parenteau, Market Intelligence Director & Michael Hetrick, Senior Product Marketing Manager, Tableau Recorded: Aug 15 2018 52 mins
    Satisfying the self-service needs of the business while maintaining governance may seem like an either/or choice. It’s not. Learn the core attributes that IT must consider when evaluating and selecting a modern analytics platform.

    Join this live webinar to learn:

    - Why moving from Traditional to Modern analytics is needed in today’s business landscape
    - What to consider when evaluating Modern Business Intelligence and Analytics platforms
    - How shifting to enterprise self-service analytics tools empowers both the business and IT
  • Meet Cloud Content Management
    Meet Cloud Content Management Rand Wacker VP Enterprise Product and Head of Product Marketing, Box Recorded: Aug 15 2018 44 mins
    Digital transformation is driving organizations to rethink the way they work. Businesses are under intense pressure to quickly swap old processes for new ones and do more with all the content that's the lifeblood of the business

    Join us to:
    Hear how to effectively and securely manage your content flow with Cloud Content Management
    See a demo that will show you how easy Box makes it to collaborate from anywhere, simplify and streamlines processes, and securely integrate with existing applications — all from a platform that provides native security, governance and compliance
  • Kubernetes Training for Enterprise DevOps
    Kubernetes Training for Enterprise DevOps Jim Bugwadia Recorded: Aug 14 2018 65 mins
    Kubernetes provides a rich set of tools for DevOps teams to describe, run, and manage different types of workloads. In this session, Jim discusses the Kubernetes architecture and then dives into the main concepts for cluster operations as well as controllers used to model Kubernetes applications. The session includes a demo of creating clusters, deploying and managing applications.
  • Kubernetes For Developers
    Kubernetes For Developers Deen Ariff Recorded: Aug 14 2018 9 mins
    Kubernetes has a number of different components that developers can use to model their applications. In this introductory video, Deen explains the basics of the Kubernetes workload APIs and discussing concepts like Pods. The video also shows how easy it is to deploy, run, and manage Kubernetes workloads with Nirmata, without having to deal with complex interfaces.
  • SUSE OpenStack Cloud 8
    SUSE OpenStack Cloud 8 Hargitai Zsolt Aug 16 2018 8:00 am UTC 90 mins
    Az OpenStack Pike kiadására épülő SUSE OpenStack Cloud 8 az első olyan verzió, amely integrálja a SUSE OpenStack Cloud képességeit és a SUSE által tavaly megvásárolt HPE OpenStack technológiákat. A megoldás felgyorsítja a szoftveresen vezérelt infrastruktúrák bevezetését, emellett továbbfejlesztett interoperabilitása, skálázhatósága és rugalmassága révén támogatja a nagyvállalatokat az IT-rendszer modernizálásában, és ezen keresztül az éles piaci versenyben jelentkező, új üzleti kihívások legyőzésében is. A webinárban bemutatjuk a termék legfontosabb újdonságait, valamint a legfontosabb felhasználási területeket, beleértve a szoftver alapú hálózatokat (SDN) és a konténereket. További információ a termékről: https://www.suse.com/products/suse-openstack-cloud/
  • Das Geheimnis erfolgreicher Unternehmen
    Das Geheimnis erfolgreicher Unternehmen Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Aug 16 2018 1:00 pm UTC 45 mins
    Nur wer seine Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Enable SAP Predictive Maintenance/Analytics with IoT Data
    Enable SAP Predictive Maintenance/Analytics with IoT Data Roland Wartenberg, Senior Director, Global Alliances, NetApp and Juergen Hamm, SAP Solution Architect, NetApp Aug 16 2018 3:00 pm UTC 60 mins
    Out of a variety of projects, NetApp has developed a five-staged model to solve the challenge of data management in the Internet of Things domain. In this session you will learn how SAP helps customer get ready for the digital journey using SAP Business Objects for Analytics and SAP HANA. We will show, based on a real-world scenario, how IoT data are processed for predictive analytics and how a hybrid model with SAP Leonardo can be deployed.

    Key Takeaways:
    - Understand how SAP, Hadoop, and NetApp work well together
    - Learn how predictive analytics could be applied to IoT data
    - See the integration of NetApp into several SAP IoT related products
  • Webinar: Aproveche el potencial de las identidades digitales de los consumidores
    Webinar: Aproveche el potencial de las identidades digitales de los consumidores Juan Cerchia Aug 16 2018 3:00 pm UTC 75 mins
    Los consumidores de hoy no quieren esperar al servicio de atención al cliente por teléfono. Los consumidores de hoy no quieren completar formularios largos en línea para acceder a información o recursos. En resumen, el tiempo de los consumidores de hoy es valioso y no ilimitado. Como resultado, cada compañía está redefiniendo su experiencia digital en línea para maximizar la participación del cliente, mejorar la afinidad de la marca y aumentar su participación en la cartera del consumidor.

    Esta es su oportunidad para aprender cómo aprovechar la identidad digital del consumidor para fomentar una estrategia efectiva de participación del cliente. Únase a nosotros, en este Webinar y conozca casos de éxito de múltiples industrias que están explotando el poder de la identidad digital del consumidor para generar confianza y hacer que la interacción con el cliente no tenga fricciones.
  • Solving the Gordian Knot of DevOps in the Hybrid Cloud
    Solving the Gordian Knot of DevOps in the Hybrid Cloud Darren Pulsipher Aug 16 2018 4:00 pm UTC 60 mins
    As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
  • VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure
    VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure Mark Geel Aug 16 2018 4:00 pm UTC 60 mins
    The new VxBlock 1000 breaks the physical boundaries of traditional converged infrastructure to give businesses unprecedented simplicity and flexibility to meet all their application data services needs. Learn how this next-generation engineered system provides unmatched choices of market-leading storage, data protection, and compute for all workloads to maximize system performance and utilization.
  • Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
    Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring Andrew Bragdon, Principal Product Manager, MuleSoft Aug 16 2018 4:00 pm UTC 60 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:
    * Measure application performance across APIs and integrations in production
    * How to query and retrieve log data across your network
    * End-to-end walkthrough of priority issue identification and resolution
    * Exciting new capabilities of Anypoint Monitoring
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Aug 16 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • 200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System
    200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System John Maddison, SVP Products & Solutions, Fortinet Aug 16 2018 4:00 pm UTC 60 mins
    The security challenges facing organizations today can't be solved with traditional approaches. Digital transformation is creating an unending digital attack surface, point solutions are creating unprecedented complexity, and threats are constantly becoming more sophisticated.

    Watch our webinar to learn how FortiOS, the most deployed network security operating system in the world, solves today's security challenges with broad coverage, massive integrations, and time-saving automation. Specifically, learn the details on revolutionary new features that deliver better protection in all areas of the network.
  • Aproveite o potencial das identidades digitais dos consumidores
    Aproveite o potencial das identidades digitais dos consumidores Darcio Takara Aug 16 2018 5:00 pm UTC 75 mins
    Os consumidores da atualidade não querem ficar esperando no serviço de atendimento ao cliente por telefone. Os consumidores da atualidade não querem preencher longos formulários on-line para acessar informações ou recursos. Resumindo, o tempo dos consumidores da atualidade é valioso e limitado. Assim, cada empresa está redefinindo sua experiência digital on-line para maximizar a participação do cliente, melhorar a afinidade da marca e aumentar a participação na carteira do consumidor.

    Esta é a sua oportunidade de aprender como aproveitar a identidade digital do consumidor pra fomentar uma estratégia efetiva de participação do cliente. Junte-se a nós, neste webinar e conheça casos de sucesso de diversas indústrias que estão explorando o poder da identidade digital do consumidor para gerar confiança e fazer com que a interação com o cliente não tenha atritos.
  • Defending our Critical Infrastructure
    Defending our Critical Infrastructure Juanita Koilpillai and Mark Rasch Aug 16 2018 5:00 pm UTC 90 mins
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • How to Develop a Secure Cloud Strategy
    How to Develop a Secure Cloud Strategy Brian McHenry, Security Solutions Architect; Tom Thomas, Director of Architecture Aug 16 2018 5:00 pm UTC 60 mins
    How are you deciding what applications should move to the cloud? Is there a clear understanding of how to best secure those apps?

    Join F5’s own Director of Architecture Tom Thomas, and Security Solutions Architect Brian McHenry, as they discuss a deployment framework which you can use to assess the impact of on-premises versus cloud, while considering the business, data security, and financial impact of cloud migration.

    By the end of this webinar you’ll have the answers to these questions and more:

    • Are the security services my cloud provider offers enough to secure my applications?
    • How much of my business should migrate to the cloud?
    • What tools can help protect against the cost of lost or compromised data?
  • Leveraging Security Automation for Improved Management
    Leveraging Security Automation for Improved Management Ken Wilson, Dir, Sales Central U.S., Skybox, Michael Roling, CISO, State of MO; Curtis Dukes, CIS; Brandon Dunlap (Moderator) Aug 16 2018 5:00 pm UTC 75 mins
    Security automation technologies can help drive improvements in managing security policies, including their implementation in firewalls and other network devices. However, whether you’re struggling with continuous compliance, auditing and reporting or managing firewall changes, deciding what to automate can be challenging. Join Skybox Security and (ISC)2 on August 16, 2018 at 1:00PM Eastern for a discussion where we’ll examine which automated processes in security policy management deliver the biggest rewards while introducing the least risk to your organization. Areas to be examined include why automation, visibility and context should be the indivisible, foundational components of any security policy management solution, which processes in security policy management are ripe for automation and where human intervention is still valuable. We’ll also explore how to educate security stakeholders in your organization on what’s needed to make automation initiatives a success.
  • Your Organization's Role in the Shared Responsibility Model
    Your Organization's Role in the Shared Responsibility Model Todd Bernhard, CloudCheckr Product Marketing Manager Aug 16 2018 6:00 pm UTC 45 mins
    A Guide to Understanding and Taking Control

    There is no doubt managing massive amounts of enterprise data is inherently easier in the public cloud. However, given its size, that data is a target for malicious security threats from attackers both within and outside organizations. While leading cloud platforms like Amazon Web Services and Microsoft Azure can help ease the burden of cloud migration, they are not responsible for the comprehensive security and compliance checks necessary to keep your data safe in the cloud. That’s why next-generation automated cloud monitoring and security management tools like CloudCheckr are essential for closing the loop.

    In this webinar, Product Marketing Manager Todd Bernhard maps out shared responsibility models for AWS and Azure and explains how CloudCheckr keeps your data secure and compliant.
  • Secure your customer’s Office 365 environment with leading security solutions
    Secure your customer’s Office 365 environment with leading security solutions Chris Taylor -Director, Product Marketing; Jon McCarrick-Technology Evangelist; Maggie Szczygielski -Channel Account Manager Aug 16 2018 6:00 pm UTC 60 mins
    Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their service provider with their most important, sensitive, and confidential data.

    Hear how bundling an Office 365 solution with Trend Micro and Acronis provides a complete and comprehensive solution for your customers while building year over year recurring revenue for your business. Join our webinar and let’s discuss how partnering with Trend Micro and Acronis will transform your business with easy to deploy, manage, and sell security solutions.

    In this webinar the following will be covered:


    •Best practices for securing your customers Office 356 environment
    •Learn how Trend Micro’s Cloud App Security enhances Office 365 security to detect advanced threats including unknown malware, ransomware, and malicious URLs.
    •Learn how Acronis provides Backup solutions needed for Office 365 email eliminating operational overhead, streamlining backup sales, and meeting data protection regulatory requirements.
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Aug 16 2018 7:00 pm UTC 60 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • FROST IQ: 2018 Australia Data Center Service Providers
    FROST IQ: 2018 Australia Data Center Service Providers Audrey William is Senior Fellow and Head of Research & Yu Xuan Ng, Industry Analyst, Digital Transformation Aug 20 2018 5:30 am UTC 60 mins
    This webinar offers a comprehensive guide on the selection of Australian best-in-class data center service providers for industry CIOs and other decision-makers.

    Key Takeaways:

    - Learn more about critical trends shaping the data center market
    - Discover how these trends impact businesses
    - Identify the leading data center providers
  • Encryption & Tokenization as effective GDPR Best Practices
    Encryption & Tokenization as effective GDPR Best Practices An expert panel including Alex Pezold, Mark Rasch, and Ulf Mattsson Aug 20 2018 4:00 pm UTC 60 mins
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Introduction to SNIA Swordfish™ ─ Scalable Storage Management
    Introduction to SNIA Swordfish™ ─ Scalable Storage Management Alex McDonald, Vice-Chair SNIA Europe and NetApp Aug 21 2018 9:00 am UTC 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting.

    Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
  • Pervasive Integration - Introducing Hybrid Implementation Platform
    Pervasive Integration - Introducing Hybrid Implementation Platform Mikkel Iversen, Head of Integration, NNIT Aug 21 2018 11:00 am UTC 45 mins
    This session will focus on introducing pervasive integration with the different integration personas as Integration Specialists, AdHoc integrators and Citizen integrators. The session will cover the implementation of a Hybrid Integration platform and the components it can consist of: ESB, iPaaS, Api Mgt. and iSaaS. It will be described, how a HIP can supplement agile development organizations and BiModal IT.


    About Mikkel Iversen:

    Mikkel Iversen has worked with enterprise integration for the last 12 years with tasks ranging from developer, architect, business liaison to management of integration CoEs. Today he is responsible for all integration technologies and consultants in NNIT – A leader in the integration space in the Nordics.
    Mikkel focuses on integration organization and overall implementation of Pervasive integration solutions, with a shift from Center of Excellence to Center of Enablement.

    Other webinars in this Cloud Webinar Series:

    Session 2: Welcoming the Informatica Intelligent Cloud Services
    Session 3: Using IICS to orchestrate complex order processing
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Aproveite o maximo da sua solução SAP com a SUSE e Lenovo
    Aproveite o maximo da sua solução SAP com a SUSE e Lenovo Aslan Carlos, SUSE Sales Engineer & Adriano Fratelli, Lenovo SE Aug 21 2018 1:00 pm UTC 75 mins
    Suas aplicações SAP são a base de sua transformação digital!

    Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
    Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:

    - Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
    - SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
    - SUSE Manager permite que você gerencie várias distribuições Linux.
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Aug 21 2018 1:00 pm UTC 60 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Governo na Palma da Mão
    Governo na Palma da Mão Rubens de Souza Aug 21 2018 1:00 pm UTC 60 mins
    CA Technologies lança solução para facilitar a vida dos cidadãos e melhorar os serviços prestados pelos órgãos públicos do estado. O GPM (Governo na Palma da Mão) integra sistemas de secretarias, ministérios e demais órgãos públicos para diminuir deslocamentos e custos de agendamento de consultas médicas e matrículas escolares, entre outros serviços fundamentais.

    Descubra como o GPM tira proveito da familiaridade dos cidadãos com as tecnologias móveis e permite em apenas alguns cliques agendar consultas médicas, fazer matrículas escolares, acompanhar o desempenho dos alunos, realizar campanhas de saúde, entre outras atividades de serviço público, sem enfrentar filas.

    Saiba Mais neste Webinar.
  • Gobierno en la Palma de la Mano
    Gobierno en la Palma de la Mano Narciso Lucero Aug 21 2018 3:00 pm UTC 60 mins
    Los hábitos y las expectativas de los usuarios están cambiando en forma acelerada. Esta realidad deben afrontarla tanto empresas privadas como públicas. Las empresas deben tener satisfecho al cliente y las Instituciones deben garantizar la satisfacción del ciudadano. Por esta razón, es indispensable que el gobierno, en todos sus niveles, redoble los esfuerzos de digitalización de sus servicios.
    Para acompañar estos desafíos CA Technologies ha creado el programa Gobierno en la Palma de la Mano (GPM) con el fin de facilitar la interacción de la ciudadanía con todos los niveles de gobierno. Acompáñenos en este Webinar y descubra cómo:
    •Elaborar aplicaciones y servicios digitales que funcionen rápidamente y con calidad
    •Garantizar la seguridad de la identidad de los usuarios y de la información que manejan mediante servicios digitales;
    •Garantizar la disponibilidad y el desempeño de los servicios en línea, para ofrecer una experiencia de usuario única.