Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • CTO series: Episode 2: -What does a Good Strategy look like...?
    CTO series: Episode 2: -What does a Good Strategy look like...? Andrew Bird : Chief Digital Officer & EA Visionary May 2 2017 9:00 am UTC 30 mins
    An organisations strategy should be unique in terms of fit for its business model. In this context, good strategy should show direct linkage to the operating model of the business and the road map of how growth will be achieved.
    In this Episode 2 of the CTO series, we discuss the measure of linkage to the operating model and the tools which can be used to show alignment or otherwise to the business vision.
  • The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps
    The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management; Mark Daly, Client Architect, MuleSoft May 2 2017 3:00 pm UTC 60 mins
    With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.

    Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:

    - A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
    - A view of Enterprise Architecture and DevOps from a leader in the field
    - What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
  • Is Your Security Keeping Pace with Your Cloud Initiatives?
    Is Your Security Keeping Pace with Your Cloud Initiatives? Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic May 2 2017 3:00 pm UTC 60 mins
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • Knowledge17 Sneak Peek: Our Best of ServiceNow
    Knowledge17 Sneak Peek: Our Best of ServiceNow Ellen Daley, Adam Mason, Carleen Carter, Meghan Lockwood May 2 2017 5:00 pm UTC 60 mins
    Knowledge17, ServiceNow's biggest event of the year, is just three weeks away. Join Acorio's Leadership Team on a panel discussion of what to expect at the fastest-growing enterprise cloud company's annual conference.

    We will fill you in with highlights of our Customer's center stage presentations, new technology and innovations, key success stories since last year, and the main themes they expect ServiceNow leadership share.

    This year's K17 theme is experiencing IT, Customer Service, HR & Security at Lightspeed. Get a head start on your competition by getting the inside scoop before you even reach the plane.

    - Preview main stage presentations by Acorio and clients
    - Sneak Peek at our new demo
    - Five tips to get the most out of your K17 experience

    And be sure to visit us at Booth #419
  • Virtual Load Balancer Challenges and How to Conquer Them
    Virtual Load Balancer Challenges and How to Conquer Them Ashish Shah May 2 2017 5:00 pm UTC 45 mins
    While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.

    Join us for this 30 minute webinar with Q&A to learn how to overcome the challenges of using virtual load balancers.
  • Making Container Orchestration Easy
    Making Container Orchestration Easy Bich Le - Chief Architect, Co-founder May 2 2017 5:30 pm UTC 45 mins
    Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
  • Automated Compliance Assessment for RBI Cyber Security Guidelines
    Automated Compliance Assessment for RBI Cyber Security Guidelines Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys May 3 2017 5:30 am UTC 60 mins
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
  • Dell EMC Servers Help Boost Cost Savings, Productivity and Innovation
    Dell EMC Servers Help Boost Cost Savings, Productivity and Innovation Shams Hasan, Infrastructure Solutions Marketing Manager, META Region May 3 2017 9:00 am UTC 60 mins
    With the server at the core of most modern data center trends, it’s crucial to understand how to maximize the value of both economics and innovation; let’s discuss how!
  • No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime
    No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime John Fokker, Raj Samani, Ben Potter May 3 2017 1:00 pm UTC 60 mins
    Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.
  • Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps
    Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps Zane Lackey, Signal Sciences and Kamala Dasika, Pivotal May 3 2017 4:00 pm UTC 60 mins
    As IT organizations build and release software continuously, how do security teams become enablers of this pace? How can you ensure that the higher rate of change is not leading to lesser security?

    Join our webinar to learn how Pivotal and Signal Sciences work together to make app deployments faster *and* safer in cloud-native environments.

    This webinar will cover:
    - Best practices for implementing new security programs and incentivizing their adoption
    - How to simplify application layer security deployments across a variety of apps, teams and cloud infrastructures
    - How threat visibility and real time attack telemetry brings security context into DevOps teams, and improves response times.
  • Tech Talk: WAN Op on Tap
    Tech Talk: WAN Op on Tap Derek Granath and Chris Rogers May 3 2017 6:00 pm UTC 60 mins
    This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
  • EU GDPR - Finding your data 'A Services Approach'
    EU GDPR - Finding your data 'A Services Approach' Dan Burt, EMEA Solution Services Architect, Hitachi Data Systems May 4 2017 12:00 pm UTC 60 mins
    As the 'business issue' of GDPR draws ever closer, we discuss how Hitachi Data Systems can aid you through a portfolio of services and technology to manage this new compliance hurdle and manage your data.This webinar will focus on how to ascertain what data is relevant to be compliant and how you can most effectively find it in your current IT environment.
  • Containers from Scratch
    Containers from Scratch Liz Rice, Technology Evangelist May 4 2017 2:00 pm UTC 45 mins
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Accelerate Mobilizing your Customers with SAP Cloud Platform
    Accelerate Mobilizing your Customers with SAP Cloud Platform David Sacks, Senior Director, Platform Partner Ecosystem, SAP, and Holger Fritznger, SAP May 4 2017 2:00 pm UTC 60 mins
    For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.

    Join us on May 4 to find out about the recently released SAP Cloud Platform SDK for iOS, the latest mobile tools for SAP Cloud Platform, and how extending your SAP partnership to include the Build engagement model of the SAP PartnerEdge program can help you monetize your software efforts.

    SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
    • Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
    • Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
    • Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
    • Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
    • Leverage SAP Digital Channels and flexible license options to market your packaged solution to approximately 300,000 SAP customers
  • Transforming Customer Experience Through an Always-On Data Platform
    Transforming Customer Experience Through an Always-On Data Platform Mike Gualtieri, VP & Principal Analyst, Forrester Research | Rajay Rai, Head of Digital Engineering, Macquarie Bank May 4 2017 3:00 pm UTC 60 mins
    According to Forrester Research, leaders in customer experience drive 5.1X revenue growth over laggards. And although 84% of companies aspire to be a leader in this space, only 1 in 5 successfully delivers good or great customer experience. Join us for our next webinar where Mike Gualtieri, VP and Principal Analyst at Forrester Research and Rajay Rai, Head of Digital Engineering at Macquarie Bank will share how Customer Experience can drive business results such as faster revenue growth, longer customer retention, greater employee engagement and improved profit margins.
  • Briefings Part 3: The Future of BYOD Security
    Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator May 4 2017 5:00 pm UTC 75 mins
    Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
  • AWS Cloud Compliance - What Is it and How to Achieve to It
    AWS Cloud Compliance - What Is it and How to Achieve to It CloudCheckr CEO Aaron Newman, Allgress President and COO Jeff Bennett, AWS Sr. Security Partner Strategist Tim Sandage May 4 2017 6:00 pm UTC 60 mins
    Running an organization in the dynamic, ephemeral cloud brings increasing complexity and challenges as your environment scales. The advantages of scalability and flexibility are unquestionable, but assessing and measuring compliance requirements is a full-time job. To mitigate risks in 2017 and beyond, enterprises must proactively plan for cloud-based continuous monitoring, reporting and alerts, and automated response to maintain their governance, risk and compliance posture.

    You’re invited to a live webinar with AWS, Allgress and CloudCheckr to learn how to achieve and demonstrate compliance in the cloud to satisfy the auditors, streamline reporting of technical and non-technical controls, and improve workflow across your key stakeholders. In this exclusive webinar, attendees will learn:

    ●What does it mean to ‘be compliant’ in the public cloud
    ●Why a shared responsibility model is critical for compliance and security in the cloud
    ●How 3rd party tools help augment the AWS compliance framework

    About the Speakers:

    CloudCheckr and Allgress, AWS Advanced Technology Partners with certified Security competency, enable organizations to reduce the complexity timeframe to achieving compliance in the AWS cloud using the integrated Regulatory Mapping Tool (RPM). Join CloudCheckr Co-Founder Aaron Newman, Allgress President and COO Jeff Bennett, and Amazon Web Services Sr. Security Partner Strategist Tim Sandage as they dive into specific ways of what is means to be compliant and stay that way in the public cloud.
  • Gain Visibility & Control of IT Assets in a Perimeterless World
    Gain Visibility & Control of IT Assets in a Perimeterless World Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys May 4 2017 6:00 pm UTC 60 mins
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Artificial Intelligence Powering Business Solutions
    Artificial Intelligence Powering Business Solutions Barbara Giamanco, CEO Social Centered Selling & Leslie Gaines-Ross, Chief Reputation Strategist, Weber Shandwick May 5 2017 6:00 pm UTC 60 mins
    AI is turning heads in the C-Suite. Are you plugged in to these new technologies?

    Artificial Intelligence (AI) is a hot topic these days, drawing the attention of not only technologists and research scientists, but of C-suite executives, as well. Organizations that are currently exploring the potential of technologies such as robotics, expert systems, machine learning, speech, computer vision, facial recognition, and more are poised to transform and impact how we all do business.

    Artificial Intelligence can deliver value for your organization and industry, and AI technologies can represent the best kind of collaboration between humans and machines.

    Join this webcast to:
    - Learn how to separate hype from the true potential that Artificial Intelligence offers
    - Understand common challenges to consider and address
    - Review the top business applications for artificial intelligence
    - Explore what artificial intelligence means for the future of the workforce

    This webinar is part of our Digital transformation through connected operations series. Sign up for this session, or the entire series today!
  • Redefining Cloud Security – Freedom. Visibility. Protection.
    Redefining Cloud Security – Freedom. Visibility. Protection. Alex Kurz, Director, Sales Engineering, CensorNet May 9 2017 9:00 am UTC 45 mins
    Remember the days when IT had full control of which applications were used across your organisation? Today’s reality is that business moves faster than ever before, and teams need to be agile and able to easily collaborate together. How do organisations embrace the advantages of the cloud while keeping security and compliance tight?

    In this session we discuss:
    -How modern working practices might not be secured by traditional means
    -The scale of Shadow IT; even in organisations that have no ‘official’ cloud infrastructure
    -The risk posed by well-meaning employees and why modern authentication matters
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto May 9 2017 3:00 pm UTC 45 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the enterprise
    •What cloud access management is
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • Fighting Fraud with Graph Databases
    Fighting Fraud with Graph Databases Kaush Kotak, Project Manager, Cambridge Intelligence May 9 2017 3:00 pm UTC 60 mins
    Modern fraud detection has significant engineering challenges. From managing the ingestion and scale, to the analysis of those patterns in real-time. We'll first take a look at how DataStax Enterprise Graph, powered by the industry’s best version of Apache Cassandra™, can meet those requirements to help you save the day.
  • Tag Your IT: Gain Control and Visibility with AWS Tagging
    Tag Your IT: Gain Control and Visibility with AWS Tagging Dave DeYager, CloudCheckr Support May 9 2017 5:00 pm UTC 60 mins
    Maintaining accountability across an ephemeral IaaS infrastructure can be a challenge for Finance and DevOps teams. With the proper tagging strategy and implementation, organizations can manage cloud costs around their EC2 instances and resources.

    Join CloudCheckr May 9th at 1pm Eastern, 10am Pacific for a live webinar discussing proactive tactics and tips to execute an AWS tagging strategy as your organization scales, including:

    - Tagging rule guidelines to gain visibility and control over your asset inventory
    - Cost allocation reports and tools to understand cloud expenses and recognize optimization opportunities
    - How CloudCheckr can help enforce tagging policies and reduce cloud costs