Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Oct 22 2018 9:00 am UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Oct 22 2018 2:00 pm UTC 60 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019
    Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft) Oct 22 2018 5:00 pm UTC 60 mins
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Director of Product, Algosec
  • Outsmart Hackers by Coordinating Your Defenses
    Outsmart Hackers by Coordinating Your Defenses Greg Bennett, Engineer, Sophos Oct 22 2018 6:00 pm UTC 45 mins
    Smart hackers coordinate their attacks across your system. Now, you can learn how to outsmart the hackers by coordinating your defenses!

    Synchronized Security is a best-of-breed security system that enables security solutions to talk to each other, sharing information and responding automatically to threats.

    For example, if the endpoint detects a threat, the firewall automatically isolates the infected computer and then the cleanup kicks right in to finish the job.

    Join us for this engaging webinar to learn more about this new approach to IT security. You’ll find out how Synchronized Security:

    • Gives you unprecedented protection against advanced threats

    • Slashes incident response time by 99.9%

    • Saves IT time and effort every day
  • Addressing Today’s Cloud Attack Vectors
    Addressing Today’s Cloud Attack Vectors Joe Leonard, CISO, Presidio Oct 22 2018 7:00 pm UTC 60 mins
    During this session, we will discuss today’s cloud attack vectors and the potential impact there could be on your organization’s data.

    -How are these attack vectors exploited by an adversary?
    -What can you do to prevent these types of attack?
    -How are cloud security controls maturing to address these concerns?

    We will discuss what security controls can be put in place to reduce the attack vectors surface and minimize the risk to your organization.
  • Powering the Digital Workplace with Box and Office 365
    Powering the Digital Workplace with Box and Office 365 Rand Wacker, VP of Product Marketing @ Box and Rafael Perez, Sr. Sales Engineer @ Box Oct 22 2018 11:00 pm UTC 60 mins
    If you're deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.

    Tens of thousands of businesses running Office 365 choose Box over OneDrive and SharePoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including a:

    -Better user experience — users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
    -Better admin experience — more granular controls, one admin console to manage all your content
    -Better security — a central platform for consistent security and governance
    -Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
  • 5 Questions to Assess Your Culture of Analytics
    5 Questions to Assess Your Culture of Analytics Donald Farmer, Principal, TreeHive Strategy; Salmon Sim, Regional VP, Big Data & IoT Analytics, APAC, Hitachi Vantara Oct 23 2018 5:00 am UTC 60 mins
    There’s a lot of hype around data-driven business. And as enterprises face the coming wave of Machine Learning and Artificial Intelligence, there’s also a lot of confusion about how to prepare your data, infrastructure and organization for this work.

    In this webinar, Donald Farmer of TreeHive Strategy, sets out 5 questions you can ask of your business to assess if you are making the most of your current analytics, and if your roadmap for the future will be effective. We’ll consider the tools you use, the skills you need in organization and the data pipeline you need to build for governance and flexibility.

    Donald’s approach covers both strategy - What do you need to achieve for your business? - and tactics - How will you achieve it? CIOs, IT managers and anyone working in analytics and data management will find it insightful and helpful.
  • Introducing Per-App Services with BIG-IP Cloud Edition
    Introducing Per-App Services with BIG-IP Cloud Edition Matthew Prickett - Cloud Systems Engineer, F5 Networks Oct 23 2018 9:00 am UTC 42 mins
    Scalable per-app services are the future of multi-cloud. With F5’s recently launched BIG-IP Cloud Edition, organisations can now quickly deploy critical application and security services for every app, anywhere. The per-app solution efficiently applies automated policy-based services at each step in the development and production pipeline.

    This approach empowers app owners to better collaborate with NetOps, DevOps, and SecOps within an agile framework to significantly improve the performance, availability, and security of all applications. In this webinar we will cover:

    • Self-service deployment for app teams using pre-built and customisable templates
    • Per-app analytics and visibility into application health, performance, and security
    • On-demand autoscale of additional per-app instances based on policy

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).
  • La Data Virtualization au service de la BI self-service
    La Data Virtualization au service de la BI self-service Sihem Merah, Denodo Sales Engineer Oct 23 2018 9:00 am UTC 75 mins
    La Data Virtualization au service de la BI self-service
    Comment livrer les données aux métiers de manière agile sans compromettre sécurité, gouvernance et performance.

    Comment combler le fossé entre l'IT et le métier pour livrer les données aux utilisateurs qui en ont vraiment besoin sans compromettre la sécurité et la protection des informations?

    Grâce à la BI self-service, les utilisateurs métier peuvent générer leurs propres rapports, exécuter leurs requêtes et effectuer leurs analyses sans toujours dépendre du département IT. Résultat: le temps d'obtention des rapports est plus court et les métiers peuvent prendre de meilleures décisions plus rapidement.

    Cependant, lorsque l'accès aux données est démocratisé, il faut une plateforme intégrant des informations provenant de sources multiples afin d'éviter l'anarchie des données; quel Data Analyst n'a pas été confronté aux problèmes d'accès aux sources de données pertinentes, à devoir effectuer diverses opérations de transformations et de calculs sur les données qui ne pourront être réutilisés par d'autres, à ne pas pouvoir trouver tous les jeux de données qu'il pourrait utiliser comme il le ferait dans un catalogue?

    Dans ce webinar en français d'1 heure, vous verrez comment la Data Virtualization permet de satisfaire aussi bien les besoins des métiers que ceux de l'IT, en accélérant et en améliorant les initiatives de libre-service, en offrant aux utilisateurs une vue globale de toutes les données à sa disposition et en assurant une vue cohérente dans les différents domaines de l'entreprise :

    - Abstraction / création de vues

    - Pour les utilisateurs métiers : le Data Catalog, aspects abstraction et connectivité (gains de temps pour les analystes)

    - Pour l'IT : suivi / monitoring, sécurité/gouvernance

    - Machine Learning MPP
  • Applying AI to Unstructured Content
    Applying AI to Unstructured Content Anthony Tate, Head of Product Marketing EMEA Box & Mike Schwartz, Senior Product Marketing Manager, Box Oct 23 2018 9:00 am UTC 47 mins
    AI and machine learning technologies are rapidly maturing and becoming more enterprise ready — but 83% of organisations don't yet know how to leverage AI/ML in their business.

    Join us to learn how the new Box Skills makes all your business-critical unstructured content easier to find, organise, manage and protect by automating mundane processes to get to your most impactful work faster.

    During this live webinar you'll learn how you can:
    - Use Box Skills to manage and tap the potential inside unstructured content like videos, photos, audio and more
    - Reap the value from your unstructured content — without recruiting a team of data scientists to build AI/ML from scratch
    - Apply ML to your content to increase employee productivity, improve customer experience, accelerate or automate business processes, and mitigate risks
  • Modern Cyberattacks and How to Keep Businesses Safe
    Modern Cyberattacks and How to Keep Businesses Safe Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 23 2018 9:00 am UTC 60 mins
    Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.

    Some of the topics Kelvin Murray, Sr. Threat Research Analyst, Webroot will cover:

    • Ransomware, banking Trojans, and phishing
    • Cryptomining, cryptojacking, and other crypto-crime
    • Best practices for keeping businesses safe
  • Top 10 Security Recommendations for Public Cloud Migration
    Top 10 Security Recommendations for Public Cloud Migration Dejan Stanic - Consulting Engineer Cloud EMEA at Palo Alto Networks Oct 23 2018 10:00 am UTC 45 mins
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover public Cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public Cloud workloads and data.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Oct 23 2018 1:00 pm UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Migrating to the Cloud with Automation
    Migrating to the Cloud with Automation Omer Ganot, Product Manager, AlgoSec Oct 23 2018 1:00 pm UTC 60 mins
    83% of enterprise workloads will be in the cloud by 2020. Migrating the storage and compute is the easy part. Migrating the SECURITY is the part that you have to get right – unless you don’t care about outages and cyberattacks. Don’t struggle with application connectivity and management of cloud security controls. Automate the entire process and get it right.

    In this webinar, Omer Ganot, Product Manager at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Splunk CEO Doug Merritt Talks with the Big Data Beard at Splunk conf2018
    Splunk CEO Doug Merritt Talks with the Big Data Beard at Splunk conf2018 Cory Minton and Brett Roberts Oct 23 2018 1:00 pm UTC 17 mins
    Doug Merritt, CEO of Splunk, sat down with the Big Data Beard to talk about the exciting announcements coming from conf2018 as well as how he is leading Splunk's massive growth while retaining their incredible culture and focus on using their powers for good.
  • Disruptive Technologies: A Quarterly Update
    Disruptive Technologies: A Quarterly Update Johna Till Johnson Oct 23 2018 3:00 pm UTC 30 mins
    Blockchain, quantum computing, quantum encryption, and more: A look at the technologies shaping our future
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Oct 23 2018 3:00 pm UTC 75 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • Build Intelligent Machine Learning Apps Based on SAP Cloud Platform
    Build Intelligent Machine Learning Apps Based on SAP Cloud Platform SAP Oct 23 2018 3:00 pm UTC 60 mins
    Join us October 23 to learn all about building and infusing cloud applications with intelligent, easy-to-use machine learning (ML) services.

    Find out how, as a solution provider or independent software vendor (ISV), you can enhance business processes and software applications with intelligence - unlocking knowledge from structured and unstructured data such as images, text, time series, and tabular data by consuming easy-to-use APIs.

    Our enterprise-grade, cloud-based platform for machine learning enables simple consumption and tight integration with SAP software. Bring your own models or easily deliver customized machine learning models for critical business processes and enable your customers. You can:
    • Optimize business operations using computer-based predictions
    • Create intelligent processes by extracting knowledge from different data types
    • Invent business scenarios through ML such as image-based searches or personalized shopping

    As part of this Webinar, you’ll learn how the SAP PartnerEdge ‘Build’ program enables you to bundle SAP technologies with your IP to deliver cloud-based services for machine learning, enabling customers with the next level of intelligent solutions.

    Featured speakers:
    • Nitol Dutta, Global Partner Manager, Leonardo Machine Learning
    • Scott Harrison, Sr. Director, Global ISV Program, SAP
  • Simplify Discovery and Change Management for Cloud and Container Environments
    Simplify Discovery and Change Management for Cloud and Container Environments Doron Orbach and Pulin Brahmbhatt, Micro Focus Oct 23 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest releases of Universal Discovery and UCMDB.

    The new releases offer advanced capabilities to discover and map services and infrastructure that are deployed on private and public clouds or in containers leveraging technologies such as Kubernetes and OpenShift.

    See how you can leverage your data in ITSM or cloud management processes either using Micro Focus suites or other tools that you already use.
  • Email Security.Cloud: Policy Based Encryption Best Practices
    Email Security.Cloud: Policy Based Encryption Best Practices Jimmy Lin, Sr Product Manager & Sarah Happé, Dir.Client Engagement Oct 23 2018 3:00 pm UTC 60 mins
    In this webinar, we’ll explore the Policy Based Encryptions service – highlighting how it works, how to trigger a policy, and the user experience. We’ll also cover advanced features and industry best practices to equip you with the tools needed to protect your organization.
  • 8 Essentials for SDI, Including Support for New Cloud Native Applications
    8 Essentials for SDI, Including Support for New Cloud Native Applications John Abbott of 451 Research and Jennifer Kotzen at SUSE Oct 23 2018 3:00 pm UTC 60 mins
    Moving to software defined infrastructure is all about getting rid of rigid system silos that can hold companies back from digital transformation, replacing them with more fluid resources that provide the flexibility and agility required to support a rapidly evolving mix of existing and new cloud native workloads. It’s the direction of travel for most enterprises and service providers alike. But how do you get there?

    451 Research has identified a core set of essentials for companies looking to become software-defined organizations. In this webinar we’ll examine these principles, explore their importance to IT decision makers, and look at the new cloud native workloads and modern DevOps processes that they enable. Join us to hear from John Abbott, co-founder and distinguished analyst at 451 Research and Jennifer Kotzen, Applications Delivery Solutions Team Lead at SUSE.
  • A Pattern-Oriented Approach to API-centric Integration
    A Pattern-Oriented Approach to API-centric Integration Keith Babo, Product Management Director - Middleware, Red Hat. Oct 23 2018 3:00 pm UTC 60 mins
    In this webcast, Keith will provide an overview of Agile Integration and it's application to building modern, cloud-native application integration architectures. The Agile Integration reference architecture and implementation patterns will be covered along with practical advice for putting Agile Integration into practice.
  • Cloud Security Trends and Best Practices for 2019
    Cloud Security Trends and Best Practices for 2019 Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks) Oct 23 2018 3:00 pm UTC 60 mins
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Secure Cloud Migration: Automated!
    Secure Cloud Migration: Automated! Jonathan Gold-Shalev, Director of Product (AlgoSec) Oct 23 2018 4:00 pm UTC 60 mins
    As their first big move into the Age of the Cloud, enterprises are rapidly migrating applications from on-premise data centers to the cloud to take advantage of agility, segmentation, scalability, flexibility, cost and other benefits.

    While migrating the storage and compute is pretty straightforward, migrating the SECURITY presents unique challenges that cause enterprises to struggle with application connectivity and management of the cloud security controls alongside their traditional firewalls in a secure and compliant way – and quickly.

    In this webinar, Jonathan Gold-Shalev, Director of Product at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud