Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity.
During this webinar we will:
• Showcase the battle-tested strategies of the most successful information security organizations
• Survey the landscape of analytics-based security tools and solutions
• Walk through how to build a strategy based around current (and future) analytics and automation technologies
• Spotlight the critical security operational metrics that analytics can help improve
We look forward to sharing this information with you!
"Blameless postmortems" and "learning from failure" are very en vogue in the technology industry right now. Both fall into that less-discussed category of "CI": Continuous Improvement. But for as much as we all talk about them, in many organizations and teams, the outcome of continuous organizational learning and improvement remains elusive. Why is this?
In this talk, we'll look at five "dirty words" that are often thrown around during postmortems, retrospectives, and other learning exercises that not only make it difficult for teams to discuss learning, but promote activities and behaviors that are actually counterproductive to continuous improvement. We'll dig into the existing research on why this is and look at different language we can use to facilitate sustainable Continuous Improvement in our work environments.
We all know that differences between your development and production environments cause pain. In an ideal state, you’d have 0 drift between your environments. Luckily, modern tooling lets us model our production data centers on our personal machines, so we can iterate more quickly, experiment with failure modes, and deploy with confidence.
In this talk, we’ll explore how we can use containers on developer laptops to mock out our production infrastructure. When you mock your infrastructure and make it easy to visualize and query what’s happening, you enable people to do wonderful things!
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
2017 marked the 10-year anniversary of Amazon’s AWS, and with it a decade of mainstream awareness of the concept of the public cloud. As we begin the year, the trends that will drive the technology industry through 2018 are becoming apparent. Among these trends is a greater maturity surrounding discussions about cloud computing.
In this webinar attendees will learn how 2018 will be a year where the importance of robust multi-cloud management capabilities becomes clear. Organizations of all sizes will seek out solutions that transcend any individual public cloud provider while still providing visibility and management of their own on-premises environments.
As more organizations jump on the DevOps bandwagon, the conversation has shifted from “why” to “how.” With customers increasingly demanding a great, consistent experience everywhere, success in isolation is no longer good enough. In this panel, hear from three industry experts who successfully led DevOps transformations within their organizations, and learn how to gain buy in, unify teams and fragmented process, and scale your DevOps practice from a single team to your entire enterprise.
Protecting student and district data, privacy, and safety with their limited IT resources is a tall order for K-12 institutions. This no-cost webinar is for districts and their consultants considering the E-rate program for funding firewall services. Join our education and E-rate experts to learn:
•About Palo Alto Networks and how we uniquely protect students, data, and networks
•How your peers have successfully leveraged E-rate funding to create safe learning environments
•Which Palo Alto Networks products are eligible
•Where to find E-rate resources
David Cumbow is a Systems Engineering Manager with Palo Alto Networks. Prior to coming to Palo Alto Networks, David spent 13 years in the public sector working for the third-largest K-12 school district in Riverside County. Having worked jobs from Database Administration to Virtualization, David found a passion for Networking and Security. With eight years in the security field, David has led many K-12 Districts in California to a better security posture through guidance and peer-to-peer consulting. David holds a Bachelor of Science in Computer Science from California State University.
Greg Herbold is Director of the U.S. State/Local Government and Education (SLED) segment at Palo Alto Networks, where he is responsible for creating solutions and programs to protect our way of life in the digital age by preventing successful cyberattacks. In this capacity, he leads strategy and planning, marketing, solution development, sales programs, channel partner development, contracts, compliance and industry relations for the segment. Greg holds a Master of Arts from Georgetown University and an HP-Stanford Innovation and Entrepreneurship Certificate from the Stanford Graduate School of Business.
Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible.
During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, will showcase solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.
By attending this webcast, you will understand how:
• To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment
• To track remediation progress as you patch against Spectre and Meltdown
• The Qualys Asset Inventory and Threat Protection apps, which will help you automate detection and track remediation progress
The webcast will include a live Q&A session.
Join Storage Switzerland and Cloudian in this live webinar as we discuss the advantages of object storage over NAS, the problems with converting from NAS to object storage and how to overcome those problems.
We’re moving to a cloud-first and cloud-native world, where technology is delivered faster, and with greater agility, than ever before. But many of us still stumble as we look to migrate workloads to the cloud. In this panel, you’ll learn how to modernize without reinventing the wheel, and you’ll see how three organizations have successfully led their organizations to the cloud without sacrificing agility, security, or control.
Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.
Containers are no longer in the distant future; a lot of businesses are starting to, or are already using, containers in dev/test. In this talk, we will walk through the offerings Puppet has to help you leap from dev/test to a production-from-scratch environment in the cloud. We will run through deploying Puppet Enterprise in AWS with Puppet's ready-made CloudFormation templates that leverage Puppet's AWS AMI for Puppet Enterprise. Then we'll use codedeploy to pull the Puppet Kubernetes module, and deploy our production-ready cluster with our first application in a highly available configuration, using garethr/kubernetes.
Not only will we run through the process — in theory, we will deploy the cluster live in real time. So you will not only have the tools to deploy a production-ready cluster, you will have had the experience of seeing it done in the real world.
Today, ops is expected to build and design delivery pipelines, have continuous statistic collection as a part of their monitoring services, and complement the development process with continuous integration and delivery practices, all while still maintaining critical back-office applications that most wouldn’t wish upon their enemies. What separates the operations teams that lead from the ones who react, and how can you prepare for what’s next?
In this talk, we’ll consider a reactive team mired in fire-fighting and incapable of making headway, then watch as change that betters the team’s output and perception throughout the organization is slowly introduced. With a focus on procedural and cultural improvements, we’ll cover root-cause analysis efforts, bringing pain forward, experimentation, shifting left on quality, and selling automation and DevOps practices to management.
Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
Enterprises are moving towards 24x7 Business and Applications are demanding highest uptime and data availability. Loss of data is not only impacting business but also resulting in major customer dissatisfaction. CIOs are looking for technology options and architecture designs that helps them deliver desired SLAs to their business.
Join us for a Live BrightTalk Webinar to discover how you can maximize your data availability and resilience to meet the demands of the digital age.
You will hear expert insights on how to meet your day-to-day challenges that will help you:
•Meet expanded business requirements.
•Capitalize on data for new opportunities.
•Balance bimodal realities with hyperscale digital demands.
•Deliver on SLA, RPO, RTO and ROI goals.
•Protect all of the data all of the time.
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.
This webinar will cover:
•The Next Generation of Data Centers: High Efficiency Meets Scalability
•Streamline Heterogeneous Data Center Management with [SMART]DC
•Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
•Achieve up to 30% in Power Savings for Your Infrastructure
•Minimize Operational Disruptions and Protect Hardware Investment
•How You Can Start Today
With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.
Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.
“SIM providers are going away. It’s just a matter of when.”
—Drew Johnson, VP Engineering & Operations, Aeris
“Automotive transformation via the IoT will become mainstream.”
—Michelle Avary, VP, Automotive Strategy, Aeris
“With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
—Dr. Rishi Mohan Bhatnagar, President, Aeris India
“Security will have to up its game as IoT delivers huge volumes of data.”
—Syed “Z” Hosain, Chief Technology Officer, Aeris
My prediction: This will be the only IoT futuristic view you will need to attend this year!
Sign up now for this futuristic view into the future of IoT.
Pressure to deliver faster, better and more economical services is driving IT modernization across state and local government. But a recent survey from the Center for Digital Government indicates that CIOs are approaching modernization with a growing emphasis on value -- respondents said “budget, cost control and fiscal management” dominate their attention, discussions and strategic planning activities. So how do government leaders approach modernization in an environment where value and fiscal responsibility are paramount?
This hour-long, panel-style webinar will:
• Uncover additional CDG survey findings on technology, planning and procurement priorities
• Offer best practices around modernizing legacy systems, consolidating IT environments, strengthening data and analytics capabilities, adopting cloud services, and improving security and risk management
• Discuss how commercially supported open source technologies can drive better performance at lower cost
(ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
In this presentation we will walk through a number of automation case studies. We will discuss the business problem addressed, how automation solved that problem, and the potential ROI experienced as a result.
The examples featured will offer insights into how automation tooling played a large role in solving the client's core business issues, with a specific focus on Windows and PowerShell technologies.
This will be an interactive session, so please feel free to bring your business problems and questions to share during the session.
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.
In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:
- Identify malicious activity and gain key context to help prevent similar threats
- Apply methods to help improve accuracy and further mitigate risk
- Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats
Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.
WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.
Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.
In this webinar you will learn:
Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
Rugged, ready and right along with you. Built from the ground up for harsh environments, the rackable compact size and certifications in shock, vibe, dust, humidity, EMI and maritime mean the XR2 is agile. The de-branding and customization capabilities mean it’s versatile. So whoever you are and wherever you go, you can take rugged with you. Join us to learn how the Dell EMC OEM XR2 server powered by Intel Xeon SP processors gives you anytime, anywhere access to the data and insights you depend on to make work happen.
2017 has been a big year in UC, the increased impacts of AI, Microsoft's announcement Teams, Avaya exiting Chapter 11 and Cisco's continued march toward the cloud, just to name a few.
What will 2018 have in store? Join this webinar to get the lowdown on predictions for 2018 so you can stay ahead of the game.
One constant in all our lives is change. Digital disruption is rampant to support our business, as disruptive technologies are driving innovative business models across every industry. Innovation at speed mandates that IT organizations not only accelerate release velocity, but do so with greater quality, security and availability. For many, the transition to DevOps starts small, often with a single team delivering new innovation — typically writing the DevOps tool chain as well as the application.
This talk from Rob Stroud, Principal Analyst at Forrester, will explore what’s required to meet the enterprise demand of DevOps in 2018 and beyond — including how will organizations adapt, and what approaches and actions your team and organization need to take to facilitate a smooth, and swift, transformation.
Continuous Integration (CI) testing provides instant feedback as you develop Puppet code. While it’s great that your rspec-puppet and beaker tests pass using fixtures and stubs, you can get a false sense of security from unanticipated edge cases, unrealistic assumptions, or the lack of complete coverage. You may be tempted to address these limitations by writing even more tests, but that would only exacerbate your frustration. Instead, you could use some alternate techniques to make your CI pipeline predict real-world behavior more accurately, and thereby gain confidence in your test results.
In this session, we will explore some less traditional yet more powerful techniques for automated testing of Puppet code, and will explore how GitHub scaled these strategies to test hundreds of unique combinations while keeping build times reasonable. You will leave this session with fresh ideas to improve your CI pipeline, which will lead to confident and reliable deployments.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.
But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.
In this webinar, attendees will learn:
- The state of play in regards to monitoring in the enterprise
- How Application Performance Monitoring (APM) tools improve ITSM processes
- Key APM capabilities and how they apply to Service Transition and Operation
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
When you think of Dr. Seuss, writing code probably isn’t the first thing that comes to mind. But if you dig deeper, you’ll notice there’s a gem hidden in all his children’s rhymes. You see, Dr. Seuss would have made an excellent engineer. Because great code isn’t about choosing the perfect method name or building out 95% test coverage. All that is great, but it doesn’t make great code. YOU DO.
This talk will focus on common pitfalls along the development lifecycle and distill Dr. Seuss’s excellent advice into concise steps developers can take before they write a single line of code.
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
You put your data where? Protecting your data in the hybrid cloud.
We’ve heard it before: “I can’t use the cloud because my data won’t be secure or compliant!” You might feel the same. Many companies struggle with this challenge, yet even government agencies with the strictest data privacy requirements use the cloud.
In today’s rapidly changing world, how can you tell which clouds and cloud types are right for your organization’s needs, now and in the future? Wouldn’t it be great to use a public cloud for more workloads, even those with sensitive data and compliance requirements?
In our webcast, "You Put Your Data Where? Protecting Your Data in the Hybrid Cloud," we will share how public organizations with strict data privacy regulations leverage and deploy hybrid cloud to meet their business needs. NetApp’s partner 1901 Group will speak about a government law enforcement agency that has deployed hybrid cloud to gain better access to compute capabilities while keeping legal data under lock and key. Additionally, BriteSky, a Canada-based service provider, will discuss how they help customers use cloud resources and still maintain sovereignty over their corporate data.
Whether you’re a public or private company, government agency, U.S.-based or multinational organization, this informative webcast will help you put your data where it's accessible to cloud infrastructures yet fully protected. Join us to learn how NetApp and our partners help people like you meet data compliance and data sovereignty requirements and deploy cloud architectures to suit your business needs.
In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
This webinar series will focus on a few of the key benefits of open source software for enterprise.
Adoption of open source software (OSS) at the enterprise level has flourished, as more businesses discover the considerable advantages that open source solutions hold over their proprietary counterparts, and as the enterprise mentality around open source continues to shift.
You will discover:
- How to make smart use of open source software
- Why Cassandra is a smart business decision
- How to ensure your applications run smoothly on Cassandra
- Why open source is the new norm
- How to leverage the power of the open source community
“Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.
Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
DevOps is all about improving the way organizations work in order to deliver better software faster. It starts with people. In this panel, you’ll hear how three IT leaders led cultural change within their organizations and put a strategy in place to attract, develop and retain the talent they needed for success with DevOps.
Every manager wants to lead a team that is engaged and motivated, but not every manager knows how to create the environment that a happy dev team needs. Developers are lifelong self-learners, easily frustrated when stuck in a role with no opportunity to learn new technologies and broaden their skill set. Leveraging automation and tools within a DevOps culture is one way to help free up time for us to focus on work that is more interesting and also allow us to continue to build our skill set.
In this session, Rick Tywoniak will share his own experience as a developer and now a team leader, providing insight into how you can help your manager better understand what you need in order to stay motivated, engaged and happy.
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
Digital transformation requires transformational leaders. In this session, Mike Wittig, VP of Infrastructure Engineering at Nike, shares first-hand how his team evolved its business models, its organizational culture and its practices to be like a software company and transform the way it engages its customers.
Вебинар посвящен обновленной линейке графических станций Dell Precision на базе процессоров Intel Xeon – основному инструменту креативного сотрудника (инженеры, дизайнеры и т.д.). Будут рассмотрены особенности линейки, ее состав и развитие. Отдельное внимание будет уделено как правильно позиционировать модели линейки исходя из задач заказчика. Вебинар предназначен для специалистов по продукту, инженеров предпродажной подготовки и отчасти менеджеров по продажам.
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.
Here’s a sampling of some of the predictions our cybersecurity experts will review:
•Ransomware Prevention more important than ever
•The Internet of Things blurs the line between personal and corporate security
•The era of Software Supply-Chain attacks has begun
•The Cloud will accelerate channel partner migration to next-generation security innovators
•Advances in Machine Learning will improve both patient care and cybersecurity
•Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls