Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Polska premiera IDPA - nowego applience’u backup/recovery
    Polska premiera IDPA - nowego applience’u backup/recovery Daniel Olkowski, Dell EMC May 26 2017 8:00 am UTC 60 mins
    Dell EMC World, Vegas, maj 2017.
    Jeden z 2 najważniejszych wdyarzeń tej imprezy to ogłoszenie:
    IDPA – Integrated Data Protection Appliance
    Czym jest IDPA?
    Dla kogo jest przeznaczony?
    Jakiej wartości dostarcza?
    Ile kosztuje?
    Zapraszam na krótką, 30-minutową sesję, w trakcie której powiemy o wszystkich szczegółach nowego urządzenia ze stajni Dell EMC.
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager May 26 2017 5:00 pm UTC 60 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match
    Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match Neil Hopwood, Sr. Systems Engineer All Flash Technologies May 29 2017 11:00 am UTC 75 mins
    This Webinar will highlight the performance and advantages of server virtualization based on EMC XtremIO all-flash array technology
  • Securely Enabling a Hybrid Data Center with Microsoft Azure
    Securely Enabling a Hybrid Data Center with Microsoft Azure Matt Keil, Director of Product Marketing at Palo Alto Networks May 30 2017 12:00 pm UTC 45 mins
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • Solace : Messaging with Purpose on Pivotal Cloud Foundry
    Solace : Messaging with Purpose on Pivotal Cloud Foundry Jonathn Schabowsky May 30 2017 2:00 pm UTC 60 mins
    Your enterprise and applications need to communicate – to collect information from many sources and get data where and when it needs to be, which increasingly means in real-time. Complicating matters, as you migrate applications to the cloud and implement IoT strategies, they need to connect increasingly diverse endpoints and systems running in diverse public cloud, private cloud and on-premise environments.

    In this webinar, we’ll describe and demonstrate how the Solace Virtual Message Router can give applications and microservices running in Pivotal Cloud Foundry the ability to exchange information using open APIs and protocols like AMQP, JMS, MQTT, Qpid, Paho, REST and WebSockets. Jonathan Schabowsky of Solace’s office of the CTO will show how easily you can enable real-time communications between microservices with the new Solace Messaging Tile for Pivotal Cloud Foundry and how you can integrate Solace into your crucial data movement solution.

    Our Speaker:
    Jonathan Schabowsky is a Sr. Architect in the Office of the CTO at Solace. His expertise includes architecting large-scale, mission critical enterprise systems in various domains, such as for the FAA, satellite ground systems (GOES-R) and healthcare. Recently, Jonathan has been focused on the use of event driven architectures for microservices and their deployments into platform-as-a-services (PaaS) running within public clouds.
  • WannaCry: Inside the Next Generation of Email Attacks
    WannaCry: Inside the Next Generation of Email Attacks Michael Landewe, Researcher, Avanan Cofounder May 30 2017 3:00 pm UTC 45 mins
    Government-developed malware is loose and IT teams are scrambling. Avanan customers were protected and we had the resources of multiple partners to analyze the attack.

    In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future email phishing outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them.

    We will introduce the zero-day monitoring tool at www.avanan.com/gauge and show how different tools on the Avanan platform responded to the outbreak.

    Today, more than ever, the only protection is a multi-layer, multi-technology, multi-vendor solution. True defense-in-depth that includes the best technology that the security industry can offer.
  • Digital Transformation of the Service Industry: Empowering Today's Employees
    Digital Transformation of the Service Industry: Empowering Today's Employees Todd Kirk, Manager, Product Development, Brainstorm, Inc. May 30 2017 6:00 pm UTC 60 mins
    There are hundreds of millions of frontline workers around the world working in hotels, restaurants, retail stores, on construction sites, and in manufacturing and other service-related industries. These team members are often the public face of the company, interacting with customers and making things happen.

    While they're critical to the company, frontline workers typically don't have a dedicated workspace or computer. This makes it difficult for them to get the information they need for their job. Digital transformation isn't just for corporate offices or IT teams - it's reshaping every industry.

    Join this webcast to:
    - See how Microsoft Office 365 Kiosk empowers frontline workers by giving them access to productivity tools like Microsoft Teams, StaffHub, Outlook, Yammer, and more
    - Learn what's included in Kiosk plans
    - Pick up some tips and tricks to get you started with Kiosk right away
  • Why Continued Improvements & Best-in-Class Modern IT Security is Key
    Why Continued Improvements & Best-in-Class Modern IT Security is Key Nathan Mercer, Sr. Marketing Manager & Michael Niehaus, Director Product Marketing, Microsoft May 30 2017 8:00 pm UTC 60 mins
    Modern IT. Advanced security. Improved productivity. Support and secure devices is more important now than ever before.

    Windows 10, version 1703 (also known as the Windows 10 Creators Update) will continue to bring new security capabilities to IT administrators to help them better protect, defend and respond to threats on their networks and devices. It will also deliver new features and capabilities to help you optimize operations, enhance productivity, and maintain the most secure environment possible. Already, IT administrators estimate a 15% improvement in IT management time with Windows 10. The Creators Update will further shift resources and time-intensive tasks to the cloud, allowing you to acquire, provision, support and secure devices more easily than ever.

    Join this webinar to find out about the latest Window 10 features for IT pros, such as:

    - New actions and insights in Windows Defender Advanced Threat Protection (ATP) that enable you to investigate and respond to network attacks, including sensors in memory, enriched intelligence, and new remediation actions.
    - Best-in-class modern IT features that streamline management and deployment, including new Windows Analytics insights, in-place UEFI conversion, a new mobile application management feature, and continued improvements to Windows as a service.

    You'll also learn how you can provide feedback, and shape the future of Windows, through the Windows Insider Program.
  • [CASE STUDY] How Yelp Uses Machine Data to Improve Its Customer Experience
    [CASE STUDY] How Yelp Uses Machine Data to Improve Its Customer Experience Kris Wehner, Vice President Engineering, Yelp & Charles Guenther, Site Reliability Engineering, Yelp May 31 2017 9:00 am UTC 60 mins
    Yelp, the platform that connects millions with business reviews and reservations, needed a way to make over 10+ terabytes of data accessible and usable to everyone within the company. It also needed to monitor the workloads that span both on-premises and cloud systems, across a variety of stacks.

    Join this webinar to learn how Yelp uses the Splunk platform to proactively notify on issues with the web, and save engineering hours by empowering users with access to data. In this session, you’ll hear how the company:

    • Improved website uptime with real-time notifications
    • Quickly and reliably delivers application features to users
    • Uncovers business insights and improves the customer experience

    If you're already running workloads in the cloud, or in the process of migrating, this is a great opportunity to learn how you can gain additional visibility into your cloud strategy.
  • Do You Have The Right Visibility Needed To Early Detect &Combat Advanced Threats
    Do You Have The Right Visibility Needed To Early Detect &Combat Advanced Threats Karim Abillama, Manager, System Engineering RSA May 31 2017 11:00 am UTC 75 mins
    We live in an era where cyberattacks became mainstream. From malware to ransomware outbreaks, it’s not anymore whether you will get breached or not, it’s more about how quickly you can report it. No matter how well equipped your organization is in terms of having the best preventative controls in place, adversaries will always find a flaw at the most unexpected time and they will inflict damage. The analogy is striking with a maximum security prison where human ingenuity amongst fugitives has to work only once to be deemed efficient.
  • Citrix Webinar: Hybrid Cloud Basics- Get Control & Visibility for All your Apps
    Citrix Webinar: Hybrid Cloud Basics- Get Control & Visibility for All your Apps Derek Yee, Sr. Product Mktg. Manager, Networking, Citrix & George McGregor, Sr. Director, Product Mktg., Networking, Citrix May 31 2017 4:00 pm UTC 60 mins
    Applications are moving to the hybrid cloud: they are either migrating from the data center or they are being developed as cloud native applications. This webinar explores the challenges of gaining end-to-end visibility and control of your applications in a hybrid cloud environment.

    Join us and learn how to:

    •Identify the key requirements to shift your applications to the hybrid cloud
    •Build an application-centric view across all your delivery infrastructure
    •Automate tasks that save time and eliminate human error
    •Integrate with OpenStack and Kubernetes to achieve true orchestration and automation
  • Hybrid cloud and DevOps: What problems do Ops teams need to solve?
    Hybrid cloud and DevOps: What problems do Ops teams need to solve? Sandeep Parmar, Dir of Consulting Services, J9 Technologies, Inc and Neil Miles, Product Marketing Manager, HPE May 31 2017 5:00 pm UTC 60 mins
    Every operations team is on a journey. But is the goal becoming a ‘Digital Enterprise’, or is it ‘Hybrid IT’ or ‘DevOps’? What if it is all three?

    IT operations can no longer afford to solve only one problem at a time.

    This webinar will examine the challenges Ops teams face in meeting interrelated business requirements. We will speak to the automation requirements that are needed to satisfy these challenges. Then we’ll dive into the benefits of using hybrid cloud management together with application delivery automation in moving Ops closer to all these end goals. Ops teams need more powerful tool sets to deliver complex cloud services faster and to be successful in DevOps oriented organizations.

    J9 will share their experiences in working on cloud management projects and HPE will provide an overview of the HPE Hybrid Cloud Management solution suite for unifying hybrid IT management and accelerating application delivery.
  • Architecting the Most Secure Enterprise SD-WAN
    Architecting the Most Secure Enterprise SD-WAN Nitin Kumar, Product Manager, Sasha Nunke, Director of Marketing May 31 2017 5:00 pm UTC 60 mins
    Gartner lists security as one of its top wide area networking concerns—and for good reason: with security breaches on the rise, enterprises must work progressively harder to adequately protect customer data and intellectual property. Most organizations are already engaged with best-of-breed security technologies, but concerns persist about how seamlessly all these solutions work within a WAN to provide reliable, secure, and agile branch connectivity.
     
    This webinar discusses how a Cloud-Delivered SD-WAN—together with its comprehensive security technology ecosystem, including solutions from Fortinet, Palo Alto Networks, Zscaler, IBM, and others—helps enterprises across all industries protect critical corporate assets with best-of-breed branch, data center, and cloud security.
     
    Join this webinar to learn:
    * Enterprise network security trends
    * Advantages of a scalable SD-WAN architecture for securing your WAN
    * How to meet and exceed cloud application user requirements without compromising security
    * See a live demo showing Cloud-Delivered SD-WAN interoperability with leading WAN security solutions
  • Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk
    Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk Travis Hunter and Nathan Letourneau May 31 2017 5:00 pm UTC 60 mins
    Cybersecurity is top of mind for most organizations today, and the education sector is no different. In today’s digital transforming economy, cybersecurity threats and data breaches have evolved, and the way organizations approach protection, detection and response must evolve as well.
    In this joint webinar, Microsoft and Avaleris will discuss cybersecurity and how organizations can safely increase security on identities in their environments and how they can benefit from securing their identity perimeters. We will draw from real examples in today’s landscape to demonstrate this.
    Based on the exclusive set of cybersecurity briefings hosted by Avaleris in conjunction with Microsoft, learn how your organization can compete in a digital world while mitigating the risk associated with a changing cybersecurity landscape.
  • How Cloud Platforms are Shifting the Education Landscape
    How Cloud Platforms are Shifting the Education Landscape Mike Gannotti, Technical Architect, Microsoft May 31 2017 6:00 pm UTC 60 mins
    The education landscape is shifting - digital transformation is not just confined to technology firms or IT teams any longer. Microsoft’s cloud platform enables on-demand and live streaming video solutions for your educational institution’s needs.

    From student video portals to live streaming of lectures to keyword searches within a large university video library, Azure Media Services (AMS) and our ecosystem of technology partners can help transform learning.

    Join this webcast to:
    - Discover how global education institutions are leveraging media services today
    - See how AMS is being used for distance/online learning, streaming lectures/live courses, campus safety, and school video portals, among other uses
    - Explore how AMS can be deployed at your institution
  • Capitalizing on Customer Desire with Social Media Analytics
    Capitalizing on Customer Desire with Social Media Analytics Scott Hajek, Data Scientist, Pivotal May 31 2017 6:00 pm UTC 60 mins
    Determining individual customer desire or intent from social media data provides companies, particularly consumer-facing companies, the opportunity to deliver targeted, more effective messaging and convert more sales. In some cases, the job is fairly easy.

    If someone tweets that she really enjoyed riding in a friend’s Tesla, for example, it’s pretty clear this person is more likely to respond to a targeted offer for an electric car than someone who tweets that they hate Teslas. But in many cases, discerning and capitalizing on customer desire and intent is more challenging. It requires confirming relevance, intent and sentiment, and matching customers with available inventory.

    Join this webinar and learn how to leverage Twitter data and images to create customized offers, using machine learning APIs. Scott Hajek, Pivotal Data Scientist, will describe the data science techniques, tools, and infrastructure to help you to capitalize on this potentially lucrative opportunity.
  • Bimodal IT Infrastructure: Your Stairway to the Cloud
    Bimodal IT Infrastructure: Your Stairway to the Cloud James Labocki, Product Owner, Red Hat Cloud Infrastructure May 31 2017 7:00 pm UTC 45 mins
    Predictive analysis, mass provisioning, and building large, scalable clouds can all happen more quickly, less expensively, and with less risk when it's on the right infrastructure.

    In this webinar you'll learn:
    How to stair-step from simple digitization to innovation.
    How to become bimodal—an environment with both traditional and emerging technologies.
    How being bimodal makes you more agile and better able to align with your business priorities.

    You'll leave this webinar knowing why the right infrastructure—Red Hat® Cloud Infrastructure, which includes Red Hat Insights and Red Hat CloudForms—is your stairway to the cloud.
  • IoT – Tools and Technologies to build the IoT Stack
    IoT – Tools and Technologies to build the IoT Stack Christian Dornacher, Director, Storage & Analytics Solutions EMEA, Hitachi Data Systems Jun 1 2017 9:00 am UTC 60 mins
    To realize IoT projects successfully, it is necessary to select the right tools and technologies. Designs should be made with the end-configuration in mind. Which tools and applications can be used to build the applications/analytics stack and how to make the environment scalable enough for the final configuration.
    In this webinar your will learn:
    - How to understand the challenges and how to decide on tools to build the whole stack, not just one point solution.
    - How to select tools and make sure the solution can be operated and supported.
    - How to make decisions around public, hybrid or private cloud deployment.
    Stay tuned to more webinars in our series "The Hitchhikers Guide to IoT"!
  • GDPR - 358 Days To Fill the Compliance GAP
    GDPR - 358 Days To Fill the Compliance GAP Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo Jun 1 2017 9:00 am UTC 45 mins
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches
  • Security Agility: Enabling Innovation
    Security Agility: Enabling Innovation Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Jun 1 2017 9:00 am UTC 45 mins
    Security and innovation are not often mentioned in the same sentence, but with more and more business-critical applications being moved, or built in the cloud, it is essential that security becomes an agile enabler to cloud adoption. This is where the balance has shifted to integrating security controls into the DevOps lifecycle. Join this session as Misha Govshteyn, SVP of Product Management and Founder at Alert Logic will walk through how to integrate workloads security without slowing down innovation, including:

    -The role of DevOps in security agility
    -Different stages to cloud security maturity
    -The cultural needed for secure innovation
  • VMware Backup Automation: Keeping up with VM Data Growth with Avamar
    VMware Backup Automation: Keeping up with VM Data Growth with Avamar Speaker: Daniel Olkowski, Solution Engineer Dell EMC Data Protection Solutions Jun 1 2017 10:00 am UTC 60 mins
    Today enterprises manage hundreds of virtual machines that need to be protected. With Dell EMC Avamar Dynamic Policies you can easily keep up with the growth of your VMware environments and ensure the appropriate policies are automatically assigned to any VM with certain attributes or tags. Join our live webinar presented by Daniel Olkowski, Solution Engineer Dell EMC Data Protection Solutions to learn how to make your life easier with fully automated VM’s backup.
  • Better Detection: Keeping Pace With The Changing Threat Landscape
    Better Detection: Keeping Pace With The Changing Threat Landscape Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Jun 1 2017 10:00 am UTC 45 mins
    The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?

    In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
  • The Good, The Bad & The Ugly of Threat Detection
    The Good, The Bad & The Ugly of Threat Detection Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic Jun 1 2017 11:00 am UTC 45 mins
    The challenge all organisations face today is the accuracy of threat detection. In the “old days” we faced mostly worms and viruses and it was easier to create rules to detect and block these types of attacks from even entering your network. The threat landscape has evolved for far past those types of threats. A persistent attacker now approaches a target with a much more concerted effort to gain access to your environment and will use all forms of attack to succeed. Through advanced technologies, machine learning, and security expertise it is easier to cut through the noise of what is good (let it through), what is bad (block it), and what needs further investigation.

    Join Marc Willebeek-Lemair for an in-depth discussion on the essential ingredients needed to deliver a well-integrated security model that combines machine learning and human expertise, to harden your environment against modern cyber threats.
  • Protecting Web Applications in AWS
    Protecting Web Applications in AWS James Brown, VP, Technology Solutions Group at Alert Logic Jun 1 2017 12:00 pm UTC 45 mins
    The growing use of public cloud services has created a gap in the defenses of most companies. Not because cloud platforms are insecure themselves, as was once feared, but because the clear majority of legacy on-premises security products do not work for cloud workloads - contrary to claims from legacy security vendors. AWS have the expertise and level of investment required to ensure their cloud infrastructure is hardened, giving traditional infrastructure attack methods fewer avenues for compromise. Now adversaries are setting their sights on the weakest link in the security chain: applications and workloads that run on cloud environments.

    Register for this impactful session as we walk through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey
    Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey Wesley Childs at IDBS and Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic Jun 1 2017 1:00 pm UTC 45 mins
    Join IDBS, a leading provider of advanced R&D data management software for this insightful webinar into the security and compliance challenges they faced on their cloud journey.

    Wesley Childs from IDBS will address the business driver’s behind developing their public-facing web applications in the cloud, provide insight on the challenges that needed to be addressed from a cultural, business and regulatory perspective and conclude with his top 5 lessons learns and pitfalls to avoid to maximise business value of moving applications to the cloud.