Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Are you going to access that data, FROM THERE?
    Are you going to access that data, FROM THERE? Benjamin Massin, CEO at The SCE Group & Gleb EvfaresTov, Solutions Engineer at Bitglass Live 60 mins
    The modern science of securing applications to a broad range of devices.

    Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.

    In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Live 75 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • Straight Talk on Business Critical Applications in the Cloud
    Straight Talk on Business Critical Applications in the Cloud Jim Hannan, Principal Architect; House of Brick Technologies Live 60 mins
    As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?

    During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.

    You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
  • Win the Cyberwar with Zero Trust
    Win the Cyberwar with Zero Trust John Kindervag, Field Chief Technology Officer at Palo Alto Networks Live 60 mins
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • How to Use the NIST CSF to Recover from a Healthcare Breach
    How to Use the NIST CSF to Recover from a Healthcare Breach Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Live 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation
    Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud Live 60 mins
    Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

    Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
  • Getting Started: Automating Google Cloud Platform with Chef
    Getting Started: Automating Google Cloud Platform with Chef JJ, Strategic Technical Alliances at Chef & Nelson Araujo, Software Engineer at Google Recorded: Oct 17 2017 47 mins
    Google and Chef have come together to collaborate to manage the Google Cloud Platform (GCP) natively with Chef. Leveraging the ability of idempotency and Chef you can now declare cloud resources, using Chef, to manage GCP. By combining Chef Automate with GCP, we will show off the ability to programmatically spin up complete cloud infrastructures, without leaving Chef or the need of other tools.

    This webinar will show in action the first wave of products supported deploying a complete end-to-end solution into the cloud, from the ground up, straight from Chef.

    If you have Chef in your infrastructure or are interested in using Chef, your administrators, auditors, and executives will be interested in viewing this webinar.
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect
    Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics Recorded: Oct 17 2017 38 mins
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • Managing Security Operations in the Cloud
    Managing Security Operations in the Cloud Vandana Verma, Manager of Global Information & Application Security, Pegasystems Recorded: Oct 17 2017 53 mins
    The moment an organization starts making a move to Cloud, the way they look at their security changes as well. A traditional security operation is more focused towards a bunch of solutions such as Firewalls, IDS/IPS, Anti-Malware, etc. Security Operations in the cloud is more about following the pragmatic approach. It is about using effectively the huge set of already available resources in the cloud to effectively harden, monitor and defend cloud infrastructures and applications.

    Join Vandana Verma, Manager of Global Information & Application Security, Pegasystems, will discuss creating and managing a successful defensive security program in the cloud. Her talk will be geared towards public cloud infrastructures in AWS.
  • Gestión de servicios de TI en el mundo móvil
    Gestión de servicios de TI en el mundo móvil Alfonso Figueroa Hernández, Recorded: Oct 17 2017 63 mins
    Cumplir las expectativas de los clientes significa proporcionar un excelente desempeño en las aplicaciones web, móviles y portátiles, lo cual puede ser difícil debido a la complejidad de las aplicaciones modernas.
  • [Expert Panel] The future! What to expect from cloud in the next years
    [Expert Panel] The future! What to expect from cloud in the next years Ash Patel, Glyn Bowden, Mark Baker, Srini Karlekar Recorded: Oct 17 2017 63 mins
    It's not a secret anymore that cloud facilitates digital transformation and that many companies are happily embracing it - slower or faster, it really depends on the IT infrastructure already in place. What remains a mystery though, is what's next?

    BrightTALK has invited experts to discuss what is the cloud of the future and which trends are worth your attention to stay ahead of the game.
  • A predictive cybersecurity approach to ransomware protection
    A predictive cybersecurity approach to ransomware protection Charles Lim: - Frost & Sullivan; Zhanwei Chan - Dimension Data; Kevin Leahy - Dimension Data; Al Huger - Cisco Recorded: Oct 17 2017 52 mins
    We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.

    Panel of speakers

    Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
    Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
    Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
    Al Huger: VP Engineering - Security, Cisco
  • Three public cloud myths and how to solve them
    Three public cloud myths and how to solve them Ian Campbell, Sr. System Engineer, Tintri Recorded: Oct 17 2017 26 mins
    The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture - introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
  • Breaking the Rules of Traditional Storage with Containers!
    Breaking the Rules of Traditional Storage with Containers! Kumar Nachiketa, Managing Consultant, Data Storage Specialist, IBM ASEAN, Singapore Recorded: Oct 17 2017 39 mins
    The concept of the container as technology is not new; In recent years it has seen remarkable attention from every industry. The adoption of containers is increasing beyond just stateless conditions such as a load balancer or a web application server. For many adopters of container technology, the persistent storage and data management are the top pain points.
    The way how storage is consumed has indeed changed - This talk is to take you through the journey of data storage evolution. You'll understand the challenges in data storage world due to the demand of new way of consuming storage by the container. Specific use cases, the solution of storage in container environments such as Docker Swarm and Kubernetes will be discussed.

    Speaker Biography
    Kumar Nachiketa is a data storage consultant in IBM Systems Lab Services, ASEAN based in Singapore. In his 11 years of career, he's been helping customers from various industry solving typical data storage challenges in several ways - deployment, consulting, finding ways to evolve. He is currently focusing on IBM Software Defined Storage and cloud technologies. He has co-authored IBM Redbooks on IBM storage cloud and OpenStack integration with IBM Spectrum Scale.
  • Disrupting the Cybersecurity Status Quo
    Disrupting the Cybersecurity Status Quo Nir Zuk, Palo Alto Networks co-founder and CTO Recorded: Oct 16 2017 59 mins
    The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
  • Using the NetApp Portfolio for Virtualized Environments
    Using the NetApp Portfolio for Virtualized Environments Karl Konnerth, Product and Partner Engineer and Doug Chamberlain, Senior Product Marketing Manager Recorded: Oct 16 2017 52 mins
    Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
  • What is Modern Service Management? with John Clark
    What is Modern Service Management? with John Clark IT Chronicles Media Recorded: Oct 16 2017 11 mins
    Modern Service Management is not another framework, or set of books or IP. It is designed to enable ITSM professionals to focus on business outcomes.
  • Agiloft Internal Help Desk - Short Demo
    Agiloft Internal Help Desk - Short Demo Agiloft Recorded: Oct 13 2017 5 mins
    Winner of "Best Overall Value" three years in a row, Agiloft Help Desk is top rated by users and analysts alike. Streamline your operations to close tickets faster, improve consistency, and gain actionable insights. With a customizable end user portal, full workflow engine, dashboard performance metrics, and more. Automate assignments and improve efficiency across your entire organization. Trusted by 3+ million users. Start today and see how Agiloft can work for you.
  • Rethink Load Balancing: 7 Considerations Before Your Next Refresh
    Rethink Load Balancing: 7 Considerations Before Your Next Refresh Ashish Shah Recorded: Oct 13 2017 44 mins
    Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.

    Learn how Avi Networks delivers flexible application services beyond load balancing, including:

    • Application analytics and visibility
    • Predictive autoscaling
    • Automation in private data centers or the public cloud.
  • Security by Design – Modernizing Technology Governance
    Security by Design – Modernizing Technology Governance Tim Sandage, Sr. Security Partner Strategist, AWS Recorded: Oct 12 2017 33 mins
    Up-front design of your cloud environment can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Security by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability across, such as:

    - Organizational governance
    - Asset inventory and control
    - Logical access controls
    - Operating system configuration
    - Database security
    - Applications security configurations

    Why this session:

    Cloud Computing is becoming the new normal, the question isn’t “if” anymore, it’s really just “how fast can we move?” and “what are we going to move first”

    Because of this trend organizations need to understand their security and compliance capabilities and shared responsibilities for security as they migrate resources to the cloud. Whether its clinical trial simulations with Bristol Myers-Squibb, who uses AWS to run clinical trial simulations for 64% less cost; in 1.2 hours vs. 60 hours or Galata Chemicals who are running their development and test workloads in the cloud. Organizations need to start with a “Secure by Design approach, which support security at scale as they increase their use of cloud resources.”
  • Amazon EC2: Making 1.7 Million Cost and Performance Decisions
    Amazon EC2: Making 1.7 Million Cost and Performance Decisions Amiram Shachar, Founder & CEO Spotinst Recorded: Oct 12 2017 20 mins
    According to Gartner, there are more than 1.7 million potential considerations when deploying an Amazon EC2 instance. While there are likely many options that could work for your organization, cost benefits of the cloud won't be realized without a strategic approach and ongoing management.

    In this session, Amiram Shachar, Founder & CEO of Spotinst, will discuss how to find the right balance between On-Demand, Reserved and Spot Instances and considerations for making the right decisions to achieve the proper balance between Cost and Performance. Specifically:

    - How it works - what is the Spot market, why should you use it and for what?
    - Who’s Afraid of the Spot Market? deep dive with Actual production, mission-critical use-cases
    - Predictive and proactive approach to the EC2 Spot Market
  • Saving Your Bacon with the Cloud When Your Data Center is On Fire
    Saving Your Bacon with the Cloud When Your Data Center is On Fire Kenneth Hui, Technical Marketing Engineer at Rubrik Recorded: Oct 12 2017 33 mins
    Ok, so your data center may not catch on fire (at least we hope not). However, the consequences can be just as dire if critical data is lost, a virtual machine crashes or a portion of your data center becomes unavailable. In an emergency, how confident are you about restoring your company’s data in a timely fashion, especially when every minute of downtime may mean lost revenues from and credibility with your customers. What if your company can’t afford the cost of maintaining a disaster recovery site? How long would it take for you to recover from a site disaster?

    Participants will learn:

    - How you can leverage the public cloud for cost effective DR for your on-premises infrastructure

    - What factors do you need to consider to use the Cloud for DR

    - Different approaches to architecting DR in the Cloud, including pilot light, warm standby and hot site.
  • Closing The Skills Gap: Accelerating Governance with Cloud Automation
    Closing The Skills Gap: Accelerating Governance with Cloud Automation Nathan Wallace, Founder & CEO Turbot Recorded: Oct 12 2017 30 mins
    Business agility and faster speed to market are often primary drivers of enterprise cloud strategies. IT organizations often implement a Cloud Center of Excellence (CCoE) model to streamline operations, but without effective automation these teams can quickly become a bottleneck to the broader business strategy.

    In this session, enterprise cloud thought leader Nathan Wallace, CEO & Founder of Turbot, will address how Software-Defined Operations can deliver agility, elevate the business value of the Cloud Center of Excellence, and ensure compliance for your organization.

    Specifically:

    - The business impact of moving to Software Defined Operations
    - How to enable self-service cloud while improving security and compliance.
    - How automation allows the CCoE to focus on higher value delivery.
    - Benchmarks and KPIs to measure the effectiveness of your automation strategy

    About the Speaker

    Nathan Wallace is the Founder and CEO of Turbot HQ, Inc. Nathan is recognized as a transformational leader that has enabled some of the World's largest enterprise organizations to make the transition to public cloud. Nathan has recently been profiled by CIO Applications and was a featured guest on the AWS podcast. Prior to starting Turbot, Nathan was the Global Director of Cloud & DevOps for a Fortune 50 Multi-National Pharmaceutical Company.
  • 5 Ways to Ignite Your Center of Excellence
    5 Ways to Ignite Your Center of Excellence Adam Hoffman, Principal Consultant, HelloNimble Recorded: Oct 12 2017 27 mins
    Creating a Center of Excellence allows organizations to better:

    - Leverage the knowledge of diverse stakeholders
    - Reduce rework and cost
    - Manage change and measure success

    However, to efficiently achieve these results organizations must first initiate a cultural shift, co-create a shared vision of the future and align teams around a strategy for communicating and acting moving forward.

    In this session, Adam Hoffmann will discuss 5 steps that can be used to innovate a custom organizational action plan, foster a culture of collaboration and establish the role of the Center of Excellence in the organization that it serves.

    About the Speaker:

    Adam Hoffmann is the Principal Consultant at HelloNimble; a design consultancy in Melbourne, Florida. He is motivated by leveraging collaboration and research to gain human insights, craft stories and inspire actionable steps toward a desired future state.

    Adam’s diverse education from both the Art Institute of Portland and the Defense Information School paved the way for him to become a highly regarded program manager. Adam prides himself on fusing process and creativity, helping organizations reframe problems and co-create solutions that result in simple, innovative experiences for both the creator and the consumer.
  • 2018 Forecast: Clouds Keep Rolling In
    2018 Forecast: Clouds Keep Rolling In Howard Marks, Deep Storage & Bernie Behn, Avere Systems Oct 17 2017 7:00 pm UTC 60 mins
    Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.

    Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.

    Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.

    Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
    - Current environment and challenges in building hybrid infrastructures that support traditional and object storage
    - Five not-to-be-ignored trends ripe for adoption in 2018
    - How compute and storage can mix in the new cloud-enabled world
  • Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era
    Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era Jim Donovan, VP Product Management & Customer Operations Oct 17 2017 7:00 pm UTC 45 mins
    As digitalization and the Internet of Things (IoT) become commonplace, big data has the potential to transform business processes and reshape entire industries. But antiquated and expensive data storage solutions stand in the way.

    A new generation of cloud storage has arrived, bringing breakthrough pricing, performance and simplicity. Cloud Storage 2.0 delivers storage as an inexpensive and plentiful utility, so you no longer have to make difficult decisions about which data to collect, where to store it and how long to retain it. This talk takes a look into how you can cost-effectively store any type of data, for any purpose, for any length of time. Join us to learn about the next great global utility, Cloud Storage 2.0.

    Key takeaways:
    -The next biggest cloud storage trends and technologies that are shaping the industry
    -How to embrace the era of digital transformation and IoT without breaking the bank
    -Best practices for storing, analyzing and utilizing big data
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Oct 17 2017 9:00 pm UTC 60 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellonox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • Configuration management is dead - Long live configuration management
    Configuration management is dead - Long live configuration management Jussi Nummelin, Resident Wharfie, Kontena Oct 18 2017 8:00 am UTC 45 mins
    Automated configuration management has been one of the biggest enablers in cloud transformation in the past. By using automated configuration management tools and techniques organizations have been able to provision and configure new environments, servers and applications into use quickly to respond to changed needs. During the past couple of years containers have become an increasingly popular way to deploy applications and services. When applications are deployed using container technologies, what is the role of configuration management? This talk takes a look into configuration management, what is was before and what it is becoming in the new container era.
  • How to create the right multi-cloud strategy
    How to create the right multi-cloud strategy James Griffin, Cloud Evangelist, Vodafone Oct 18 2017 10:00 am UTC 45 mins
    In this webinar, James Griffin, cloud evangelist at Vodafone, will look at the common reasons organisations find themselves working with multiple clouds, the challenges this creates and how organisations are adapting their approach to get more value from their investment.

    He will also cover topics such as:
    - Challenges and benefits of multi-cloud environments
    - How to manage all the clouds securely, while getting the most out of it.
  • Next-Gen Cloud security: powered by Blockchain
    Next-Gen Cloud security: powered by Blockchain Narayan Neelakantan, Co-Founder & CEO, Block Armour Oct 18 2017 11:00 am UTC 45 mins
    Security and privacy continue to be the primary concerns for any enterprise considering cloud adoption. Traditional security technologies have failed to keep pace with the rapidly changing cloud architecture resulting in sub-optimal protection for cloud infrastructure.

    It is time to look at emerging technologies such as Blockchain & Software Defined Perimeter (SDP) to reclaim cyber security and build robust architectures which are resilient to cyber-attacks.

    Key takeaways:

    1. Traditional vs next-gen security architecture
    2. Understand Software Defined Perimeter (SDP)
    3. Overview of Blockchain enabled cyber security

    Presenter's bio:

    With more than 16 years of experience in the area of Cyber Security, IT Governance, Risk & Compliance and IT Infrastructure, Narayan is an entrepreneur & an innovative thought leader responsible for strategizing, implementing and maturing Risk Management & Cyber Security.
    He has co-founded Block Armour – a blockchain based cyber security product startup. Prior to founding Block Armour, he worked with National Stock Exchange (NSE) as Head – IT Risk & Compliance & CISO.
    He has been a visionary and driving force in building NSE’s IT Risk Management strategic plan, roadmap, methodology, policies, organizational model, staffing, governance, and reporting from the ground up.
    Narayan is a well-known speaker at various national and international conferences where he shares his passion, views & concerns on Cyber Security.
    He is on the advisory board of the Cyber Security Research Institute (UK) and member of several security forums.
  • The rise of multi-cloud - what to expect and how to prepare
    The rise of multi-cloud - what to expect and how to prepare Antonio Piraino, Chief Technical Officer, ScienceLogic Oct 18 2017 12:00 pm UTC 60 mins
    With HyperScale Clouds reaching their eleventh year of operation, The Cloud is no longer a semi-autonomous shadow-IT playground, but rather the critical component of any Enterprise Transformation strategy. The fear of cloud failure is no longer the deterrent it once was, and modern strategies dictate a multi-cloud architecture allowing for optimized value and simultaneous risk mitigation. This webinar discusses why there is now widespread adoption of a multi-cloud strategy, and how it helps to achieve several business objectives; namely: optimized ROI, superior security, lower latency and higher throughput, greater autonomy, greater availability and resource optimization. Antonio will also dig into the most current emerging trends of the multi-cloud, including immutable infrastructure and the concurrent tools transformation accompanying this paradigm shift.
  • 10-step plan to roll out Cloud devops
    10-step plan to roll out Cloud devops Mark Baker, OpenStack Product Manager Oct 18 2017 2:00 pm UTC 60 mins
    In this webinar we will talk about practical steps that will help you:
    - Reap the benefits of hybrid cloud by adapting to cloud devops
    - Deal with the technical and operational pitfalls involved in migrating to native cloud
    - Make the right choices for your cloud architectural to achieve lean devops
  • Overcoming BizDevOps Challenges to Scale Cloud Strategy
    Overcoming BizDevOps Challenges to Scale Cloud Strategy Jeanne Morain, Rahul Ravulur, Chris Orlando Oct 18 2017 3:00 pm UTC 60 mins
    According to Pulse, over 84% of Digital Transformation efforts are failing. Companies are worried about how they balance legacy systems while keeping pace with new nimble players in the Cloud Era.

    How do you overcome the traditional silos between IT and the business to achieve success in Digital Transformation? What are the challenges politically, technically, and operationally that need to be overcome to turn your cloud vision into transformation reality?

    Join our host Jeanne Morain, Author & Cloud/Digital Strategist and her special guests Rahul Ravulur, Founder & CEO, appOrbit and Chris Orlando, Co-Founder & Chief Sales & Marketing Officer, ScaleMatrix, as they explore the top 5 challenges and solutions both they and/or their customers have faced to achieve success in Digital Transformation, both from an IT and a business management perspective.
  • Achieving Agile Application Integration
    Achieving Agile Application Integration Kevin Phillips, Sr Middleware Solutions Sales Specialist Larry Castello Sr Middleware Solutions Sales Specialist Oct 18 2017 3:00 pm UTC 60 mins
    The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.

    We will discuss:

    - How agile integration can benefit your organization and make it more responsive to market demands
    - Successful agile application integration approaches
    - Best practices for implementing an agile application integration environment

    The webcast is intended for system architects and application developers.
  • Taking Digital Transformation Beyond the Buzz
    Taking Digital Transformation Beyond the Buzz John Burke, principal research analyst, Nemertes Research, John Keller, director, Product Management Comcast Oct 18 2017 4:00 pm UTC 45 mins
    Getting there may be less complex than you think.

    “Digital transformation” isn’t necessarily a quantum leap in technology or even a linear progression—it’s a change that takes place across a spectrum. In fact, you’re likely already in the midst of some form of it. A recent IDC survey reveals that companies across all sectors are applying connected digital technologies—mobile apps, social networks, cloud services, big data and analytics, etc.—to achieve cost reductions, revenue increases, and service improvements.

    Clearly, digital transformation is well underway. The question is, how far along the continuum are you and what does it take to fully realize digital transformation? In “Taking Digital Transformation Beyond the Buzz”, a webinar from Comcast Business, our knowledgeable panelists will discuss how rapid changes in technology and culture have impacted changing infrastructure needs; how mobility, analytics, social media, IoT, and future AI workloads are driving greater digitalization and the need for scalable, agile systems; the need to eliminate siloed environments to enable growth; and the ways to assess where your company is on the path to change.

    Our panelists are:
    •John Burke, principal research analyst, Nemertes Research. John advises key enterprise and vendor clients, conducts and analyzes primary research, and writes thought-leadership pieces across a wide variety of topics.
    •John Keller, director, Product Management Data Center/Cloud Connectivity for Comcast Business. John is responsible for solutions and services focused on enabling customers to leverage multi-tenant data centers and cloud providers through private, direct connections.

    Key takeaways include:
    •Digital Transformation Drivers and Challenges
    •Key Components and Priorities
    •Additional Considerations and Tools

    Register now for this webinar broadcast on October 18th at Noon EST, today!
  • Digital Transformation Achieved – Hitachi Customer Share their Journey
    Digital Transformation Achieved – Hitachi Customer Share their Journey Paul Lewis Oct 18 2017 4:00 pm UTC 60 mins
    Every business and organization around the world is under pressure to adapt to the growing demands of digitalization. Their customers expect it. Their competitors exploit it. Hitachi is expert in it.

    Hear from the Hitachi customers as they share their stories of how they used Hitachi solutions to accelerate their business transformation in innovative and successful ways. Learn

    You’ll benefit from this webinar as we cover the following:
    •Accelerating business transformation in innovative and successful ways
    •Leveraging data to meet the growing demands of digitalization
  • Tiers Without Tears: A Modern Archive Architecture
    Tiers Without Tears: A Modern Archive Architecture Ashvin Naik Oct 18 2017 4:00 pm UTC 60 mins
    As a modern object storage platform, Elastic Cloud Storage (ECS) brings cloud economics and Exabyte scale to your datacenter, thereby drastically lowering the total cost of ownership for your storage. In this session, you will learn about tiering your data to ECS from Dell EMC platforms like Isilon, Data Domain, as well as third party storage platforms to take advantage of modern infrastructure and get more out of your IT investments.
  • Visibility & Actionable Intelligence for a Migration to GCP
    Visibility & Actionable Intelligence for a Migration to GCP Chris Grossmeier, Director of Product Management Oct 18 2017 4:00 pm UTC 45 mins
    Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
  • Predicción en la Gestión de Proyectos. La clave para asegurar el éxito.
    Predicción en la Gestión de Proyectos. La clave para asegurar el éxito. Armando Quiroz, Coordinador de Project Management, PRAXIS México y Jorge Alberto Moreno, Sr Consultant, CA Technologies Oct 18 2017 4:00 pm UTC 90 mins
    La innovación es una palanca estratégica que se utiliza para hacer crecer el negocio y mantenerlo competitivo. El constante cambio tecnológico requiere estrategias que usen el análisis predictivo; la nueva tecnología que está transformando de forma exitosa la administración de proyectos.
  • Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage
    Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage Sim Upadhyayula, Supermicro; Vivek Sarathy, Intel; Jase McCarty, VMware Oct 18 2017 5:00 pm UTC 60 mins
    Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.

    BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.

    For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.

    Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
  • Today's Predictions for Tomorrow's Connected World
    Today's Predictions for Tomorrow's Connected World Kevin Haley, Director of Product Management for Symantec Security Technology and Response Oct 18 2017 5:00 pm UTC 30 mins
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before.

    Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.

    Register Today
  • Essential Reading for the Security Professional
    Essential Reading for the Security Professional Rick Howard, chief security officer at Palo Alto Networks Oct 18 2017 5:00 pm UTC 30 mins
    Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
  • The Frontline Is Everywhere: New Perspectives on Defense in Depth
    The Frontline Is Everywhere: New Perspectives on Defense in Depth Brian Anderson, Director of Security Product Management Oct 18 2017 6:00 pm UTC 60 mins
    As today’s businesses come under attack from increasingly malicious cyber threats, a traditional “defense in depth” strategy may become insufficient to effectively fend off attackers and prevent business disruptions and downtime. As mobility, IoT, and BYOD open new attack vectors and attacks become more sophisticated, the situation only worsens. While 100% prevention is impossible, rapid identification and containment is not.

    
In this live webinar, TierPoint Director of Security Product Management, Brian Anderson will discuss why we need to redefine defense in depth approaches to safeguard data from emerging threats.

    
Join Brian as he shares insight into the following key considerations when developing a better, more comprehensive security strategy:

    • The implications of the disappearing network edge.
    • Why a traditional “defense in depth” approach, while still a good start, is no longer sufficient
    • Keys to rapid identification and containment
    • How visibility, detection, escalation, and automated response help close the loop
  • Using Containers for Hybrid Cloud & Cloud Migration
    Using Containers for Hybrid Cloud & Cloud Migration Amir Jerbi, CTO and co-founder at Aqua Security Oct 18 2017 6:00 pm UTC 45 mins
    The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
    In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
    1.How containers make it easy to migrate and move applications between clouds
    2.What architectural considerations and tooling you need to achieve portability
    3.How to ensure consistency of control, security, and compliance across container cloud deployments
  • All things logging for Kubernetes on AWS
    All things logging for Kubernetes on AWS Colin Hom, CoreOS Oct 18 2017 6:30 pm UTC 60 mins
    This webinar will show how to set up an ELK (elasticsearch-logstash-kibana) logging stack on top of a Tectonic Kubernetes cluster. These three components work together to provide a solid logging, searching, and visualization of your infrastructure's data logs. We'll split this webinar into 3 segments to teach how to deploy the stack, how to query your log data, and how to integrate the ELK stack with Tectonic's cloud-native tools.

    Part I: Deploy the stack
    This involves three new components which will be deployed on the cluster: Elasticsearch statefulset, Fluentd daemonset, and Kibana.

    Part II: Querying log data
    Next, we'll look at how to effectively reference Kubernetes metadata when querying log objects in stored in Elasticsearch, and some common patterns in querying Kubernetes logs and gaining visiblity into various cluster components and/or deployed applications.

    Part III: EFK/ELK cluster logging on tectonic
    Finally, we will address how to deploy the ELK stack optimally on top of Tectonic.
  • Tech Talk Live Demo
    Tech Talk Live Demo Tim Twarog, Eastern US Account Executive Oct 18 2017 7:00 pm UTC 60 mins
    You've heard about the many ways CloudCheckr can keep your cloud in check! Now you can see CloudCheckr in action, including demos of our 500+ Best Practice Checks, our Cost Savings Reports and Right Sizing tools, and our Security & Compliance features.

    In this webinar, you can view and ask questions as Tim Twarog demonstrates popular features of this award-winning platform.
  • Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS
    Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS Eric Carter, Sr. Director Product Management at Hedvig Oct 18 2017 8:00 pm UTC 45 mins
    How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.

    In this session we'll provide:
    -Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
    -How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
    -Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.