Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Encryption & Tokenization as effective GDPR Best Practices
    Encryption & Tokenization as effective GDPR Best Practices An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson Recorded: Aug 20 2018 63 mins
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Designing a Distributed Cloud Database for Dummies
    Designing a Distributed Cloud Database for Dummies Patrick McFadin, VP of Developer Relations at DataStax Recorded: Aug 17 2018 46 mins
    Watch Designing a Distributed Cloud Database for Dummies—the webinar. The webinar “stars” industry vet Patrick McFadin, best known among developers for his seven years at Apache Cassandra, where he held pivotal community roles. Register for the webinar today to learn: why you need distributed cloud databases, the technology you need to create the best used experience, the benefits of data autonomy and much more.
  • EPISODE 1: The Economics of Managed Cloud Services & Tips for Choosing the Right
    EPISODE 1: The Economics of Managed Cloud Services & Tips for Choosing the Right Jay Gagne Recorded: Aug 16 2018 6 mins
    Watch our first installment of the Tech over Coffee series featuring, Jay Gagné, CTO and Jeff Thompson, Director of Architecture and Operations, as they bring a unique-level of candor and humor to timely tech topics and impending trends in IT and data security.
    This episode includes discussion about:
    • The most common challenges of managed services
    • The economics of managed cloud services
    • How to identify which cloud model to implement
    “Tech over Coffee will provide both our tech-peers and prospective partners and clients with down-and-dirty information about what’s happening in the ever-evolving world of information technology. In our industry, information is constantly emerging, so rather than contemplating our thoughts behind closed doors, we decided to share our views and contemplations with other curious minds.” – Jay Gagné
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 16 2018 40 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Defending the Castle – Back to the Future using Isolated Networks
    Defending the Castle – Back to the Future using Isolated Networks John Alexander, Director of Product Marketing, OPSWAT Recorded: Aug 16 2018 58 mins
    In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

    In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

    Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
  • Your Organization's Role in the Shared Responsibility Model
    Your Organization's Role in the Shared Responsibility Model Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 16 2018 29 mins
    A Guide to Understanding and Taking Control

    There is no doubt managing massive amounts of enterprise data is inherently easier in the public cloud. However, given its size, that data is a target for malicious security threats from attackers both within and outside organizations. While leading cloud platforms like Amazon Web Services and Microsoft Azure can help ease the burden of cloud migration, they are not responsible for the comprehensive security and compliance checks necessary to keep your data safe in the cloud. That’s why next-generation automated cloud monitoring and security management tools like CloudCheckr are essential for closing the loop.

    In this webinar, Product Marketing Manager Todd Bernhard maps out shared responsibility models for AWS and Azure and explains how CloudCheckr keeps your data secure and compliant.
  • Secure your customer’s Office 365 environment with leading security solutions
    Secure your customer’s Office 365 environment with leading security solutions Chris Taylor -Director, Product Marketing; Jon McCarrick-Technology Evangelist; Maggie Szczygielski -Channel Account Manager Recorded: Aug 16 2018 40 mins
    Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their service provider with their most important, sensitive, and confidential data.

    Hear how bundling an Office 365 solution with Trend Micro and Acronis provides a complete and comprehensive solution for your customers while building year over year recurring revenue for your business. Join our webinar and let’s discuss how partnering with Trend Micro and Acronis will transform your business with easy to deploy, manage, and sell security solutions.

    In this webinar the following will be covered:


    •Best practices for securing your customers Office 356 environment
    •Learn how Trend Micro’s Cloud App Security enhances Office 365 security to detect advanced threats including unknown malware, ransomware, and malicious URLs.
    •Learn how Acronis provides Backup solutions needed for Office 365 email eliminating operational overhead, streamlining backup sales, and meeting data protection regulatory requirements.
  • Aproveite o potencial das identidades digitais dos consumidores
    Aproveite o potencial das identidades digitais dos consumidores Darcio Takara Recorded: Aug 16 2018 56 mins
    Os consumidores da atualidade não querem ficar esperando no serviço de atendimento ao cliente por telefone. Os consumidores da atualidade não querem preencher longos formulários on-line para acessar informações ou recursos. Resumindo, o tempo dos consumidores da atualidade é valioso e limitado. Assim, cada empresa está redefinindo sua experiência digital on-line para maximizar a participação do cliente, melhorar a afinidade da marca e aumentar a participação na carteira do consumidor.

    Esta é a sua oportunidade de aprender como aproveitar a identidade digital do consumidor pra fomentar uma estratégia efetiva de participação do cliente. Junte-se a nós, neste webinar e conheça casos de sucesso de diversas indústrias que estão explorando o poder da identidade digital do consumidor para gerar confiança e fazer com que a interação com o cliente não tenha atritos.
  • Leveraging Security Automation for Improved Management
    Leveraging Security Automation for Improved Management Ken Wilson, Dir, Sales Central U.S., Skybox, Michael Roling, CISO, State of MO; Curtis Dukes, CIS; Brandon Dunlap (Moderator) Recorded: Aug 16 2018 61 mins
    Security automation technologies can help drive improvements in managing security policies, including their implementation in firewalls and other network devices. However, whether you’re struggling with continuous compliance, auditing and reporting or managing firewall changes, deciding what to automate can be challenging. Join Skybox Security and (ISC)2 on August 16, 2018 at 1:00PM Eastern for a discussion where we’ll examine which automated processes in security policy management deliver the biggest rewards while introducing the least risk to your organization. Areas to be examined include why automation, visibility and context should be the indivisible, foundational components of any security policy management solution, which processes in security policy management are ripe for automation and where human intervention is still valuable. We’ll also explore how to educate security stakeholders in your organization on what’s needed to make automation initiatives a success.
  • Defending our Critical Infrastructure
    Defending our Critical Infrastructure Juanita Koilpillai and Mark Rasch Recorded: Aug 16 2018 62 mins
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • How to Develop a Secure Cloud Strategy
    How to Develop a Secure Cloud Strategy Brian McHenry, Security Solutions Architect; Tom Thomas, Director of Architecture Recorded: Aug 16 2018 63 mins
    How are you deciding what applications should move to the cloud? Is there a clear understanding of how to best secure those apps?

    Join F5’s own Director of Architecture Tom Thomas, and Security Solutions Architect Brian McHenry, as they discuss a deployment framework which you can use to assess the impact of on-premises versus cloud, while considering the business, data security, and financial impact of cloud migration.

    By the end of this webinar you’ll have the answers to these questions and more:

    • Are the security services my cloud provider offers enough to secure my applications?
    • How much of my business should migrate to the cloud?
    • What tools can help protect against the cost of lost or compromised data?
  • 200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System
    200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System John Maddison, SVP Products & Solutions, Fortinet Recorded: Aug 16 2018 49 mins
    The security challenges facing organizations today can't be solved with traditional approaches. Digital transformation is creating an unending digital attack surface, point solutions are creating unprecedented complexity, and threats are constantly becoming more sophisticated.

    Watch our webinar to learn how FortiOS, the most deployed network security operating system in the world, solves today's security challenges with broad coverage, massive integrations, and time-saving automation. Specifically, learn the details on revolutionary new features that deliver better protection in all areas of the network.
  • Solving the Gordian Knot of DevOps in the Hybrid Cloud
    Solving the Gordian Knot of DevOps in the Hybrid Cloud Darren Pulsipher Recorded: Aug 16 2018 49 mins
    As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Recorded: Aug 16 2018 40 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure
    VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure Mark Geel Recorded: Aug 16 2018 38 mins
    The new VxBlock 1000 breaks the physical boundaries of traditional converged infrastructure to give businesses unprecedented simplicity and flexibility to meet all their application data services needs. Learn how this next-generation engineered system provides unmatched choices of market-leading storage, data protection, and compute for all workloads to maximize system performance and utilization.
  • Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
    Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring Andrew Bragdon, Principal Product Manager, MuleSoft Recorded: Aug 16 2018 56 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:
    * Measure application performance across APIs and integrations in production
    * How to query and retrieve log data across your network
    * End-to-end walkthrough of priority issue identification and resolution
    * Exciting new capabilities of Anypoint Monitoring
  • Enable SAP Predictive Maintenance/Analytics with IoT Data
    Enable SAP Predictive Maintenance/Analytics with IoT Data Roland Wartenberg, Senior Director, Global Alliances, NetApp and Juergen Hamm, SAP Solution Architect, NetApp Recorded: Aug 16 2018 46 mins
    Out of a variety of projects, NetApp has developed a five-staged model to solve the challenge of data management in the Internet of Things domain. In this session you will learn how SAP helps customer get ready for the digital journey using SAP Business Objects for Analytics and SAP HANA. We will show, based on a real-world scenario, how IoT data are processed for predictive analytics and how a hybrid model with SAP Leonardo can be deployed.

    Key Takeaways:
    - Understand how SAP, Hadoop, and NetApp work well together
    - Learn how predictive analytics could be applied to IoT data
    - See the integration of NetApp into several SAP IoT related products
  • Webinar: Aproveche el potencial de las identidades digitales de los consumidores
    Webinar: Aproveche el potencial de las identidades digitales de los consumidores Juan Cerchia Recorded: Aug 16 2018 36 mins
    Los consumidores de hoy no quieren esperar al servicio de atención al cliente por teléfono. Los consumidores de hoy no quieren completar formularios largos en línea para acceder a información o recursos. En resumen, el tiempo de los consumidores de hoy es valioso y no ilimitado. Como resultado, cada compañía está redefiniendo su experiencia digital en línea para maximizar la participación del cliente, mejorar la afinidad de la marca y aumentar su participación en la cartera del consumidor.

    Esta es su oportunidad para aprender cómo aprovechar la identidad digital del consumidor para fomentar una estrategia efectiva de participación del cliente. Únase a nosotros, en este Webinar y conozca casos de éxito de múltiples industrias que están explotando el poder de la identidad digital del consumidor para generar confianza y hacer que la interacción con el cliente no tenga fricciones.
  • Das Geheimnis erfolgreicher Unternehmen
    Das Geheimnis erfolgreicher Unternehmen Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Recorded: Aug 16 2018 46 mins
    Nur wer seine Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • SUSE OpenStack Cloud 8
    SUSE OpenStack Cloud 8 Hargitai Zsolt Recorded: Aug 16 2018 53 mins
    Az OpenStack Pike kiadására épülő SUSE OpenStack Cloud 8 az első olyan verzió, amely integrálja a SUSE OpenStack Cloud képességeit és a SUSE által tavaly megvásárolt HPE OpenStack technológiákat. A megoldás felgyorsítja a szoftveresen vezérelt infrastruktúrák bevezetését, emellett továbbfejlesztett interoperabilitása, skálázhatósága és rugalmassága révén támogatja a nagyvállalatokat az IT-rendszer modernizálásában, és ezen keresztül az éles piaci versenyben jelentkező, új üzleti kihívások legyőzésében is. A webinárban bemutatjuk a termék legfontosabb újdonságait, valamint a legfontosabb felhasználási területeket, beleértve a szoftver alapú hálózatokat (SDN) és a konténereket. További információ a termékről: https://www.suse.com/products/suse-openstack-cloud/
  • Modernising the Data Centre
    Modernising the Data Centre Nathan McGregor, VP & Managing Director ANZ, Hitachi Vantara; Chris Drieberg, Director, Pre-sales, ANZ, Hitachi Vantara Recorded: Aug 16 2018 4 mins
    Chris and Nathan take you through the steps and benefits of modernising your data centre and infrastructure, whether you’re making significant use of multiple clouds now, or will do in the future.
  • Databases: The Neglected Technology in DevOps
    Databases: The Neglected Technology in DevOps Sanjay Challa - Head of Product Marketing. Datical Recorded: Aug 15 2018 62 mins
    Much has been written about software delivery in DevOps, with much less focus on the database. However, DevOps can—and should—play an equally critical role in both software and database development. In this webinar, we examine how DevOps can be used for database development and delivery, factors influencing DevOps’ role in database delivery, and some of the technologies designed to help.


  • HIPAA-Aware Security Breach Prevention Policies for Email
    HIPAA-Aware Security Breach Prevention Policies for Email Simon Reddington, Technical Product Manager, Healthcare Practice Recorded: Aug 15 2018 32 mins
    Healthcare is the number one industry where employees are the predominant data security breach and compliance threat. 62% of breaches tend to be associated with unintentional outbound email misdelivery. In the context of ever increasing expectations on healthcare workers and reliance on electronic communication, it has become critical for IT security professionals to develop strategies to mitigate security breaches related to the release of protected health information (PHI).

    Join this summit session to learn how organizations are automating security breach policy oversight with pre-defined, HIPAA-aware data leak prevention policies that can be rapidly configured and then applied to a healthcare organization’s entire local or distributed workforce.

    Presenter Info:

    Simon Reddington, Technical Product Manager, Healthcare Practice

    Simon is a Technical Product Manager at Mimecast. Prior to joining Mimecast in 2013, he held technical roles at companies such as WorkShare and Fuel-IT Ltd. He has domain expertise around cloud computing and virtualized environments, Windows Server, Microsoft Exchange, and network administration. He holds a BSc in Computer Science, with Honors, from the University of Essex.
    David Hood, Cyber Security Strategist and Director of Technology Marketing, Healthcare Practice
    David is a Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.
  • Take the Safer Road: Best Practices in SaaS Application Security
    Take the Safer Road: Best Practices in SaaS Application Security Doug Cahill (ESG) Recorded: Aug 15 2018 40 mins
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • Introduction to SNIA Swordfish™ ─ Scalable Storage Management
    Introduction to SNIA Swordfish™ ─ Scalable Storage Management Alex McDonald, Vice-Chair SNIA Europe and NetApp Aug 21 2018 9:00 am UTC 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting.

    Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
  • Pervasive Integration - Introducing Hybrid Implementation Platform
    Pervasive Integration - Introducing Hybrid Implementation Platform Mikkel Iversen, Head of Integration, NNIT Aug 21 2018 11:00 am UTC 45 mins
    This session will focus on introducing pervasive integration with the different integration personas as Integration Specialists, AdHoc integrators and Citizen integrators. The session will cover the implementation of a Hybrid Integration platform and the components it can consist of: ESB, iPaaS, Api Mgt. and iSaaS. It will be described, how a HIP can supplement agile development organizations and BiModal IT.


    About Mikkel Iversen:

    Mikkel Iversen has worked with enterprise integration for the last 12 years with tasks ranging from developer, architect, business liaison to management of integration CoEs. Today he is responsible for all integration technologies and consultants in NNIT – A leader in the integration space in the Nordics.
    Mikkel focuses on integration organization and overall implementation of Pervasive integration solutions, with a shift from Center of Excellence to Center of Enablement.

    Other webinars in this Cloud Webinar Series:

    Session 2: Welcoming the Informatica Intelligent Cloud Services
    Session 3: Using IICS to orchestrate complex order processing
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Governo na Palma da Mão
    Governo na Palma da Mão Rubens de Souza Aug 21 2018 1:00 pm UTC 60 mins
    CA Technologies lança solução para facilitar a vida dos cidadãos e melhorar os serviços prestados pelos órgãos públicos do estado. O GPM (Governo na Palma da Mão) integra sistemas de secretarias, ministérios e demais órgãos públicos para diminuir deslocamentos e custos de agendamento de consultas médicas e matrículas escolares, entre outros serviços fundamentais.

    Descubra como o GPM tira proveito da familiaridade dos cidadãos com as tecnologias móveis e permite em apenas alguns cliques agendar consultas médicas, fazer matrículas escolares, acompanhar o desempenho dos alunos, realizar campanhas de saúde, entre outras atividades de serviço público, sem enfrentar filas.

    Saiba Mais neste Webinar.
  • Aproveite o maximo da sua solução SAP com a SUSE e Lenovo
    Aproveite o maximo da sua solução SAP com a SUSE e Lenovo Aslan Carlos, SUSE Sales Engineer & Adriano Fratelli, Lenovo SE Aug 21 2018 1:00 pm UTC 75 mins
    Suas aplicações SAP são a base de sua transformação digital!

    Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
    Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:

    - Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
    - SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
    - SUSE Manager permite que você gerencie várias distribuições Linux.
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Aug 21 2018 1:00 pm UTC 60 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Gobierno en la Palma de la Mano
    Gobierno en la Palma de la Mano Narciso Lucero Aug 21 2018 3:00 pm UTC 60 mins
    Los hábitos y las expectativas de los usuarios están cambiando en forma acelerada. Esta realidad deben afrontarla tanto empresas privadas como públicas. Las empresas deben tener satisfecho al cliente y las Instituciones deben garantizar la satisfacción del ciudadano. Por esta razón, es indispensable que el gobierno, en todos sus niveles, redoble los esfuerzos de digitalización de sus servicios.
    Para acompañar estos desafíos CA Technologies ha creado el programa Gobierno en la Palma de la Mano (GPM) con el fin de facilitar la interacción de la ciudadanía con todos los niveles de gobierno. Acompáñenos en este Webinar y descubra cómo:
    •Elaborar aplicaciones y servicios digitales que funcionen rápidamente y con calidad
    •Garantizar la seguridad de la identidad de los usuarios y de la información que manejan mediante servicios digitales;
    •Garantizar la disponibilidad y el desempeño de los servicios en línea, para ofrecer una experiencia de usuario única.
  • 6 Ways to Simplify the Management of Your Multi-Cloud Environment
    6 Ways to Simplify the Management of Your Multi-Cloud Environment David Linthicum, Cloud Computing Thought Leader, Linthicum Research and Michael Procopio, Product Marketing, Micro Focus Aug 21 2018 3:00 pm UTC 30 mins
    With 92% of enterprises now using multiple cloud vendors, the complexity of managing a heterogeneous multi-cloud infrastructure continues to increase dramatically.

    But managing a multi-cloud environment doesn’t have to be a complicated affair.

    Emerging IT Operations processes and tools can solve your complexity problems—and eliminate them going forward—but only if you make the right choices.

    Join us on this webcast as we discuss six recommendations that will help you simplify the management of your multi-cloud environment.
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development Prakasha Aradhya, Product Management Director, Red Hat Aug 21 2018 4:00 pm UTC 60 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • The Software Asset Management Landscape Has Changed: What You Need to Know
    The Software Asset Management Landscape Has Changed: What You Need to Know Carleen Carter, Wally Waltner, Meghan Lockwood Aug 21 2018 5:00 pm UTC 60 mins
    On Tuesday, August 21st, at 1:00 PM ET, 10:00 AM PT, join Carleen Carter, Acorio's Director of Technical Consultants and Solutions, as she presents The Software Asset Management Landscape is Changing: Here's What You Need to Know.

    - Software Asset Management Best Practices & Strategy
    - Changes with Virtual Machines and Cloud Licenses
    - Lower cost and risk with ServiceNow's Software Asset Management
  • The Age of Consumption: HCTS 2018 Q&A
    The Age of Consumption: HCTS 2018 Q&A 451 Research Vice Presidents Kelly Morgan, Melanie Posey and Al Sadowski Aug 21 2018 6:00 pm UTC 30 mins
    451 Research’s 14th annual Hosting & Cloud Transformation Summit (HCTS) in Las Vegas from September 24-26 is coming up fast! HCTS welcomes executives in the hosting, cloud, datacenter and managed services sectors to hear timely, actionable insight into the competitive dynamics of innovation from 451 Research analyst talent and guest speakers including AWS, Microsoft, Huawei, ING, DH Capital and more. In this webinar, we will be discussing what to expect from this year’s Summit, some highlights from previous years and asking about upcoming sessions with three 451 Research Vice Presidents who will be taking the main stage at HCTS: Kelly Morgan, Melanie Posey and Al Sadowski. Join this Q&A webinar to learn about:
    - What is the Age of Consumption and what should we expect to see from it?
    - Why should organizations have a strong business-IT alignment when moving forward with a Digital Transformation strategy?
    - What, if any, key shifts are happening in the multi-tenant datacenter space as a result of the age of consumption?
    - Why are hyperscalers both a friend AND foe to other service providers?
  • Data management platform consolidation with enterprise Linux
    Data management platform consolidation with enterprise Linux Ashish Nadkarni, program vice president, Worldwide Infrastructure Practice, IDC Jennifer LuPiba, product mktg, Red Hat Aug 21 2018 6:00 pm UTC 60 mins
    Modern businesses depend on their applications. Databases that support these applications must deliver high performance and increased stability to meet business requirements for reliability, availability, and end-to-end security. IT should select an appropriate database management system (DBMS) and operating system environment (OSE) for enterprise-wide consolidation. A tried and trusted DBMS platform matched with an equally proven commercial Linux® OS is valuable to the entire application stack.

    Join IDC and Red Hat to learn about:
    > Application modernization and data management.
    > The role of Linux in enterprise application strategy.
    > How the choice of DBMS and OSE influences scalability and reliability of the overall stack.
    > How Red Hat® Enterprise Linux and Microsoft SQL Server 2017 deliver a highly available and reliable foundation for database operations.
    > The benefits of bringing together product development expertise, investments in cloud platforms and services, and the support and services of Red Hat and Microsoft.
  • Get Started: Billing and Invoicing in the Cloud
    Get Started: Billing and Invoicing in the Cloud Brett Gadberry, Technical Account Manager at CloudCheckr Aug 21 2018 6:00 pm UTC 45 mins
    Managed Service Providers (MSPs), Cloud Service Providers (CSPs), and resellers often have a tough enough time generating invoices for their customers. Add to that the demands of a multi-cloud environment, with AWS, Azure, Google Cloud and more, and it becomes extremely challenging to allocate billing and invoicing.

    The solution is automation and self-healing. CloudCheckr can automatically generate invoices and even help resellers profit by keeping discounts and credits allocated among clients, presenting list price, as well as custom charges and credits as desired.

    Attendees will learn:
    - How to turn billing and invoicing into a profit center
    - Creative tag mapping strategies
    - How to structure automation monthly, weekly, and daily
  • The 3 Secrets of Successful, Modern Enterprises
    The 3 Secrets of Successful, Modern Enterprises Roz Gregory, Director Customer Success and Digital Transformation, APJ, Pivotal Aug 22 2018 3:00 am UTC 60 mins
    When done right, digital transformation makes good companies into great companies. This requires a transformation of how your business approaches software development, leveraging agile platforms, tools and methodologies to deliver speed, scale, and security.

    This webinar will share industry insights and real-world use cases to help your business make transformation real. We’ll cover the following topics:
    - The business realities of undertaking a real transformation journey
    - Three secrets behind successful modern software organisations
    - Six key learnings from digital transformation leaders
  • Welcoming the Informatica Intelligent Cloud Services
    Welcoming the Informatica Intelligent Cloud Services Dion Jensen, Principal Presales Consultant, Informatica Aug 22 2018 9:00 am UTC 60 mins
    This session will give you an overview of the new IICS platform: covering an introduction to the Informatica Intelligent Cloud Services platform with numerous, real world use cases, as well as a session around how to bring your PowerCenter workload to the Cloud.


    Other webinars in this Cloud Webinar Series:

    Session 1: How to engage with Cloud Computing?
    Session 3: Using IICS to orchestrate complex order processing
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Orchestrate: Using IICS to orchestrate complex order processing
    Orchestrate: Using IICS to orchestrate complex order processing Dion Jensen, Principal Presales Consultant, Informatica Aug 22 2018 11:00 am UTC 45 mins
    This session will include a demonstration of the powerful and flexible ability for the Informatica Intelligent Cloud Services (IICS) to process orders via two different channels, spanning multiple services within the IICS platform.


    Other webinars in this Cloud Webinar Series:

    Session 1: How to engage with Cloud Computing?
    Session 2: Welcoming the Informatica Intelligent Cloud Services
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Re-inventing APM for the Digital Era
    Re-inventing APM for the Digital Era Mike Sargent, Riverbed; Steve Mastin, Aetna; and Stephen Elliot, IDC Aug 22 2018 12:00 pm UTC 45 mins
    Join Riverbed, Aetna and guest speaker IDC for a discussion and demonstration on how we are revolutionizing application performance management (APM) for the digital era with a focus on the end-user experience.

    Traditional APM solutions aren’t designed with the end-user in mind and rely on sampling a limited set of application performance data points. This legacy approach is not adequate for delivering today’s complex digital services. In today’s digital world, a unified application performance and end-user experience monitoring solution is critical to business success.

    Register now to see the power of our user experience-centric solution, hear from Aetna about their APM journey, and take the next step to ensuring end-user experience in the digital era.

    Topics
    User-centric: Ensure end-user experience and troubleshoot issues faster with an end-to-end APM solution.
    All Data: Use big data insights from all transactions to be more proactive and holistic in driving better business decisions.
    Every App: Monitor your entire enterprise application ecosystem without compromising data quality.
  • Transformando a experiência do cliente nas Instituições financeiras
    Transformando a experiência do cliente nas Instituições financeiras Danilo Barsotti Aug 22 2018 1:00 pm UTC 75 mins
    Os bancos, as empresas de gestão patrimonial, os fornecedores de pagamentos e outras instituições financeiras enfrentam uma disrupção profunda devido às demandas do mercado e às novas regulamentações. Por essa razão, as interfaces para o consumidor financeiro estão se tornando cada vez mais engenhosas, usando Inteligência artificial para as interações e APIs para temas de automatização. Como sua instituição está respondendo a isso?

    As APIs e a administração de APIs são peças essenciais do quebra-cabeça para resolver esses desafios. Acompanhe-nos nesta sessão e descubra:
    • Por que as APIs são essenciais para revelar novos modelos de negócios e casos de uso para finanças
    • Como construir uma plataforma segura e atraente para os clientes
    • Como as regulamentações impulsionam positivamente a transformação digital
  • Transformando la experiencia del cliente en las Instituciones Financieras
    Transformando la experiencia del cliente en las Instituciones Financieras Santiago Cavanna Aug 22 2018 3:00 pm UTC 60 mins
    Los bancos, las empresas de gestión patrimonial, los proveedores de pagos y otras instituciones financieras se enfrentan a una profunda disrupción tanto por las demandas del mercado como por las regulaciones nuevas. Por esa razón, las interfaces para el consumidor financiero se están volviendo cada vez más ingeniosas, usando Inteligencia Artificial para las interacciones y APIs para temas de automatización. con IAs utilizadas para interactuar y API para la automatización. ¿Cómo está respondiendo su Institución?

    Las API y la administración de APIs son piezas clave del rompecabezas para resolver estos desafíos. Acompáñenos en esta sesión y descubra:
    • Por qué las API son clave para desbloquear nuevos modelos de negocios y casos de uso para las finanzas
    • Cómo construir una plataforma segura y atractiva para los clientes
    • Cómo las regulaciones son impulsores positivos de la transformación digital
  • 2018 Data Center Survey Results
    2018 Data Center Survey Results Rhonda Ascierto, Vice President, Uptime Institute Research and Matt Stansberry, Vice President, Uptime Institute Aug 22 2018 3:00 pm UTC 60 mins
    The 8th Annual Uptime Institute Data Center Survey provides an overview of the major trends shaping IT infrastructure and strategy. Are you on top of what's happening in the industry? Find out what 900 data center operators and IT practitioners worldwide had to say.
  • AI, ML, & Ubuntu: Everything you need to know
    AI, ML, & Ubuntu: Everything you need to know Carmine Rimi Aug 22 2018 4:00 pm UTC 60 mins
    AI and ML adoption in the enterprise is exploding from Silicon Valley to Wall Street. Ubuntu is becoming the premier platform for these ambitions — from developer workstations, to racks, to clouds and to the edge with smart connected IoT. But with new developer trends comes a plethora of new technologies and terminologies to understand.

    In this webinar, join Canonical’s Kubernetes Product Manager Carmine Rimi for:
    ∙ A decoding of key concepts in AI/ML
    ∙ A look into why AI applications and their development are reshaping company’s IT
    ∙ A deep dive into how enterprises are applying devops practices to their ML infrastructure and workflows
    ∙ An introduction to Canonical AI / ML portfolio from Ubuntu to the Canonical Distribution of Kubernetes and and how to get started quickly with your project

    And in addition, we’ll be answering some of these questions:
    ∙ What do Kubeflow, Tensorflow, Jupyter, Edge AI, and GPGPUs do?
    ∙ What’s the difference between AI and ML?
    ∙ What is an AI model? How do you train it? How do you develop / improve it? How do you execute it?

    And finally, we’ll be taking the time to answer your questions in a Q&A session
  • Converged Tape Appliance for Veeam
    Converged Tape Appliance for Veeam Ronn Martin, Solutions Architect at Veeam & Eric Bassier, Senior Director, Product Marketing at Quantum Aug 22 2018 5:00 pm UTC 60 mins
    Tape is as relevant as ever, but it may not be for the reasons that you think. In fact, as part of delivering hyper-availability, one best practice is to use tape as an “offline” storage copy to protect against ransomware and malware, which is a key part of a comprehensive data protection strategy.

    In this webinar, join experts from Veeam and Quantum to learn about tape’s role in tomorrow’s infrastructures, best practices for tape in a Veeam environment, and to introduce Quantum’s new converged tape appliance for Veeam – which makes it easier to create tape to protect against ransomware.
  • Incident Response and Forensics in a Cloud Native World
    Incident Response and Forensics in a Cloud Native World Neil Carpenter, Principal Solution Architect, Twistlock & Keith Mokris, Product Marketing Lead, Twistlock Aug 22 2018 5:00 pm UTC 60 mins
    With the rapid increase in containers and cloud native applications at the enterprise, security teams and incident responders are continually tasked with new requirements and challenges for detecting and investigating security incidents.

    In this webinar, Neil Carpenter from Twistlock will discuss what a transition to containers means for incident response teams and how Twistlock can help to ease the pain.

    Register for this webinar to learn:
    • Approaches to gathering incident data from Cloud Native applications
    • Examples of incidents and investigations
    • Details on Twistlock's brand-new Cloud Native Forensics Platform
  • Don't Wait for Disaster to Strike! How to Create a Great Disaster Recovery Plan
    Don't Wait for Disaster to Strike! How to Create a Great Disaster Recovery Plan Storage Switzerland, KeepItSafe, Veeam Aug 22 2018 5:00 pm UTC 60 mins
    Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds, it is often well behind schedule and well over budget.

    The first step in creating a great disaster recovery plan is creating one that isn't bad at the very least. In this live webinar join Storage Switzerland, Veeam, and KeepItSafe as we discuss how to go from a bad disaster recovery situation to a great disaster recovery plan for better business continuity.
  • WebEx Performance Monitoring
    WebEx Performance Monitoring Archana Kesavan, Sr. Product Marketing Director Aug 22 2018 5:00 pm UTC 45 mins
    Many organizations have adopted Webex as the primary platform for communication and collaboration across both, internal and external teams. However, enterprises constantly run into VoIP performance issues with Webex and lack sufficient visibility to troubleshoot and ensure optimal user experience.

    Join us for a webinar where we’ll cover:
    -How Webex access works and monitoring best practices
    -Customer stories and real-world use cases on how to monitor Webex voice quality
    -Hands-on demo of using ThousandEyes for Webex visibility and delivering enhanced user experience
  • Under The Hood: Effective Threat Hunting For The SOC Analyst
    Under The Hood: Effective Threat Hunting For The SOC Analyst Aditya Sundaram, Director Cyber Threat Analytics, Aarij Khan, VP Marketing Aug 22 2018 5:00 pm UTC 60 mins
    The Modern SOC cannot afford to rely just on cyber threat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out attacks coming from within is an extremely valuable complement to even the most advanced cybersecurity detection technologies. Securonix includes the Securonix Spotter threat hunting platform for exactly this reason.

    Attend this live webinar to hear about:

    - The most prevalent cyber threats hidden in your environment (that you are unaware of)
    - What threat hunting in the SOC is and how it reduces your cyber risk
    - The different types of information available to you
    - Free resources that can root out the most nefarious threats
    - Example scenario - threat hunting using Securonix Spotter