Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Storage Switzerland and SolarWindsRecorded: Dec 14 201816 mins
Join Storage Switzerland and SolarWinds for our Friday Flash webinar. In 15 minutes our panel of experts provide you the information you need so you can better deal with storage sprawl in your data center. Storage Switzerland finds that most organizations have five to six different storage systems and three or four different vendors within their storage infrastructure. These diverse storage architectures can be expensive and time consuming if not correctly managed.
In 15 Minutes learn:
- What is causing storage sprawl
- How to stop storage sprawl
- Is storage consolidation the right objective
- How to manage a diverse storage infrastructure
Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions ArchitectRecorded: Dec 14 201828 mins
Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.
Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.
With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.
In this webinar, you’ll learn:
How SMAX Studio offers faster Time to Value and Lower TCO
How our modern user interface enables the instant creation of new applications
How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
Daniela Fusaro, Senior Solutions ArchitectRecorded: Dec 14 201818 mins
Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.
Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.
Sie erfahren folgendes:
- Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
- Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
- Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller
Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
Cory Minton and Brett RobertsRecorded: Dec 13 201843 mins
Director of AI and BI at Arrow Electronics, David Fearne, sits down with the Big Data Beard for his second appearance on the show and muses about the rapid evolution from Big Data to AI in the enterprise and the challenges organizations are and will face making real impacts with these emerging technologies.
This episode was recorded in the Dell EMC sponsor booth at Splunk conf2018 in Orlando, FL. A big thanks to Splunk, Dell EMC, and Arrow for making this possible.
Jim Fulton, Director Product Marketing, ForcepointRecorded: Dec 13 201835 mins
Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
David Stafford, Dropbox; Christina Janzer, Slack; Jason Smith, AsanaRecorded: Dec 13 201844 mins
Despite productivity gains promised by a wide array of tools, many employees are left feeling disengaged or unfocused. Instead of perpetually searching for the next best thing or being stuck with processes that just don’t work, IT and business leaders can learn how to harness the power of these tools to help teams better plan, collaborate on, and execute work that matters.
In this webinar, join experts from Slack, Dropbox, and Asana to learn more about:
- The state of modern enterprise collaboration
- How 3 predominant collaboration categories emerged and why they're critical for success
- How collaboration will influence the future of work
Cameron Wyatt and Ian Tewksbury, Red HatRecorded: Dec 13 201852 mins
The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.
In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.
- How to build your cloud incrementally to accommodate future fixes and enhancements.
- Why you need to consider your existing policies and procedures when defining your new cloud experience.
- How to iteratively design and implement a successful hybrid cloud experience.
Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
Ian Tewksbury, Consulting Architect, Red Hat Consulting, Red Hat
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201846 mins
CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.
In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:
- Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
- Provide a detailed analysis of how both products compare over 13 key feature areas
- Consider coverage of third-party apps beyond Office 365
Attend this session to explore the best route to full Office 365 security.
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201838 mins
CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.
In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:
-Key cloud adoption concerns
-Most valued CASB features
-Levels of confidence in controlling data and maintaining compliance
Attend this session to learn more about the need for and use of CASBs in today’s organizations.
Don Molaro, CTA at WWT & industry expert, Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at DateraRecorded: Dec 13 201849 mins
If you are like many out there, the DATA is at the center of what your organization does and it’s getting in the way of achieving a Software Defined DATA Center that is simple, automated and fast. Hear about the challenges enterprises like yours are encountering and evaluate the options available to architect a new approach that can:
- Automate data storage end-to-end using new capabilities like machine learning
- Harness the latest tech like NVMe to drive performance @ scale
- Consolidate data storage and operations
- Pave the way to adopt new container orchestration technologies like Kubernetes
Don Molaro, Chief Technical Advisor at World Wide Technology joins Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera, to share their experience and advice. Learn the key requirements and technology options available to architect your future data operations, rightsize your budget and transition to a software-driven world.
Nirav Shah, Sr. Director, Products & Solutions, FortinetRecorded: Dec 13 201835 mins
Fortinet was named a Challenger in the first Gartner Magic Quadrant for WAN Edge Infrastructure.
Join our expert to learn about insights from the report and how Fortinet SD-WAN weaves both networking and security, providing one offering that is scalable, reliable, and secure; setting us apart from the competition.
Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, KongRecorded: Dec 13 201849 mins
With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.
As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.
In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.
- Learn about the three forces leading us towards cloud-native first architectures
- Understand how we got here – the milestones marking the maturity of Kong
- Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
- Why you need a solution that can support all of your deployment patterns.
Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.
Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
Adrian Wilson, Account Technology Strategist, Microsoft & Mirela Cunjalo, Dir. Product Mgmt., TeradiciRecorded: Dec 13 201856 mins
Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
•The unique benefits of hosting desktops and applications on Azure
•A reference architecture for the education use case
•The security and performance benefits PCoIP technology provides
•Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
Q&A will follow.
MARIANNA SHAFIR, Corporate Counsel and Regulatory Advisor; MIKE PAGANI, Chief Evangelist; KEN ANDERSON, VP, MarketingRecorded: Dec 13 201859 mins
In the 2018 Electronic Communications Compliance Survey, we uncovered the greatest challenges facing compliance professionals today. Survey responses indicate that shifting workplace and investor demographics are driving firms to new communication channels, but their supervision policies and tools are struggling to keep pace.
Join this webinar to dive into the key findings from this year's survey, including why:
Mobile and social still present challenges for most firms
Confidence in the efficacy of prohibition policies is low
Firms are looking for risk in all the wrong places
Cherie Martin, Network Solutions Manager - ArubaRecorded: Dec 13 201853 mins
Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9critical steps you should take to ensure your network is smart and reliable.
Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
Sai Gopalan, VMware with Wen Yu, AWS and Zach Wunderle, Dell EMCRecorded: Dec 13 201848 mins
Dell EMC, VMware and Amazon Web Services (AWS) make it easier to protect virtualized workloads in the cloud. This webinar will discuss the latest challenges in protecting and managing VMware workloads, how to easily expand VMware environments to the cloud, what to do when a disaster event occurs, and show a demo of the latest features of data protection for VMware Cloud on AWS.
Jorge Villamariona, QuboleRecorded: Dec 13 201831 mins
As corporations augment their corporate data warehouses and data marts with cloud data lakes in order to support new big data requirements, the question about how to grant governed access to those data lakes becomes more pressing. Certainly, capturing new and different types of data is important but deriving value from those datasets remains the ultimate goal.
Whether or not the data lake consumers write SQL or leverage 3rd party BI and visualization tools, what matters is that they can continue to be productive using the skills and tools they already know. The difference is that now those tools and skills should be used with back-end engines that can can help them quickly sift through petabytes of data and at the same time provide support for fast interactive queries.
This means that in order for those data lake investments to succeed it is important for data admins to provide: SQL access to all authorized data, support for BI tools, cross-team collaboration capabilities, and governed self-service.
In this webinar we will cover:
- Data collaboration and access using SQL
- Tools that enable fast self-service for different teams
- Considerations for choosing the right SQL back-end for your use case
Doug Landoll, CEO, LantegoRecorded: Dec 13 201835 mins
Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.
In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:
- How to define cybersecurity success
- Common approaches that fall short
- Risk-based cybersecurity strategy planning
Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
Andras Cser, Vice President and Principal Analyst, ForresterRecorded: Dec 13 201820 mins
For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.
In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:
- How your auditors are behaving
- Why risk-based prioritization is the only way to find threats
- The importance of context
- Forrester’s recommendations and best practices
Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
David Yu, Product Manager at Docker, Jenny Fong, Product Manager at DockerRecorded: Dec 13 201860 mins
New capabilities and new ways to help organizations containerize and modernize their Windows application portfolio.
Containers deliver value to applications of all types - from traditional, monolithic apps to microservices and new innovative areas like data science, AI/ML and Edge computing. These benefits are not limited to Linux applications as Windows Server applications continue to represent about half of enterprise applications out there.
In this webinar, we'll preview some new technology and solutions from Docker that helps bring Windows Server applications to the forefront of container strategies. We'll highlight new capabilities in Docker Enterprise and new ways to help organizations containerize and modernize their Windows application portfolio.
Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development.
But are they taking the right steps to secure those containers?
This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in launching their container security initiatives.
Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.
The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?
Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
Андрей Николаев, Специалист по облачным платформамDec 17 20188:00 amUTC60 mins
Присоединяйтесь, чтобы узнать, как построить полноценное облако для IaaS и PaaS сервисов “из коробки”. Поговорим о решении Dell EMC Hybrid Cloud for Microsoft Azure Stack.
Вебинар проводится при поддержке компании Intel®.
In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.
Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.
Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.
Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACHDec 17 20189:00 amUTC27 mins
Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
Dania Ben Peretz, Product ManagerDec 17 20183:00 pmUTC45 mins
Are you getting the most out of your Security Policy Management Solution?
Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.
Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.
Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:
•Gaining visibility of unsecured traffic used by your business applications
•Closing the gaps in your network map to get your automation in place faster
•Tying cyberattacks to business impact
•Being audit-ready all the time
Bashyam Anant, Vice President Product Management, CavirinDec 17 20186:00 pmUTC60 mins
As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.
In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.
Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.
Storage Switzerland, Veeam, HPEDec 17 20186:00 pmUTC60 mins
Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.
A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.
In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
Николай Куликов, менеджер по развитию бизнеса VMwareDec 18 20188:00 amUTC60 mins
Самые «быстрорастущие» продукты Dell Technologies - VxRail и VxRack - основаны на VMware vSAN, ведущем решении хранения для гиперконвергентной инфраструктуры (HCI). Послушайте экспертов, обсудите, как последние инновации vSAN помогают организациям модернизировать свою инфраструктуру и обеспечить общие операции – от границы до ядра сеит и облаков. Узнайте у экспертов, как работают последние функции vSAN.
Cédric Israel (Informatica et Ludovic Bouaziz (Microsoft)Dec 18 20189:00 amUTC60 mins
Les data warehouses dans le Cloud public, tel qu'Azure SQL Data Warehouse, offrent des fonctionnalités robustes, ne requièrent pratiquement aucun investissement en amont et s'accompagnent des avantages liés au Cloud : élasticité, évolutivité infinie et agilité.
Avec les data warehouses dans le Cloud, vous payez pour ce dont vous avez besoin, quand vous en avez besoin, éliminant ainsi la nécessité d'une planification de capacité complexe et d'investissements en capital fixe.
Le déplacement d'un data warehouse vers le cloud réclame une approche incrémentale et gouvernée afin de délivrer des résultats rapides en assurant le minimum d’interruption dans les applications existantes et les tâches d'analyses de données.
A l'occasion de ce webinar Ludovic Bouaziz, Pre-sales Engineer Data platform & AI chez Microsoft pour Azure SQL DW et Cédric Israel, Integration Cloud Sales Specialist chez Informatica échangeront sur :
• Opportunités et challenges rencontrés dans les projets déplacement de data warehouse vers le Cloud
• Meilleurs pratiques
• Construction d'un business case et préparation de l'adoption d'Azure
Durant les 3 prochaines années, plus de la moitié des entreprises seront concernées par l'évolution ou le remplacement de leur système décisionnel et analytique.
Participez à ce webinar le 18 décembre afin d’apprendre comment initier, rapidement et facilement, votre transition vers le data warehouse Cloud avec Informatica et Microsoft Azure.
Thomas Niewel, Technical Sales Director, DenodoDec 18 20181:00 pmUTC45 mins
Self-Service-Analytics ermöglicht es Geschäftsanwender Analysen selbständig durchzuführen und sich damit aus der Abhängigkeit der IT zu lösen. Das spart wertvolle Zeit, da Reportings ohne den Umweg über die IT Abteilungen erstellt werden und es Fachabteilungen ermöglicht, kritische Entscheidungen schneller zu treffen.
In diesem Webinar erläutern wir, wie Sie mithilfe von Datenvirtualisierung, Echtzeitzugriffe auf integrierte unternehmensweite Daten erhalten und eine geeignete Infrastruktur aufbauen um Self-Service-Analysen bereitstellen zu können.
FRAGEN DIE IN DIESEM WEBINAR BEANTWORTET WERDEN:
- Wie können fragmentierte Daten nahtlos zusammengeführt werden?
- Wie lässt sich die wartungs- und kostenintensive Datenintegrationen mithilfe einer virtuellen Datenschicht ersetzen?
- Wie kann Datensicherheit erhalten und die Herkunft der Daten nachvollziehbar bleiben?
1) Das Verspechen von Self-Service BI
2) Der Aufbau einer Self-Service Infrastruktur
3) Live Demo
After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?
This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement
What you'll learn
- The main differences between TS2 & G-Cloud
- The Pros & Cons of using TS2 vs G-Cloud
- Top Tips for making a succesful bid through either framework
Steve McMaster, Dell EMC Global Sales Enablement & Cosmos Darwin, Microsoft PM Core OS EngineeringDec 18 20183:00 pmUTC45 mins
Over 15.000 server clusters run Storage Spaces Direct (S2D) to implement hyper-converged infrastructure (HCI) powered by Windows Server 2016/2019 and based on validated hardware. Join this live webinar to understand why organizations around the world are adopting Storage Spaces Direct, the best-kept secret in HCI, and to learn how Dell EMC together with Microsoft can help you accelerate IT transformation with Dell EMC S2D Ready Nodes. This webinar will also cover the latest news about Windows Admin Center and new storage features in Windows Server 2019.
Saul Judah, Research Director, Gartner Research & Rex Ahlstrom, Chief Strategy & Technology Officer, BackOffice AssociatesDec 18 20184:00 pmUTC60 mins
Traditional methods for managing data and analytics landscapes are not evolving fast enough to meet the increased scale and demands of businesses facing a digital transformation program. If you are planning any major transformation involving data, such as a move to S/4HANA, hyper scale cloud, large scale analytics efforts, ML/AI implementations or other major changes to your current IT landscape, now is the time to think about how you will advance your data and governance strategy.
Join Saul Judah from Gartner Research as he discusses the present state of data and analytics governance practices, provides guidance to help you get on (or back on) the right track, and previews where governance practices are heading in the future so that you can keep your strategy on track.
Johna Till Johnson, CEO & Founder, Nemertes ResearchDec 18 20184:00 pmUTC60 mins
Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.
Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
Dave Bottomley, Senior Solutions EngineerDec 18 20184:00 pmUTC60 mins
Managing a Microsoft collaboration environment can be challenging. With multiple technology vendors, across various sites - it can be tough for a team to stay on top. Join this session to learn best tips on how to manage and optimize your Microsoft collaboration environment, focusing on deep troubleshooting for your Skype for Business and Skype for Business Online environments.
Limor Schafman, Mario Blandini, John ToomajonDec 18 20184:00 pmUTC75 mins
Smart buildings are the building blocks that will enable society’s digital transformation. This revolution will leverage data from myriad devices to bring new insights and enable new products and services. Around the globe, the smart buildings technology market will explode 16.1% over the next five years from a 2018 market size of $30.5 billion. In this webinar we will look at the changes inherent in the digital evolution as well as the infrastructure solutions that will support them.
Jill Reber, CEO, Primitive Logic and Kelly Harris, Senior Content Manager, BrightTALKDec 18 20185:00 pmUTC45 mins
Discover what's trending in the Enterprise Architecture community on BrightTALK and how you can leverage these insights to drive growth for your company. Learn which topics and technologies are currently top of mind for Data Privacy and Information Management professionals and decision makers.
Tune in with Jill Reber, CEO of Primitive Logic and Kelly Harris, Senior Content Manager for EA at BrightTALK, to discover the latest trends in data privacy, the reasons behind them and what to look out for in Q1 2019 and beyond.
- Top trending topics in Q4 2018 and why, including new GDPR and data privacy regulations
- Key events in the community
- Content that data privacy and information management professionals care about
- What's coming up in Q1 2019
Audience members are encouraged to ask questions during the Live Q&A.
Matthew McDermott, MVP, Principal Technical Marketing Engineer, SpanningDec 18 20185:00 pmUTC75 mins
What options are available to you as an end-user to safeguard and recover your lost content in Office 365? As an administrator, how are your end-users protected and what do they need to know (or be taught) so that they can recover from the micro-disasters that happen every day?
Office 365 and the Microsoft Cloud are incredibly resilient. You can be confident that your data is secure and available from natural disasters, but what about a disgruntled employee? How can you protect your content from the very people that have access and either accidentally or intentionally delete important information?
In this session Matthew McDermott, MVP, Principal Technical Marketing Engineer will:
-Detail the features of Office 365 that support self-service restoration
-Discuss settings that protect you and your team from loss
-Look at what administrators can do to help their users’ help themselves
Jae Lee – Director Product Marketing, Security Markets, SplunkDec 18 20185:00 pmUTC63 mins
Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.
Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:
- How secure are my endpoints?
- What is happening on my network?
- Where is it most critical for me to apply updates?
- Are user accounts configured properly?
- Is there any suspicious traffic going out?
- How is overall security posture in my AWS environment?
This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
Dominic Romeo – Senior Product Manager, TierPoint & Christopher Smith – Director of Product Management for CloudLink by ZayoDec 18 20185:00 pmUTC60 mins
As businesses embark on IT transformation initiatives, they must ensure their cloud connectivity is secure, reliable and high performing. Low latency from the data center to the edge is crucial. With the rapid growth in IT deployments leveraging public cloud services as well as legacy systems and hosted private clouds, direct cloud connectivity is a key success factor for hybrid and multi-cloud strategies.
Join TierPoint’s Dominic Romeo and Zayo’s Christopher Smith, for a discussion on cloud connectivity to learn how these solutions can effectively and efficiently bring public cloud capabilities to the edge.
Kim Garriott, Healthcare Strategies, Logicalis; Tony Turner, Registered Radiology Technologist, NetAppDec 18 20185:00 pmUTC60 mins
Today, medical imaging accounts for nearly 70% of all clinical data stored at a healthcare facility, with terabytes of new data added daily. Developing a holistic Enterprise Imaging Strategy is giving healthcare organizations a more comprehensive platform with the ability to safely and securely present medical images within a patient’s electronic health record, enabling real-time collaboration and improving patient outcomes.
Join Kim Garriott, Logicalis Principal Consultant of Healthcare Solutions, co-founder and current co-chair of the HIMSS-SIIM Enterprise Imaging Community and Chair, HIMSS Analytics Digital Imaging Adoption Model Global Development Team, and Tony Turner, a registered Radiology Technologist who manages NetApp Healthcare’s medical imaging partner alliances, for an insider view of what’s driving this change. Learn how to eliminate downtime, avoid future data migrations and accelerate cloud or AI adoption for medical image management.