Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Azure Automation: Automating your workloads in the Cloud
    Azure Automation: Automating your workloads in the Cloud
    James Mealing Recorded: Mar 18 2019 49 mins
    Find out how to use Azure Automation, Microsoft's replacement solution for System Center Orchestrator (SCOrch) to automate workloads in the cloud. Learn about Automation Accounts, Runbooks, and the various ways to trigger them, including Schedules, Webhooks and the built-in Test Pane, to author, modify and execute your PowerShell automation workloads directly in Microsoft Azure. Also learn how you can use Hybrid Workers to extend this functionality to your on-premises environment, and run automation activities orchestrated via Azure, against your on-premises infrastructure.
  • Business Transformation enabled by Experience & Digital - An approach
    Business Transformation enabled by Experience & Digital - An approach
    Arun Trivedi Recorded: Mar 18 2019 42 mins
    Planning a transformation journey requires a wholistic approach. Large enterprises throw away an average of $400 Billion per year on digital transformation programmes that fail to deliver promised benefits. This webinar presents an approach that companies can adapt to ensure success
  • Infrastructure in the Cloud: A Chat with Cisco Meraki
    Infrastructure in the Cloud: A Chat with Cisco Meraki
    David Van Schravendijk, Product Marketing Manager at Cisco Meraki Recorded: Mar 15 2019 9 mins
    In this episode of Mode Radio, Cisco Meraki product marketing manager David van Schravendijk speaks with Jo McDougald about how Meraki is making infrastructure management easier for companies by moving key infrastructure components to the cloud. Jo and David also discuss the tremendous and growing importance of security in today’s IT environment.
  • Mode: First Zero-Trust Network
    Mode: First Zero-Trust Network
    Adam Gervin, VP & Creative Director at Mode Recorded: Mar 14 2019 1 min
    SD-WAN brings a tremendous amount of software-defined control to the network edge. In this video, Mode’s creative director Adam Gervin discusses how Mode extends that control through the core of the network to enable private global networks that can be spun up in under 60 seconds.
  • Information Security in FinTech and Financial Services Sector
    Information Security in FinTech and Financial Services Sector
    Senthil Palaniappan, Founder and CEO at Sennovate Inc Recorded: Mar 14 2019 45 mins
    This topic will discuss in the current trend in the FinTech and Financial Services Sector and what are the security challenges and Risk factors and how to prepare yourself to mitigate them.

    You will learn
    * What are all the major Financial Sectors and Factors leading to their
    innovation
    * Technology and Services overview in Various Financial Sectors
    * Security and Risks
    * Data Security
    * Cyber Security
    * Regulatory and compliance risk
    * Fraud and identity theft
    * Third party reliance
  • AI-Driven Next Gen Analytics
    AI-Driven Next Gen Analytics
    Vamshi Sriperumbudur and Amit Kara Recorded: Mar 14 2019 32 mins
    No matter which industry you’re in, analytics are critical to drive business insights and therefore results. However, 80% of time is spent on preparing data for analytics and AI/ML projects and only 20% on drawing insights from the data. Automation becomes a critical success factor for effective data lake management to drive faster insights.

    For faster analytics and insights, drive collaboration among your data user personas and operationalize AI in every single step of your data lake management supply chain:
    •Data discovery and cataloging
    •Data ingestion and integration
    •Data preparation and quality
    •Data security and governance
  • Extend Istio into a Universal Service Mesh
    Extend Istio into a Universal Service Mesh
    Manish Chugtu Recorded: Mar 14 2019 36 mins
    Modern applications have evolved from monolithic architectures to distributed microservices, but now require availability, security, and observability across multiple data centers and public cloud. Avi Networks extends Istio into a universal service mesh, while bringing consistent enterprise-grade features for both traditional and cloud-native applications.

    In this webinar, you will learn how to:

    - Enhance Istio ingress gateway with rate limiting, blacklist/whitelist, distributed firewall and more.
    - Extend Istio service mesh beyond containers to bare metal servers and virtual machines in a multi-cloud, multi-cluster, multi-region environments.
    - Drive observability and analytics with real-time monitoring, tracing, and application mapping.
  • Three Steps to Modernizing Backup Storage
    Three Steps to Modernizing Backup Storage
    Storage Switzerland, Cloudian, Veeam Recorded: Mar 14 2019 48 mins
    Backup software is continuously improving. Solutions like Veeam Backup and Replication deliver instant recoveries, enabling virtual machine volumes to instantiate directly on the backup device, without having to wait for data to transfer back to primary storage. These solutions can also move older backups to higher capacity, lower cost object storage or cloud storage systems. To deliver meaningful performance during instant recovery without exceeding the backup storage budget requires IT to re-think its backup storage architecture.

    Modern backup processes need high performance, low capacity systems to deliver high-performance instant recovery, as well as high-capacity, modest performance systems to store backup data long term and software to manage data placement for the most appropriate recovery performance while not breaking the budget.
  • MultiCloud, Hybrid Cloud Architecting a Secure Framework for Transformation
    MultiCloud, Hybrid Cloud Architecting a Secure Framework for Transformation
    Jeanne Morain, Jo Peterson, Chuck Price, and Alvaro Gonzalez Recorded: Mar 14 2019 48 mins
    Cloud architecture, strategy, and implementation are all impacted by security and compliance guidelines and postures. What are the best practices for Cloud approach? How does it impact your security, cost, and other frameworks within IT?

    Join special guests - Jo Peterson, Chuck Price, and Alvaro Gonzalez for a lively discussion on "Cloud" approach and identifying underlying implications to consider..
  • Remedy Security Gaps with Automation in Your Multi-Vendor Environment
    Remedy Security Gaps with Automation in Your Multi-Vendor Environment
    Rajoo Nagar, Director Product Marketing, Fortinet Recorded: Mar 14 2019 33 mins
    Learn how to leverage your existing security investments and Fortinet API's to automate security in your multi-vendor environments spanning the cloud, IoT, data center, and mobile plus additional insights into specific partner-developed integration solutions.
  • A practical guide to building a successful API strategy
    A practical guide to building a successful API strategy
    Aaron Landgraf, Sr. Product Marketing Manager, MuleSoft and David Berlind, Editor-in-Chief, ProgrammableWeb Recorded: Mar 14 2019 56 mins
    As organizations bear witness to the well-chronicled successes of API economy juggernauts like Google, Amazon, Stripe and Twilio the pressure on business and IT to seize the opportunity and deliver measurable business outcomes mounts. To build API products and participate in the API economy, organizations must take a logical, methodological, and proven approach to the journey. This approach is captured in a four-stage blueprint that MuleSoft, in partnership with ProgrammableWeb, has developed to help organizations hatch their API program and win in the API economy.

    In this webinar, featuring the four-stage blueprint, you’ll learn:

    * Why consumer-centricity is key to every API program
    * Tips to validate and engage your ecosystem
    * How to overcome the biggest hurdles to a successful API strategy
    * Actionable next steps to start your API strategy journey today
  • BigID, AWS, & Cloud Security Alliance Webinar
    BigID, AWS, & Cloud Security Alliance Webinar
    Nimrod Vax, BigID Head of Product & Bill Reid, AWS Senior Manager, Leader, Security and Compliance Solution Architecture Recorded: Mar 14 2019 58 mins
    Protection & Privacy in the Cloud: Operationalizing Privacy in AWS Environments

    New privacy regulations like GDPR and CCPA make finding and protecting personal information more critical than ever. This means being able to identify both PII and contextual PI by person at scale. This Webinar featuring BigID’s Head of Product and AWS's Leader of Security and Compliance Solution Architecture will examine best practices for finding, protecting and automating PI/PII-centric privacy tasks at scale.

    What You Will Learn:
    - How to find PII/PI across AWS
    - The difference between Protection and Privacy
    - How to actualize privacy tasks like DSAR
    - The role of ML in cloud-first privacy engineering
  • Integrated Application Health & Business Impact Analysis with Operations Bridge
    Integrated Application Health & Business Impact Analysis with Operations Bridge
    Saumya Upadhyaya, Wes Cooper and Gary Brandt, Micro Focus Recorded: Mar 14 2019 61 mins
    In this day and age, employees generate so much business from their own devices that application performance management (APM) capabilities have become an essential part of any comprehensive monitoring solution.

    But when you find the weak link using APM data, how do you identify the business impact? For example, how do you know if the root cause of that pesky method call is due to code or to infrastructure issues? Clever analysis is the answer.

    Join us on this webcast and learn how many companies are bringing APM and AIOps together to address this issue and deliver measureable benefits. We’ll also discuss our vision for this evolving domain.
  • Operationalize Data Movement to Supercharge Your Architecture
    Operationalize Data Movement to Supercharge Your Architecture
    Julian Ereth - Research Analyst - Eckerson Group | Arvind Prabhakar - Co-Founder & CTO - StreamSets Recorded: Mar 14 2019 59 mins
    DataOps borrows concepts from agile development to streamline the process of building, deploying and operating dataflow pipelines at scale. Putting DataOps into action requires not only the right technology, but more broadly a thoughtful approach to align the people and the process behind such an initiative.

    Eckerson Group research analyst Julian Ereth join StreamSets' Co-Founder and CTO, Arvind Prabhakar to explore the emerging trend of DataOps.

    During this webinar, we will discuss:

    -Principles and benefits of DataOps
    -Common DataOps use cases
    -Practical guidelines for putting DataOps into action
    -How StreamSets can help on a DataOps journey
  • TIBCO Cloud Integration: Fastest Results & Lowest TCO Per AppVance Research
    TIBCO Cloud Integration: Fastest Results & Lowest TCO Per AppVance Research
    Frank Cohen, Development Expert and Founder of Appvance Recorded: Mar 14 2019 37 mins
    Modern application architectures, Agile and DevOps SDLC, and supporting multiple channels like web, mobile, and IoT require you to reevaluate how you interconnect your systems and services.

    Noted development expert Frank Cohen, founder at Appvance, has recently released the 4th iteration of the PushToTest Integration Knowledge Kit. This Kit is a free open-source vendor evaluation guide comparing MuleSoft, Red Hat, Spring Boot, TIBCO, and others. You can get a copy of it in the attachments section.

    Join Frank for this short webinar (with Q&A) as he walks through the Kit and shows you how to use it to compare the top technologies for integrating your systems leveraging a modern architecture.

    This 30-minute on-demand webinar includes Q&A and covers:
    -Which integration approach is most efficient in terms of developer productivity?
    -Which approach allows you to make changes most quickly?
    -Key considerations for selecting an integration approach to support your microservices and serverless initiatives
    -Lessons learned on these platforms and how you can avoid pitfalls in going serverless with microservices
  • How Colleges and Universities Gain Visibility into Cloud Apps
    How Colleges and Universities Gain Visibility into Cloud Apps
    Hunter Ely, SLED Security Strategist at Palo Alto Networks Recorded: Mar 14 2019 56 mins
    Colleges and Universities are making the trek to the cloud. Most often, that first step is toward Google Suite, Office 365, Box.com or similar cloud services. While these services provide great value and flexibility for the modern college environment, they present risk of inadvertent data exposure or data breach without providing the visibility into how and where that data is shared. These services are incredibly valuable but without that visibility, IT Administrators are blind to the potential issues inherent to the platforms.

    Join us for a live webinar where we will have a panel discussion with to learn how, in these different environments, they safely enable the use of SaaS applications and:


    • Quickly gain visibility and granular, context-based control of SaaS applications, whether sanctioned or unsanctioned.
    • Protect school or university data from malicious and inadvertent exposure after it has left the campus.
    • Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    Find out how your peers take charge of their SaaS environments, those that they enabled or those that they inherited by end users.
  • Cyber Security: Keeping Ahead of the Game with Micro Focus
    Cyber Security: Keeping Ahead of the Game with Micro Focus
    Darren Blumenthal, Stan Wisseman Recorded: Mar 14 2019 60 mins
    Join us to hear about the hot new technology trends and topics in the world of cyber security and how Micro Focus tools can help you stay ahead of the game with your cyber hygiene.

    This webinar is the first of its kind, as we are combining the Vivit Automation & Cloud Builders Special Interest Group and the Vivit Security Special Interest Group. This gives us an opportunity:

    •To align our thoughts and common practices
    •To learn from each other
    •To ensure we are all being cyber resilient
  • SAP ERP to S/4HANA Strategy & Roadmap Design
    SAP ERP to S/4HANA Strategy & Roadmap Design
    Vaughn Booyens, SAP Solution Architect S/4HANA and Marco Bronze, SAP Enteprise Architect S/4HANA Recorded: Mar 14 2019 64 mins
    The Dimension Data S/4HANA Roadmap design service offers a bottom-up review of your SAP Assets through a software led approach as well as a top down business led approach using standard SAP Reports i.e the Pathfinder, S/4HANA Readiness check and Solution Manager tools like Custom Code Management. The information gathered by these tools and the corresponding outputs/deliverables enable you to make an informed decisions on your S/4HANA Future State.
    The objective and value we offer with the SAP ERP to S/4HANA Roadmap design is to evaluate existing customer data, interfaces, processes, custom code, data volume, security, architecture and people to provide options on the planned deployment approach.
    Further outputs include the destination, On-Premise, HEC, Hybrid or Private Cloud inclusive of the associated future state SAP Architecture
    In turn, this will mitigate risk for both Dimension Data and our customers to provide a business outcome for the new Digital core and provide a clear scope for your initiative.

    Speakers:
    Vaughn Booyens : SAP Solution Architect S/4HANA Strategy and Roadmap design.
    Marco Bronze : SAP Enteprise Architect S/4HANA
  • Faster, Smarter, More Efficient Enterprise Protection: What's new in PAN-OS 9.0?
    Faster, Smarter, More Efficient Enterprise Protection: What's new in PAN-OS 9.0?
    Chris Sidwell-Smith, Systems Engineer, Palo Alto Networks Recorded: Mar 14 2019 26 mins
    PAN-OS®9.0, the latest release of the Palo Alto Networks software that powers their next-generation firewalls, keeps you on the cutting edge with tightly integrated innovations. It simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks.

    Join this short webinar to learn all the new enhanced features and how some of the 60+ new capabilities helps prevent successful cyberattacks.

    Key benefits:

    •New DNS security service disrupts attacks using machine learning
    •Policy tool to deploy best practices with confidence
    •Secure high-performance environments at greater scale
  • Data Virtualization for the Energy Industry
    Data Virtualization for the Energy Industry
    Stephen Archut, Sr. Product Marketing Manager, TIBCO Data Virtualization Phil Unger, CEO, Cadeon Niaz Tadayyon, M.Eng, CBIP Recorded: Mar 14 2019 32 mins
    Within the energy industry, Exploration, Production, Refining, and Marketing each present unique business challenges. Analyzing the disparate data created and used upstream, downstream, and beyond poses unique IT challenges. With siloed data assets forming an often-untapped reservoir of business opportunity and insight, energy companies who successfully leverage them can gain a significant competitive advantage.

    Watch this joint webinar with TIBCO and Cadeon, a data and business analytics expert in the Oil & Gas, Utilities and Mining industries to learn about:

    •How to federate, abstract, and simplify data using TIBCO Data Virtualization for faster analytic insights
    •How to overcome data and analytic challenges to gain tangible business benefits
    •How to do this with all your data, no matter where it resides — upstream, downstream or anywhere across the globe.
  • Part 1 Windows & SQL Server 2008/R2 End of Support : What to Know & Preparation
    Part 1 Windows & SQL Server 2008/R2 End of Support : What to Know & Preparation
    Kaz Traverso, Solutions Specialist; David Bloxham, Marketing Manager Recorded: Mar 14 2019 20 mins
    Make sure you are fully informed about the upcoming end-of-support for Microsoft SQL Server and Windows Server 2008 and 2008 R2 – and ensure your organisation is ready.

    Once SQL Server 2008 reaches its end of support deadline on 9th July 2019 and Windows Server January 2020, security updates will no longer be released for it, leaving systems open to outside threats, and the risk of non-compliancy with industry requirements such as GDPR.

    In part 1 of our 4-part series to help with your readiness Solution Specialist from SoftwareONE, Kaz Traverso, and Marketing Manager, David Bloxham, will discuss the essential pieces of information to help with your strategy planning, including:

    •What is ‘End of Support’ and what does it mean
    •What are the timelines and other upcoming End of Support products
    •Security risks and impact on ISO and GDPR compliance
    •Operational constraints
    •How to understand your risk – discovery tools and assessment
    •What are your options – stay on-prem or move to Azure or hybrid approach?

    Within the webinar series in part 2 we discuss the cloud migration options and process in more detail, part 3 looks at licensing and commercial options and in part 4 we share best practice governance for hybrid environments for cloud management and cost control.
  • Web Performance Matters: Challenges, Solutions, Best Practices
    Web Performance Matters: Challenges, Solutions, Best Practices
    Anand Guruprasad, Solutions Engineer, Cloudflare | Nithyanand Mehta, Director of Technical Services, Catchpoint Recorded: Mar 14 2019 43 mins
    At Cloudflare, we not only protect 12 million domains against DDoS attacks with our global network but also accelerate their performance. Our 150+ data centers all over the world puts us in a key position to serve content from the edge to the end users, blazingly fast.

    Join this webinar to learn about:

    • How performance affects your revenue
    • What is the right metric to measure and how
    • Challenges in achieving an optimal performance on your web assets
    • How to improve your website’s performance and user-experience
    • Learn from industry experts on best practices for improving web performance
  • 2019 Top 10 Business Intelligence Trends
    2019 Top 10 Business Intelligence Trends
    Andrew Beers, Andy Cotgreave, Ellie Fields, Stephanie Richardson Recorded: Mar 14 2019 61 mins
    Keeping up with the rapid pace of change in the Business Intelligence ecosystem gets more challenging every year. We interviewed a variety of customers, Tableau staff, and experts to identify 10 influential Business Intelligence trends.

    This 60-minute webinar will give you a high-level overview of all 10 trends including artificial intelligence (AI), natural language processing (NLP), data ethics, and more.
  • Anuta Networks Academy: Episode-10: ATOM Features: Workflow & Multi-Tenancy
    Anuta Networks Academy: Episode-10: ATOM Features: Workflow & Multi-Tenancy
    Dilip Krishna, Anuta Networks Recorded: Mar 13 2019 5 mins
    Explains Workflow Automation and Multi-Tenancy within Anuta ATOM
  • Automate proactive security and reliability workflows
    Automate proactive security and reliability workflows
    Red Hat Mar 18 2019 6:00 pm UTC 35 mins
    Businesses constantly face the pressure to increase efficiency, agility, and innovation while adhering to compliance standards and regulations. As demand grows to respond faster to market changes, even the most skilled IT teams are challenged.
    Join this webinar to learn how Red Hat® Ansible® Tower, Red Hat Insights, and Red Hat Satellite 6 together provide a complete, automated, proactive security solution.

    We’ll cover:
    • Useful examples and details about the why and how to use these tools together.
    • How to abstract Satellite 6 to use as a dynamic inventory source.
    • How to use Insights to detect issues and create playbooks.
    • How to use Ansible® Tower to automate with workflow and reporting.

    Featured Presenters:
    Justin Lacey, Architect, Red Hat Consulting, Red Hat
    Allen Eastwood, Managing Architect, Red Hat Consulting, Red Hat
    Dustin Scott, Managing Architect, Red Hat Consulting, Red Hat
  • Network Automation: Getting from Automatable to Automated
    Network Automation: Getting from Automatable to Automated
    James Kelly, Enterprise Marketing, Juniper Networks Mar 19 2019 3:00 am UTC 50 mins
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • Transform Office 365 Email Security in less than 10 minutes
    Transform Office 365 Email Security in less than 10 minutes
    Michael Aminov, Chief Architect - Perception Point Mar 19 2019 8:00 am UTC 15 mins
    According to Gartner, "Clients have found the email security capabilities of Office 365 to be lagging."

    In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Fight the Good Fight Against the Bad Bots
    Fight the Good Fight Against the Bad Bots
    Keiron Shepherd, Senior Specialist Systems Engineer Security - F5 Networks Mar 19 2019 9:00 am UTC 65 mins
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy. Join this webinar to learn:

    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    The speaker for this webinar is Keiron Shepherd, Senior Specialist Systems Engineer at F5 Networks.

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Die Ergebnisses des Symantec Internet Threat Security Report (ISTR), Volume 24
    Die Ergebnisses des Symantec Internet Threat Security Report (ISTR), Volume 24
    Candid Wüest (Sr. Threat Researcher at Symantec); Thomas Hemker (CISSP, CISM, CISA) Mar 19 2019 9:00 am UTC 60 mins
    Symantec Internet Security Threat Report: Cyber-Kriminelle stehlen Millionen mit Hilfe von Formjacking; setzen auf destruktive Malware und bereiten sich auf Cyber-Kriegsführung vor –
    eine ernstzunehmende Bedrohung für Unternehmen und Verbraucher


    Jährlicher Symantec Threat Report zeigt steigende Zahl ambitionierter, zerstörerischer und heimtückischer Angriffe auf Unternehmen

    •Fast jede zehnte Angriffsgruppe, die gezielte Attacken verübt, setzt destruktive Malware ein und stoppt so Unternehmensabläufe. Diese Zahl stieg im Vergleich zu 2017 um 25 Prozent.

    •Cyber-Kriminelle optimieren bewährte Taktiken, darunter Spear-Phishing, Hijacking legitimer Tools und bösartige E-Mail-Anhänge. Living of the Land (LotL)- und Supply Chain-Angriffe sind weiterhin eine signifikante Bedrohung. Der Einsatz bösartiger Powershell-Skripte stieg im vergangenen Jahr um 1.000 Prozent.

    •Infektionen mit Ransomware stiegen in Unternehmen um zwölf Prozent

    •Cloud-Ressourcen sind immer häufiger leichte Ziele für digitale Diebe: Mehr als 70 Millionen Datensätze aus schlecht konfigurierten S3 Public Cloud-Speicher-Buckets wurden gestohlen oder abgezapft

    •Eine zunehmende Anzahl an Angreifern kompromittiert operative Systeme und industrielle Kontrollsysteme (Industrial Control Systems, ICS), um sich möglicherweise auf Cyber-Kriegsführung vorzubereiten
  • Manufacturing Intelligence: Keep Your Processes Under Control
    Manufacturing Intelligence: Keep Your Processes Under Control
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. , Danny Stout, Sr. Solutions Consultant, TIBCO Soft Mar 19 2019 10:00 am UTC 30 mins
    The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products.

    Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs.

    What You Will Learn:

    -Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes
    -How multi-variate statistical process control can help to detect deviations from a baseline
    -How to monitor in real time the OEE and produce a 360 view of your factory

    The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models.
  • Dell EMC Unity has got even better
    Dell EMC Unity has got even better
    Stewart Hunwick, EMEA Field Evangelist Mar 19 2019 10:00 am UTC 60 mins
    New levels of functionality and efficiency

    The recent launch of Dell EMC Unity 4.5 brings new capabilities to our All-Flash and Hybrid Flash unified storage platforms – making it more powerful than ever before.

    With each subsequent release, we have continued to fine tune the Dell EMC Unity portfolio, focused on impactful innovations that drive new levels of functionality and efficiency that our customers expect.
    New levels of functionality:
    • Advanced deduplication
    • File management improvements
    • File-level retention
    • Software-defined storage with high availability

    We hope you can join Stewart, our EMEA Field Evangelist to understand more and discuss any questions you may have.
  • Cybersecurity for Manufacturing
    Cybersecurity for Manufacturing
    Stefan Woronka, Director Customer Services Digital Factory Process at Siemens & Dharminder Debisarun Mar 19 2019 10:00 am UTC 36 mins
    With prominent incidents like WannaCry, Shamoon, and Trisis effecting plant operations, it’s no wonder IT security is on the rise in manufacturing.

    These incidents show the immense need to implement a holistic, automated security approach across the manufacturing – protecting plant floors, execution systems, corporate IT, IoT and the industrial cloud altogether.

    In the webinar, Siemens and Palo Alto Networks experts discuss overcoming manufacturing cybersecurity challenges by applying industrial automation and control systems to:

    • Seamlessly integrate IT and OT security
    • Increase visibility and enforcement points
    • Connect third-party apps with threat intelligence

  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most...
    Mark Elwood - Marketing Director, TeleWare Mar 19 2019 10:00 am UTC 44 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility-enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile-enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post-GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility-enabled workforce

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • Accelerate your Migration to Amazon Web Services
    Accelerate your Migration to Amazon Web Services
    Mor Hezi, Principal EMEA Territory Business Development, AWS Marketplace Mar 19 2019 1:00 pm UTC 59 mins
    Enterprises are faced with several strategy options when building their cloud migration. Building the optimal path for existing and future application needs can be challenging.
    AWS and AWS Marketplace provide the tools and software for each step of the migration process and post-migration, to sustain business value with a cloud operating model, increase your competitive edge, and modernize your infrastructure.

    Whether you are exploring moving or modernizing workloads, join us to learn :
    •How to build a successful migration strategy for the cloud
    •How to accelerate your migration to AWS with software solutions in AWS Marketplace
    •How to save on costs, with the flexible payment options in AWS Marketplace

    You will also be able to ask questions and request a custom consultation for your business.
    Sign-up to attend the webinar or to get a copy of the recording.
  • Learn How to Seamlessly Connect Cloud and Hybrid Applications
    Learn How to Seamlessly Connect Cloud and Hybrid Applications
    Paul Varley, Sr. Product Marketing Manager Mar 19 2019 1:00 pm UTC 17 mins
    TIBCO Cloud™ Integration makes it easy for anyone to integrate business applications. From developers, to IT specialists, to daily business operations participants, everyone is involved with integration. One of the newest additions to TIBCO Cloud Integration is TIBCO Scribe® Software capability.
  • Cómo protegerse contra los bots maliciosos
    Cómo protegerse contra los bots maliciosos
    Daniel Varela Jarillo - Systems Engineer, F5 Networks Mar 19 2019 2:00 pm UTC 61 mins
    Identificar bots maliciosos y protegerse contra ellos se ha convertido en la prioridad máxima de las empresas que aplican estrategias de seguridad sostenibles. Asiste a nuestro webinar para saber:

    • Cómo los bots infectan, se propagan y atacan a las aplicaciones
    • Qué tipos de ataques a aplicaciones son comúnmente perpetrados por bots
    • Cómo protegerse contra los bots malos sin afectar a los buenos

    Al asistir a este webinar, tus datos personales serán compartidos con F5 y tratados de acuerdo con la Política de Privacidad de F5 (https://f5.com/about-us/policies/privacy-policy). Igualmente, está aceptando recibir información sobre los productos y servicios de F5 pero puede darse de baja en cualquier momento.
  • Intelligent Fraud Management – Banking and Insurance
    Intelligent Fraud Management – Banking and Insurance
    Ritika Sehgal Director Pre-Sales Analytics and Alain Martens Analytics Solutions Consultant, TIBCO Software Mar 19 2019 2:00 pm UTC 54 mins
    A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies require you to be proactive in detecting fraud quicker and more effectively.

    TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control, because you’re in charge of priorities, not a vendor.
    All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models.
    This webinar will cover:

    - Why is a fraud management platform necessary
    - How to gain an understanding of the components of a fraud management platform
    - The benefits of implementing a fraud management platform
    - How TIBCO’s platform has helped other companies
  • How to Leverage the Cloud to Consolidate IT Infrastructure
    How to Leverage the Cloud to Consolidate IT Infrastructure
    Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, Nasuni Mar 19 2019 3:00 pm UTC 35 mins
    Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.

    With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:

    - How the business strategy drove TBWA to the cloud
    - What key decisions enabled them to reduce costs and meet capacity requirements at the same time
    - How they went about a worldwide roll-out of their cloud storage strategy
    - Why multi-cloud capability is important
  • In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    Nirav Shah, Sr. Director, Product & Solutions, Fortinet; Stephen Watkins, Principal Security Architect, Fortinet Mar 19 2019 4:00 pm UTC 49 mins
    Join the discussion and learn about the full advantages of implementing an SD-WAN solution that enables both digital transformation and comes with critical cybersecurity.

    Our Fortinet experts will guide you through a variety of use cases including how creating an SD-Branch can extend SD-WAN capabilities to enterprise branches, plus key insights about what your peers are weighing in on about the current landscape of SD-WAN solutions.

    Watch this webinar to discover:

    - How to enable enterprise branches by creating an SD-Branch
    - Third Party analysis and outlook for the future of SD-WAN
    - How Fortinet’s SD-Branch stacks up against the competition
  • Web Application Security for  Continuous Delivery Pipelines
    Web Application Security for Continuous Delivery Pipelines
    Christian Treutler Mar 19 2019 5:00 pm UTC 59 mins
    Learn how to secure your modern web applications for continuous delivery, and how to solve the challenges proposed by integrating a modern web application firewall (WAF).
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Mar 19 2019 5:00 pm UTC 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • How to Create an Infrastructure-less Backup Strategy
    How to Create an Infrastructure-less Backup Strategy
    Storage Switzerland, Actifio Mar 19 2019 5:00 pm UTC 60 mins
    Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for shorter recovery times and new threats like ransomware. The cost for IT to design, implement, maintain and upgrade these infrastructures can consume a big part of the IT budget. Additionally, the time required for each of these steps is something that most IT teams simply don’t have.

    As a result, many organizations are looking for ways to move to an infrastructure-less architecture where most of the physical hardware is in the cloud as well as the software intelligence. The goal is to move data protection from a very unpredictable CAPEX cost to a normalized OPEX cost. There are an increasing number of cloud solutions that claim an infrastructure-less solution but many of these solutions force the organization to give up many of the capabilities they’ve come to count on or force them into long-term cloud relationships.

    Attendees to the webinar will learn the challenges of maintaining an on-premises infrastructure, why current cloud solutions fall short and what IT really needs from an infrastructure-less solution.
  • Key Application Security Strategies for your Cloud Migration
    Key Application Security Strategies for your Cloud Migration
    Rohit Gupta, Global Segment Leader; Surag Patel, Chief Strategy Officer Mar 19 2019 5:00 pm UTC 60 mins
    Cloud computing is one of the major shifts in technology that is gaining rapid traction and is helping fuel the growth in today’s digital transformation. As leading organizations modernize their hardware and software environments, they are demanding flexibility, business agility and operational efficiencies. This ultimately equates to tangible cost savings, loyal customers and higher profits, as organizations leverage the cloud to compete more effectively and differentiate their digital service and product offerings.

    As a real-world example, you will hear from Chris Perkins, Senior Security Architect at a major Fortune 500 medical technology and solutions company on:

    - Key drivers and use cases in migrating from traditional legacy technologies and embracing modern hybrid cloud computing approaches.
    - Application Security threat landscape, testing pipelines and native integrations.
    - Major hurdles and lessons learned (organizationally, culturally, technology) and how to reduce friction and increase collaboration between Dev & Ops teams
    in order to optimize resources and ensure a secure Cloud migration.
    - The cost curve for remediation of defects enabling a safer speed to market and growth

    You’ll also hear from Rohit Gupta, Global Segment Leader, Security: Amazon Web Services (AWS) highlighting key tenets for security for AWS and the framework required to help their customers meet compliance, regulation and security objectives and Surag Patel, Chief Strategy Officer, Contrast Security, underscoring modern approaches to automate, integrate and scale Application Security.

    As a result of this webinar, you will hear about the major benefits in migrating to a secure, compliant cloud environment and learn from a customer’s experience on how to successfully automate and secure your applications. There will also be a Q&A session at the end of the webinar.
  • ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    Adam Mason, Carleen Carter, Ken Michelson, Meghan Lockwood Mar 19 2019 5:00 pm UTC 60 mins
    ServiceNow just launched their newest (and highly anticipated) release, Madrid!

    Find out how ServiceNow is expanding its enterprise reach while returning to its roots: making agents, internal service providers, and developers more effective problem-solvers.

    Be the first to learn all about...
    Dramatic improvements in mobile
    “Intelligent” agent support
    Significant improvements in HR Service Delivery and Customer Service Management
  • Leveraging Machine Learning to Prevent eCommerce Fraud
    Leveraging Machine Learning to Prevent eCommerce Fraud
    Dave Klein (Guardicore), Trevor Anderson (Whitepages Pro), Ajay Andrews (Whitepages Pro) and Angie Dobbs (Wave Financial) Mar 19 2019 5:30 pm UTC 60 mins
    Finding the balance between staying compliant and providing a frictionless eCommerce experience for your customers is a difficult task. Machine Learning has been touted as a game changer in validating information at speed, managing identities, and preventing and detecting fraud.

    Join this live-streamed session where our expert panel will discuss:

    -The latest trends in eCommerce
    -Is friction really a bad thing?
    -Best practices for using machine learning for pricing optimization, fraud prevention, and improving the customer experience

    Moderator:
    Dave Klein, Senior Director Engineering & Architecture at GuardiCore

    Panelists:
    Trevor Anderson, Director, Solutions Architecture, Whitepages
    Ajay Andrews, Senior Director, Product, Whitepages
    Angie Dobbs, Director of Risk, Wave Financial Inc
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Mar 19 2019 6:00 pm UTC 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Mar 19 2019 6:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    Todd Bernhard, CloudCheckr Product Marketing Manager Mar 19 2019 6:00 pm UTC 45 mins
    Just as traditional Managed Service Providers (MSP) businesses are evolving with the rapid adoption of the cloud, the Amazon Web Services (AWS) MSP Partner Program criteria is always changing. The program recognizes highly skilled AWS Partner Network (APN) Consulting Partners that provide full lifecycle solutions to customers. AWS recently released Version 4.0 of its Validation Checklist, and is requiring all APN Partners to meet requirements by April 1, 2019.

    Achieving AWS MSP Partner Program Validation is possible and easy with the right preparation. In this webinar, attendees will hear a summary of the new requirements, how CloudCheckr helps MSPs meet those checklist items, and areas where MSPs can increase cloud growth and profit going forward.
  • Docker and IDC: Containers in Production
    Docker and IDC: Containers in Production
    Gary Chen, Research Manager at IDC and Jenny Fong, Director of Product Marketing at Docker Mar 19 2019 6:00 pm UTC 40 mins
    Containers have evolved into a transformative technology for application development and portability, but containers alone are not sufficient for meeting today’s enterprise requirements. In IDC’s recent Container Infrastructure Survey, over 76% of enterprises surveyed stated they use containers in production for mission critical apps, with 83% of container deployers using containers on multiple public clouds.

    In this webinar, Docker and guest speaker IDC Research Manager Gary Chen will discuss why companies are turning to container platforms to support increasingly diverse IT environments, bolster security and governance, and power digital transformation initiatives - from cloud migration and application modernization to microservices.