Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Intelligent Workload Placement and Optimization
    Intelligent Workload Placement and Optimization Bobby Allen, Dir of Technical Services, CloudGenera and Jim Wittry, GM Alliances & Channel, CloudGenera Recorded: Dec 15 2017 53 mins
    The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash
    Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash Артур Вартанян Recorded: Dec 15 2017 45 mins
    В рамках вебинара будут озвучены ключевые обновления технологий в СХД Unity и SC AFA от компании Dell EMC, которые станут доступны заказчикам в декабре 2017 года – январе 2018 года. Вебинар направлен на специалистов по продажам и технических экспертов. На русском языке - in Russian language.

    Вебинар проводится при поддержке компании Intel.
  • Votre proxy gagne en agilité grâce à l’isolation web
    Votre proxy gagne en agilité grâce à l’isolation web Hervé Doreau, Directeur Technique, Symantec France Recorded: Dec 15 2017 27 mins
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Maximize Business Critical Decision Making with an Innovative Big Data Platform
    Maximize Business Critical Decision Making with an Innovative Big Data Platform Laura Finkelstein, Director of Product Management, Netapp & Santosh Rao, Sr. Technical Director, NetApp Recorded: Dec 14 2017 58 mins
    It’s clear Big Data Analytics drives profitability and is becoming essential to the success of enterprises. Unfortunately, first generation, share-nothing analytics platforms are not sufficient to meet the security, reliability, scalability or performance requirements of business-critical applications. They lack fundamental capabilities necessary to protect critical data, drive costs down, and provide the flexibility needed to meet evolving needs.

    First generation Big Data Analytics platforms are built around clusters of individual compute platforms with internal direct-attached storage (DAS), but this architecture is inherently problematic and non-scalable. Component failure, particularly DAS, can cause the analytics’ process to fail or drastically slow down. There is no convenient way to back up the data and quickly restore it, nor any way to manage the data life cycle as analytics become core to the enterprise and the datasets grow exponentially. It is difficult to scale compute and storage elements independently, or even at all. In this webcast learn how an Innovative Big Data Analytics platform addresses and overcomes these challenges.

    This new, highly scalable analytics approach provides far more flexibility, and effortlessly leverages the cloud in combination with on-premises resources. Compute and storage infrastructure can be scaled independently – driven only by current requirements. Analytics applications can now efficiently access data directly from existing enterprise storage systems, eliminating unnecessary replication of data. See how an innovative big data analytics platform can reduce server, storage and software license costs by optimizing resource utilization, and provide all the data security, scalability, performance, and analytics capability required by your enterprise.
  • 2018 RI Planning for AWS and Azure
    2018 RI Planning for AWS and Azure Marit Hughes, Billing Solutions Architect/SME and Todd Bernhard, Product Marketing Manager Recorded: Dec 14 2017 34 mins
    As 2017 comes to a close, you may have budget that falls under “use it or lose it.” If so, consider purchasing a credit towards discounted Reserved Instances for 2018 and beyond! RIs from AWS and more recently Microsoft Azure are a great way to save up to 75% compared to On Demand rates, as long as you know you’ll have a long-term need. You can use that end-of-year budget surplus to make an up-front payment towards a one or three year commitment, making your monthly cloud spend much less.

    In this webinar, attendees will:
    -Learn how to decide between the various types of RIs including Standard and Convertible
    -Understand the terms and payment options
    -Explore the tools available to make informed recommendations
  • DriveLock: Secure Your Critical Infrastructure!
    DriveLock: Secure Your Critical Infrastructure! Alfred Ortiz (Director, Americas) and Jason Rose (Senior Security Consultant) Recorded: Dec 14 2017 53 mins
    The DriveLock Endpoint Protection Platform is helping you to secure, control, and protect your critical infrastructure from internal and external threats. DriveLock achieves this through a comprehensive, layered security approach that includes application control, device control, and drive encryption. DriveLock combines this with advanced AI and a security awareness system that, as a whole, provides the highest level of security for your critical data and users.


    * DriveLock provides a layered approach to system security that is both comprehensive and flexible.
    * Device and Drive Protection prevent malicious applications from being brought into your infrastructure and prevent sensitive data from getting out.
    * Application Control with AI allows more flexible, intelligent control over the applications allowed on your infrastructure without weakening your security posture.
    * Disk Encryption lets you ensure the security of the confidential data after it has left your infrastructure.
    * Web Security prevents known threats from infecting your network.
    * Security Awareness lets you seamlessly train users on information security best practices without interrupting their work.
  • Lifting the Clouds: Understanding Storage Challenges in a Container Environment
    Lifting the Clouds: Understanding Storage Challenges in a Container Environment Bill Borsari, Director, System Engineering at Datera Recorded: Dec 14 2017 54 mins
    Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.

    This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.

    Discover how Datera’s self-managing software-defined storage uniquely solves challenges:

    -Dynamic provisioning
    -Auto scaling
    -Making storage invisible for Containers
  • 5 Ways to Eliminate Secondary Storage Forever
    5 Ways to Eliminate Secondary Storage Forever Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Dec 14 2017 49 mins
    Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.

    By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.

    Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
  • Cyber Threat Predictions & Security for 2018
    Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 61 mins
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • Blockchain 101: Intel’s Role in Digital Ledgers
    Blockchain 101: Intel’s Role in Digital Ledgers Jesse Schrater, Director of Data Center Security Marketing Recorded: Dec 14 2017 44 mins
    In this webcast, Intel’s Director of Data Center Security Marketing highlights why blockchain is such a transformative technology and how Intel is working to solve the privacy, security, scalability, and trust challenges that will help drive enterprise adoption and accelerate blockchain deployments. Tune in to learn more about what products and services look like in a blockchain-enabled world moving forward.
  • Modern Approaches to Security for Practitioners
    Modern Approaches to Security for Practitioners Alex Rice, CTO at HackerOne; Zane Lackey, CSO at Signal Sciences Recorded: Dec 14 2017 44 mins
    In the DevOps-era, security looks different. Hear from security experts Alex Rice, Co-founder and CTO at HackerOne, and Zane Lackey, Co-founder and CSO at Signal Sciences as they explore how security has changed in today's environments of fast, continuous development and regularly shifting business requirements.
  • RIDE Containerized Data Science IDE server For Enterprise
    RIDE Containerized Data Science IDE server For Enterprise Ali Marami, Data Science Advisor at R-Brain Recorded: Dec 14 2017 45 mins
    RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.

    RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.

    Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.

    The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.

    The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Dec 14 2017 42 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Microsoft Teams & Skype for Business - the road ahead for collaboration
    Microsoft Teams & Skype for Business - the road ahead for collaboration David Branscome, Microsoft | David Tupling, IR Recorded: Dec 14 2017 61 mins
    When Microsoft launched Teams in 2016 many wondered what this would mean for Skype for Business. Join us to hear from Microsoft's David Branscome on the road ahead for Intelligent Communications and collaboration.
  • Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN
    Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN Shoaib Yusuf, Solutions Architect, Citrix Recorded: Dec 14 2017 35 mins
    With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
    What you will learn:
    • How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
    • How to secure data in transmit across the virtualized WAN using IPsec data encryption
    • What management tools are available to provide visibility and control of the network and applications
    • How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
    • Easily roll-out SD-WAN to all locations with zero touch deployment service
  • Transforme la gestión tradicional de su PMO a un enfoque ágil.
    Transforme la gestión tradicional de su PMO a un enfoque ágil. Jorge Moreno Recorded: Dec 14 2017 63 mins
    En esta sesión usted entenderá como puede implementar prácticas ágiles en una PMO, realizando una transición controlada de esquemas tradicionales a ágiles, y durante el proceso aplicar prácticas que le permitan realizar una verdadera transformación de su negocio.
    Todo ello, alineado a las buenas prácticas promovidas por PMI. ¡No se lo pierda!


    Jorge Moreno
    Sr Consultor para CA PPM en hispanoamérica con mas de 20 años de experiencia en gerencia de proyectos y gestión integral de portafolio .
    Con certificaciones de PMP®, CSP®, PRINCE2®, TOGAF9®, COBIT5®, ITIL® V3 Foundations
  • Mais armazenamento por menos com Storage Definido por Software
    Mais armazenamento por menos com Storage Definido por Software Aslan Carlos, Sales Engineer - SUSE Recorded: Dec 14 2017 70 mins
    Por que uma abordagem de software para Enterprise Storage?

    A lógica dentro dos dispositivos de armazenamento corporativos sempre foi escrita em software. Mas somente nos últimos anos, o hardware avançou o suficiente de modo que o software e o hardware de storage podem agora ser separados. Está é a nova proposta de valor!

    Seguir a abordagem adequada para o storage definido por software deve fornecer a você uma solução altamente escalável que reduz drasticamente os custos de armazenamento em termos de capital e despesas operacionais.
    Conheça neste Webinar o SUSE Enterprise Storage, a solução de armazenamento inteligente definida por software, com a tecnologia Ceph, que permite transformar a infraestrutura de armazenamento de sua empresa para reduzir custos enquanto fornece escalabilidade ilimitada. Uma solução simples, robusta e flexível.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Dec 14 2017 30 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • How to Modernize Legacy Applications
    How to Modernize Legacy Applications James Falkner Technical marketing manager, Red Hat Recorded: Dec 14 2017 29 mins
    Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.

    In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
  • 【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント
    【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント FireEye Japan Recorded: Dec 14 2017 38 mins

    このたび、Web脅威対策製品である「FireEye NX シリーズ」の最新バージョン「OS 8.0」 がリリースされました。今回のバージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、OS 8.0の性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。
    つきましては、下記の通り、OS 8.0の新機能について詳細、および導入例やキャンペーン情報などをご紹介するWebセミナーを開催いたします。