Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
It’s clear Big Data Analytics drives profitability and is becoming essential to the success of enterprises. Unfortunately, first generation, share-nothing analytics platforms are not sufficient to meet the security, reliability, scalability or performance requirements of business-critical applications. They lack fundamental capabilities necessary to protect critical data, drive costs down, and provide the flexibility needed to meet evolving needs.
First generation Big Data Analytics platforms are built around clusters of individual compute platforms with internal direct-attached storage (DAS), but this architecture is inherently problematic and non-scalable. Component failure, particularly DAS, can cause the analytics’ process to fail or drastically slow down. There is no convenient way to back up the data and quickly restore it, nor any way to manage the data life cycle as analytics become core to the enterprise and the datasets grow exponentially. It is difficult to scale compute and storage elements independently, or even at all. In this webcast learn how an Innovative Big Data Analytics platform addresses and overcomes these challenges.
This new, highly scalable analytics approach provides far more flexibility, and effortlessly leverages the cloud in combination with on-premises resources. Compute and storage infrastructure can be scaled independently – driven only by current requirements. Analytics applications can now efficiently access data directly from existing enterprise storage systems, eliminating unnecessary replication of data. See how an innovative big data analytics platform can reduce server, storage and software license costs by optimizing resource utilization, and provide all the data security, scalability, performance, and analytics capability required by your enterprise.
As 2017 comes to a close, you may have budget that falls under “use it or lose it.” If so, consider purchasing a credit towards discounted Reserved Instances for 2018 and beyond! RIs from AWS and more recently Microsoft Azure are a great way to save up to 75% compared to On Demand rates, as long as you know you’ll have a long-term need. You can use that end-of-year budget surplus to make an up-front payment towards a one or three year commitment, making your monthly cloud spend much less.
In this webinar, attendees will:
-Learn how to decide between the various types of RIs including Standard and Convertible
-Understand the terms and payment options
-Explore the tools available to make informed recommendations
With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.
This interactive Q&A panel with security industry experts will explore:
- The biggest threats on the horizon
- Key vulnerabilities and how to protect against them
- Measures for breach prevention, detection and response
- Which areas to focus on in 2018
- Recommendations for CISOs
- Diana Kelley, Cybersecurity Field CTO, Microsoft
- David McGuire, CEO, SpecterOps
- Ashton Mozano, CTO, Circadence
- Mark Weatherford, Chief Cybersecurity Strategist, vArmour
- Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.
By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.
Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
The DriveLock Endpoint Protection Platform is helping you to secure, control, and protect your critical infrastructure from internal and external threats. DriveLock achieves this through a comprehensive, layered security approach that includes application control, device control, and drive encryption. DriveLock combines this with advanced AI and a security awareness system that, as a whole, provides the highest level of security for your critical data and users.
* DriveLock provides a layered approach to system security that is both comprehensive and flexible.
* Device and Drive Protection prevent malicious applications from being brought into your infrastructure and prevent sensitive data from getting out.
* Application Control with AI allows more flexible, intelligent control over the applications allowed on your infrastructure without weakening your security posture.
* Disk Encryption lets you ensure the security of the confidential data after it has left your infrastructure.
* Web Security prevents known threats from infecting your network.
* Security Awareness lets you seamlessly train users on information security best practices without interrupting their work.
Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.
This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.
Discover how Datera’s self-managing software-defined storage uniquely solves challenges:
-Making storage invisible for Containers
Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.
RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.
Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.
The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.
The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
In the DevOps-era, security looks different. Hear from security experts Alex Rice, Co-founder and CTO at HackerOne, and Zane Lackey, Co-founder and CSO at Signal Sciences as they explore how security has changed in today's environments of fast, continuous development and regularly shifting business requirements.
When Microsoft launched Teams in 2016 many wondered what this would mean for Skype for Business. Join us to hear from Microsoft's David Branscome on the road ahead for Intelligent Communications and collaboration.
With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
What you will learn:
• How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
• How to secure data in transmit across the virtualized WAN using IPsec data encryption
• What management tools are available to provide visibility and control of the network and applications
• How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
• Easily roll-out SD-WAN to all locations with zero touch deployment service
En esta sesión usted entenderá como puede implementar prácticas ágiles en una PMO, realizando una transición controlada de esquemas tradicionales a ágiles, y durante el proceso aplicar prácticas que le permitan realizar una verdadera transformación de su negocio.
Todo ello, alineado a las buenas prácticas promovidas por PMI. ¡No se lo pierda!
Sr Consultor para CA PPM en hispanoamérica con mas de 20 años de experiencia en gerencia de proyectos y gestión integral de portafolio .
Con certificaciones de PMP®, CSP®, PRINCE2®, TOGAF9®, COBIT5®, ITIL® V3 Foundations
Por que uma abordagem de software para Enterprise Storage?
A lógica dentro dos dispositivos de armazenamento corporativos sempre foi escrita em software. Mas somente nos últimos anos, o hardware avançou o suficiente de modo que o software e o hardware de storage podem agora ser separados. Está é a nova proposta de valor!
Seguir a abordagem adequada para o storage definido por software deve fornecer a você uma solução altamente escalável que reduz drasticamente os custos de armazenamento em termos de capital e despesas operacionais.
Conheça neste Webinar o SUSE Enterprise Storage, a solução de armazenamento inteligente definida por software, com a tecnologia Ceph, que permite transformar a infraestrutura de armazenamento de sua empresa para reduzir custos enquanto fornece escalabilidade ilimitada. Uma solução simples, robusta e flexível.
Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.
In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
Industry 4.0, Smart Factories & Digital Transformation. The promise of a revolution in the way we build things in the future, a promise backed largely by the fluid exchange of data from previously disconnected factory components, but where is the evidence of this revolution? Join Microsoft and our partners to see first hand how real solutions are delivering real outcomes for businesses in the Manufacturing sector.
Data autonomy goes hand-in-hand with building a powerful, multi-cloud data management strategy. Enterprises today are rethinking their data management tactics in light of what they can achieve with the correct usage of the public clouds. In this on-demand webcast, guest speaker James Curtis, Senior Analyst, Data Platforms & Analytics, 451 Research, discussed how enterprises are getting valuable data autonomy and building game-changing multi-cloud database management strategies.
Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.
Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?
If you answered yes to any of these questions, then this webinar is for you!
Join this webinar and learn:
• Why customers are not convinced that F5 is the right choice for them
• Common enterprise application delivery use cases
• Why Citrix NetScaler is gaining popularity amongst former F5 customers
As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.
In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:
- Develop an automation strategy that includes network discovery and configuration auditing.
- Adopt a holistic approach to configuration and workload management.
- Automate new network device provisioning.
- Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
- Provide a better way for teams to deploy and manage their own workloads.
Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
For more than 25 years IT organizations have spent many cycles building enterprise data warehouses, but both speed to market and high cost has left people continually searching for a better way. Over the last 10 years, many found an answer with Hadoop, but the inability to recruit skilled resources, combined with common enterprise necessities such as ANSI compliant SQL, security and the overall complexity has Hadoop relegated to an inexpensive, but scalable data repository.
Join Noel Yuhanna from Forrester and Pivotal’s Jacque Istok for an interactive discussion about the most recent data architecture evolution; the Big Data Fabric. During this webinar you will learn:
What a Big Data Fabric is
- How does it leverage your existing investments in enterprise data warehouses, data marts, cloud analytics, and Hadoop clusters?
How to leverage your team’s expertise to build a Big Data Fabric
- What skills should you be investing in to continue evolving with the market?
When is it appropriate for an organization to move to a Big Data Fabric
- Can you afford to divert from your existing path? Can you afford not to?
The skills and technologies that will ease the move to this new architecture
- What bets can you place that will keep you moving forward?
Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
Principaux thèmes abordés :
- Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
- Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
- Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
Inscrivez-vous dès aujourd'hui.
В рамках вебинара будут озвучены ключевые обновления технологий в СХД Unity и SC AFA от компании Dell EMC, которые станут доступны заказчикам в декабре 2017 года – январе 2018 года. Вебинар направлен на специалистов по продажам и технических экспертов. На русском языке - in Russian language.
The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•What is GDPR?
•Case Study: A look at how Gemalto has prepared for GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.
Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.
Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem
Please join us for the Dell EMC webcast on our new solution - VDI Complete with VxRail for VMware Horizon. In this session, you will learn how to maximize your opportunity with desktop and application virtualization through VMware Horizon® on Dell EMC VxRail™ hyper-converged infrastructure appliances. Learn how this industry-leading VDI solution helps you deliver faster time to deployment, radically simplified infrastructure management, and better performance at the edge to your customers, and more profitability to your bottom line. This webcast will be presented in English. We look forward to seeing you.
Join Justin Harris, Public Cloud Architect at Palo Alto Networks and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture to understand:
- Why organisations are moving to the cloud and the obstacles getting there
- The role of Cloud Access Security Brokers (CASB) and a simpler approach to securing SaaS applications
- How a Next-Generation Firewall compliments and enhances AWS/ Azure's built in security tools
- Automation and how to move quickly with cloud security
- Key strategies to ensure your organisation's data remains protected
- Questions and Answers
We do hope you can join us for this exclusive webinar to understand new cloud security challenges and strategies for protecting your data.
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
The Practical Guide to Cloud Computing is the CSCC’s seminal deliverable outlining key definitions, characteristics, and benefits of cloud computing. The heart of the guide is a comprehensive 10-step “Roadmap for Cloud Computing” containing guidance and strategies for the successful migration and deployment of cloud computing applications.
In this webinar, the authors will review each of the 10 steps in the guide and highlight the technical changes made to this latest version including the emergence of hybrid cloud, containers, serverless computing and microservices architectures.
Read the corresponding paper here:
During this upcoming webinar we will discuss the current state of IoT adoption, security and trust challenges to deployment by key vertical markets. We will also dive into lessons learned, emerging standards for IoT security, and the necessary innovative technologies required for the Internet of Things to succeed. Please join Entrust Datacard and 451 Research for this informative upcoming webinar.
Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
Imagine you have been asked to design and operationalize a new data center network in two weeks. Previously, such a project would have taken six months. With AOS, you can comfortably complete all phases of this project on time without human errors:
• Design in minutes, using industry best-practice reference architecture
• Build configs in minutes
• Deploy configs in minutes
• Validate network state continuously
• Operate with closed-loop telemetry
The Splunk platform has become a business-critical application with power that organizations around the world depend on for security, operations and other needs. But with great power comes great responsibility, as users demand the necessary performance, availability and scalability from their Splunk environment. Deploying and running Splunk on the right infrastructure is critical to success, and there are many paths one can take: on-premises, off-premises; SAN or DAS, virtual or bare metal. This session will explore these different paths and discuss the benefits and potential drawbacks to each, followed by reviewing the relevant best practices for deploying Splunk.
Cloud is transforming many industries, and the automotive industry is no exception. Gartner predicts that, by 2020, we will have a quarter of a billion connected cars on the road, and new cars will rely heavily on innovative cloud-based technology. Find out how Cloud is pushing this industry forward and what the security concerns and predictions will be for 2018 in this video.
Discover more by reading the blog in the attachments.
The recent release of our Cloud-Based Logging Service marks the next step in Palo Alto Networks’ evolution towards a consumption model that complements the dynamic nature of today’s IT infrastructure. In this brief 30-minute webinar we will discuss how Logging Service provides an alternative for Palo Alto Networks next-generation security infrastructure and why it is a cornerstone of our strategy. We will show how the Cloud-Based Logging service will help to offload CAPEX and operational overhead while also increasing data retention and intelligence.
Explore Tectonic's new Open Cloud Services and learn how etcd, Prometheus and Vault can be effortlessly installed, operated, scaled and handle failover. Unlike proprietary cloud services, Open Cloud Services are first-class, fully automated Kubernetes resources running on the CoreOS Tectonic platform, leveraging the Operator pattern.
Join this webinar to learn about these unique capabilities and a live demo of the Vault Open Cloud Service.
Découvrez comment protéger les ressources les plus précieuses de votre entreprise, vos données, avec les solutions de protection des données Dell EMC, optimisées par Intel®. Confortablement installé dans votre bureau ou à la maison, rejoignez vos collègues et experts pour participer à ce webinaire sur la protection des données et découvrir comment Dell EMC, n 1 dans ce domaine, vous procure un taux de déduplication 36 fois supérieur en moyenne, un déploiement de la protection 10 fois supérieur et jusqu’à 6 Po de données basées dans le Cloud dans une seule et même instance.
Join Ryan Olson, Senior Director of Threat Intelligence for Palo Alto Networks as he looks at the multiple instances of compromises we make within the Software Supply Chain, and get this predictions of what to expect from 2018.
Discover more by reading the blog in the attachments.