Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Maximize Business Critical Decision Making with an Innovative Big Data Platform
    Maximize Business Critical Decision Making with an Innovative Big Data Platform Laura Finkelstein, Director of Product Management, Netapp & Santosh Rao, Sr. Technical Director, NetApp Recorded: Dec 14 2017 58 mins
    It’s clear Big Data Analytics drives profitability and is becoming essential to the success of enterprises. Unfortunately, first generation, share-nothing analytics platforms are not sufficient to meet the security, reliability, scalability or performance requirements of business-critical applications. They lack fundamental capabilities necessary to protect critical data, drive costs down, and provide the flexibility needed to meet evolving needs.

    First generation Big Data Analytics platforms are built around clusters of individual compute platforms with internal direct-attached storage (DAS), but this architecture is inherently problematic and non-scalable. Component failure, particularly DAS, can cause the analytics’ process to fail or drastically slow down. There is no convenient way to back up the data and quickly restore it, nor any way to manage the data life cycle as analytics become core to the enterprise and the datasets grow exponentially. It is difficult to scale compute and storage elements independently, or even at all. In this webcast learn how an Innovative Big Data Analytics platform addresses and overcomes these challenges.

    This new, highly scalable analytics approach provides far more flexibility, and effortlessly leverages the cloud in combination with on-premises resources. Compute and storage infrastructure can be scaled independently – driven only by current requirements. Analytics applications can now efficiently access data directly from existing enterprise storage systems, eliminating unnecessary replication of data. See how an innovative big data analytics platform can reduce server, storage and software license costs by optimizing resource utilization, and provide all the data security, scalability, performance, and analytics capability required by your enterprise.
  • 2018 RI Planning for AWS and Azure
    2018 RI Planning for AWS and Azure Marit Hughes, Billing Solutions Architect/SME and Todd Bernhard, Product Marketing Manager Recorded: Dec 14 2017 34 mins
    As 2017 comes to a close, you may have budget that falls under “use it or lose it.” If so, consider purchasing a credit towards discounted Reserved Instances for 2018 and beyond! RIs from AWS and more recently Microsoft Azure are a great way to save up to 75% compared to On Demand rates, as long as you know you’ll have a long-term need. You can use that end-of-year budget surplus to make an up-front payment towards a one or three year commitment, making your monthly cloud spend much less.

    In this webinar, attendees will:
    -Learn how to decide between the various types of RIs including Standard and Convertible
    -Understand the terms and payment options
    -Explore the tools available to make informed recommendations
  • Cyber Threat Predictions & Security for 2018
    Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 61 mins
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • 5 Ways to Eliminate Secondary Storage Forever
    5 Ways to Eliminate Secondary Storage Forever Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Dec 14 2017 49 mins
    Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.

    By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.

    Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
  • DriveLock: Secure Your Critical Infrastructure!
    DriveLock: Secure Your Critical Infrastructure! Alfred Ortiz (Director, Americas) and Jason Rose (Senior Security Consultant) Recorded: Dec 14 2017 53 mins
    The DriveLock Endpoint Protection Platform is helping you to secure, control, and protect your critical infrastructure from internal and external threats. DriveLock achieves this through a comprehensive, layered security approach that includes application control, device control, and drive encryption. DriveLock combines this with advanced AI and a security awareness system that, as a whole, provides the highest level of security for your critical data and users.


    * DriveLock provides a layered approach to system security that is both comprehensive and flexible.
    * Device and Drive Protection prevent malicious applications from being brought into your infrastructure and prevent sensitive data from getting out.
    * Application Control with AI allows more flexible, intelligent control over the applications allowed on your infrastructure without weakening your security posture.
    * Disk Encryption lets you ensure the security of the confidential data after it has left your infrastructure.
    * Web Security prevents known threats from infecting your network.
    * Security Awareness lets you seamlessly train users on information security best practices without interrupting their work.
  • Lifting the Clouds: Understanding Storage Challenges in a Container Environment
    Lifting the Clouds: Understanding Storage Challenges in a Container Environment Bill Borsari, Director, System Engineering at Datera Recorded: Dec 14 2017 54 mins
    Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.

    This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.

    Discover how Datera’s self-managing software-defined storage uniquely solves challenges:

    -Dynamic provisioning
    -Auto scaling
    -Making storage invisible for Containers
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • RIDE Containerized Data Science IDE server For Enterprise
    RIDE Containerized Data Science IDE server For Enterprise Ali Marami, Data Science Advisor at R-Brain Recorded: Dec 14 2017 45 mins
    RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.

    RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.

    Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.

    The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.

    The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
  • Modern Approaches to Security for Practitioners
    Modern Approaches to Security for Practitioners Alex Rice, CTO at HackerOne; Zane Lackey, CSO at Signal Sciences Recorded: Dec 14 2017 44 mins
    In the DevOps-era, security looks different. Hear from security experts Alex Rice, Co-founder and CTO at HackerOne, and Zane Lackey, Co-founder and CSO at Signal Sciences as they explore how security has changed in today's environments of fast, continuous development and regularly shifting business requirements.
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Dec 14 2017 42 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Microsoft Teams & Skype for Business - the road ahead for collaboration
    Microsoft Teams & Skype for Business - the road ahead for collaboration David Branscome, Microsoft | David Tupling, IR Recorded: Dec 14 2017 61 mins
    When Microsoft launched Teams in 2016 many wondered what this would mean for Skype for Business. Join us to hear from Microsoft's David Branscome on the road ahead for Intelligent Communications and collaboration.
  • Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN
    Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN Shoaib Yusuf, Solutions Architect, Citrix Recorded: Dec 14 2017 35 mins
    With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
    What you will learn:
    • How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
    • How to secure data in transmit across the virtualized WAN using IPsec data encryption
    • What management tools are available to provide visibility and control of the network and applications
    • How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
    • Easily roll-out SD-WAN to all locations with zero touch deployment service
  • Transforme la gestión tradicional de su PMO a un enfoque ágil.
    Transforme la gestión tradicional de su PMO a un enfoque ágil. Jorge Moreno Recorded: Dec 14 2017 63 mins
    En esta sesión usted entenderá como puede implementar prácticas ágiles en una PMO, realizando una transición controlada de esquemas tradicionales a ágiles, y durante el proceso aplicar prácticas que le permitan realizar una verdadera transformación de su negocio.
    Todo ello, alineado a las buenas prácticas promovidas por PMI. ¡No se lo pierda!


    Jorge Moreno
    Sr Consultor para CA PPM en hispanoamérica con mas de 20 años de experiencia en gerencia de proyectos y gestión integral de portafolio .
    Con certificaciones de PMP®, CSP®, PRINCE2®, TOGAF9®, COBIT5®, ITIL® V3 Foundations
  • Mais armazenamento por menos com Storage Definido por Software
    Mais armazenamento por menos com Storage Definido por Software Aslan Carlos, Sales Engineer - SUSE Recorded: Dec 14 2017 70 mins
    Por que uma abordagem de software para Enterprise Storage?

    A lógica dentro dos dispositivos de armazenamento corporativos sempre foi escrita em software. Mas somente nos últimos anos, o hardware avançou o suficiente de modo que o software e o hardware de storage podem agora ser separados. Está é a nova proposta de valor!

    Seguir a abordagem adequada para o storage definido por software deve fornecer a você uma solução altamente escalável que reduz drasticamente os custos de armazenamento em termos de capital e despesas operacionais.
    Conheça neste Webinar o SUSE Enterprise Storage, a solução de armazenamento inteligente definida por software, com a tecnologia Ceph, que permite transformar a infraestrutura de armazenamento de sua empresa para reduzir custos enquanto fornece escalabilidade ilimitada. Uma solução simples, robusta e flexível.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Dec 14 2017 30 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • How to Modernize Legacy Applications
    How to Modernize Legacy Applications James Falkner Technical marketing manager, Red Hat Recorded: Dec 14 2017 29 mins
    Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.

    In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
  • 【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント
    【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント FireEye Japan Recorded: Dec 14 2017 38 mins

    このたび、Web脅威対策製品である「FireEye NX シリーズ」の最新バージョン「OS 8.0」 がリリースされました。今回のバージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、OS 8.0の性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。
    つきましては、下記の通り、OS 8.0の新機能について詳細、および導入例やキャンペーン情報などをご紹介するWebセミナーを開催いたします。
  • Industry 4.0 - Digital Transformation in Action
    Industry 4.0 - Digital Transformation in Action Sam Giles & Dean Shaw, Microsoft; Eric Lo, Nexcom; Rick Peng, Moxa; Billion Wan, TCIT Recorded: Dec 14 2017 46 mins
    Industry 4.0, Smart Factories & Digital Transformation. The promise of a revolution in the way we build things in the future, a promise backed largely by the fluid exchange of data from previously disconnected factory components, but where is the evidence of this revolution? Join Microsoft and our partners to see first hand how real solutions are delivering real outcomes for businesses in the Manufacturing sector.
  • 【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー
    【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー FireEye Japan Recorded: Dec 14 2017 41 mins

    昨今のセキュリティ攻撃は、ますます高度化が進んでいます。企業、組織のお客様がこうした脅威に対抗するべく、ファイア・アイのWeb脅威対策製品「FireEye NX」はどんどん進化をしています。


    つきましては、下記の通り、FireEye NXの最新機能で何ができるようになり、どういった脅威対策が可能になるのかを紹介するWebセミナーを開催いたします。

    本セミナーでは、ファイア・アイの会社概要、サンドボックス技術について、FireEye NXの基本機能を紹介した後、最新機能をわかりやすく解説します。標的型攻撃対策のポイントやファイア・アイの優位性などもお話させていただきますので、新たにセキュリティ担当になられた方、最新の脅威対策について知りたい方に最適な内容となっています。ふるってご参加ください。
  • Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Research
    Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Research James Curtis, Senior Analyst, Data Platforms & Analytics, 451 Research Recorded: Dec 13 2017 50 mins
    Data autonomy goes hand-in-hand with building a powerful, multi-cloud data management strategy. Enterprises today are rethinking their data management tactics in light of what they can achieve with the correct usage of the public clouds. In this on-demand webcast, guest speaker James Curtis, Senior Analyst, Data Platforms & Analytics, 451 Research, discussed how enterprises are getting valuable data autonomy and building game-changing multi-cloud database management strategies.
  • Is Your Business Moving to the Cloud and Modern App Development?
    Is Your Business Moving to the Cloud and Modern App Development? Garrick Sobeski, Senior System Engineer, Citrix & Nihal Mirashi, Senior Marketing Manager, Citrix Recorded: Dec 13 2017 50 mins
    Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.

    Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?

    If you answered yes to any of these questions, then this webinar is for you! 

    Join this webinar and learn:

    • Why customers are not convinced that F5 is the right choice for them
    • Common enterprise application delivery use cases
    • Why Citrix NetScaler is gaining popularity amongst former F5 customers
  • Creating a Network Automation Framework for Self-Service Data Centers
    Creating a Network Automation Framework for Self-Service Data Centers Luke Short, Cloud Consultant, Automation Practice, Red Hat Recorded: Dec 13 2017 47 mins
    As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.

    In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:

    - Develop an automation strategy that includes network discovery and configuration auditing.
    - Adopt a holistic approach to configuration and workload management.
    - Automate new network device provisioning.
    - Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
    - Provide a better way for teams to deploy and manage their own workloads.
  • IoT Security Overview: Threat Detection vs. IoT Device Protection
    IoT Security Overview: Threat Detection vs. IoT Device Protection Keao Caindec, Vice President of Marketing at Mocana Corporation Recorded: Dec 13 2017 22 mins
    Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
  • Building a Big Data Fabric with a Next Generation Data Platform
    Building a Big Data Fabric with a Next Generation Data Platform Noel Yuhanna, Forrester, Jacque Istok, Pivotal Recorded: Dec 13 2017 57 mins
    For more than 25 years IT organizations have spent many cycles building enterprise data warehouses, but both speed to market and high cost has left people continually searching for a better way. Over the last 10 years, many found an answer with Hadoop, but the inability to recruit skilled resources, combined with common enterprise necessities such as ANSI compliant SQL, security and the overall complexity has Hadoop relegated to an inexpensive, but scalable data repository.

    Join Noel Yuhanna from Forrester and Pivotal’s Jacque Istok for an interactive discussion about the most recent data architecture evolution; the Big Data Fabric. During this webinar you will learn:

    What a Big Data Fabric is
    - How does it leverage your existing investments in enterprise data warehouses, data marts, cloud analytics, and Hadoop clusters?
    How to leverage your team’s expertise to build a Big Data Fabric
    - What skills should you be investing in to continue evolving with the market?
    When is it appropriate for an organization to move to a Big Data Fabric
    - Can you afford to divert from your existing path? Can you afford not to?
    The skills and technologies that will ease the move to this new architecture
    - What bets can you place that will keep you moving forward?