Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.
In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
No matter what level of modernization you are evaluating, any effort should start with a solid foundation.
A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.
Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.
Additionally, CloudCheckr makes recommendations based on analytics to better utilize resource, upgrade or downgrade instances and more. The results are that customers typically report saving 30% on their cloud spend.
In this webinar, users will experience the CloudCheckr app in a live demo, with focus on:
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.
Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.
Attendees will learn how each deployment model overcomes these challenge:
1. Ease of initial evaluation and testing
2. How to transition to hyperconvergence while having current servers
3. How to avoid hypervisor lock-in
4. How to build a future proof hyperconverged architecture
Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.
In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.
We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.
It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.
To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?
Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.
In this webinar, you will come to understand:
•Implications of security due to SD-WAN-enabled direct Internet access
•Operational and financial benefits of virtualizing the full branch
•How SD-WAN is only one part of your next-generation branch and WAN architecture
The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.
Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.
This webinar will address:
Solutions, support & decisions
40G or 25G lanes?
Preterminated vs field-terminated cables
Duplex or Parallel transmissions
Singlemode, multimode or wideband multimode fiber?
Attendees with earn one BICSI Continuing Education Credit for attending.
The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.
Among topics discussed will be:
- Present and future impact of Software Defined technologies on IT (challenges and opportunities)
- How Software-Defined is enabling the digital transformation
- Best practices and recommendation on adopting software-defined technologies with the future in mind.
This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.
You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
Other topics will include:
•Identifying gaps in your strategy
•How to prioritise remediation and investments
•How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.
In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.
Learn how to:
- Use Azure public cloud for big data
- Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
- Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
With the increasing demand for BYOD in the workplace, many organizations are adopting Mobile Device Management (MDM) solutions. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortunately, Cloud Access Security Brokers (CASBs), like Bitglass, offer an easy-to-use alternative for securing corporate data stored in public cloud applications on both managed and unmanaged devices.
Join this interactive webinar session to learn:
- The challenges companies face while deploying MDM
- Alternative solutions used to secure employee-owned devices without agents
Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View
As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.
And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.
During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.
“When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
Learn how to instantly clone and recover very large databases in the data center or in the cloud.
The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.
In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s ThinkSystem servers and infrastructure based on Intel® Xeon® Scalable processors. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
The problem with data centers is that they generate a lot of events – from low-level disk warnings to critical network issues to service-level failures. While you can create manual rules to filter out some of the noise, this often isn’t enough. How do you navigate this flood of events and prioritize the ones that truly matter? How do you relate these critical events to the same core issue, and ensure everyone has the same understanding of the impacted service, relative priority and likely root cause?
Watch this webinar to learn how you can use Splunk IT Service Intelligence and machine learning to:
- Monitor real-time data and be alerted when an anomaly occurs
- Automatically correlate data to generate highly qualified information, so you can take fast action
- Enable users to investigate with context, priority and importance, so they are empowered to take actions faster
Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.
To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.
Join us for this to learn:
- 6 reasons development should own security
- Best practices to employing Shift-Left security
- How to deploy secure apps at DevOps speed
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
The recent ransomware outbreaks have destabilized business operations around the world.
The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.
How can you proactively prepare for such threats?
Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.
This session will include live demonstrations, and will cover best practices in the following areas:
• Security fundamentals – the importance of consistent blocking/tackling and security hygiene
• Posture assessment – establishing end-to-end visibility of potential ransomware activity
• Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
• Threat intelligence – identifying C2, file hashes and other ransomware IoCs
• Automation and orchestration – integrating a layered security architecture to drive to faster decisions
• Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
Analytics risks can keep you up at night. What if…
· We make a big investment and don’t break even?
· Management doesn’t trust the results?
· Analysts cross data privacy boundaries?
What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.
In this presentation, you will learn:
· What causes most analytics failures
· How you can diminish risk and maximize returns through strong analytics process
· Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.
These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.
As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
Performance is often a key factor in choosing big data platforms. Over the past few years, Apache Spark has seen rapid adoption by enterprises, making it the de facto data processing engine for its performance and ease of use.
Since starting the Spark project, our team at Databricks has been focusing on accelerating innovation by building the most performant and optimized Unified Analytics Platform for the cloud. Join Reynold Xin, Co-founder and Chief Architect of Databricks as he discusses the results of our benchmark (using TPC-DS industry standard requirements) comparing the Databricks Runtime (which includes Apache Spark and our DBIO accelerator module) with vanilla open source Spark in the cloud and how these performance gains can have a meaningful impact on your TCO for managing Spark.
This webinar covers:
Differences between open source Spark and Databricks Runtime.
Details on the benchmark including hardware configuration, dataset, etc.
Summary of the benchmark results which reveal performance gains by up to 5x over open source Spark and other big data engines.
A live demo comparing processing speeds of Databricks Runtime vs. open source Spark.
Special Announcement: We will also announce an experimental feature as part of the webinar that aims at drastically speeding up your workloads even more. Be the first to see this feature in action. Register today!
Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?
See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
The Cloud Economy represents a drastic change in how enterprises perform computing. But it's not totally unprecedented. Simultaneously with the advent of the Cloud First mentality is the Gig Economy.
People don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't automatically reserve a hotel on a trip. They can use AirBnB. What lessons can we learn from the Gig Economy that apply to the Cloud Economy? What pitfalls can we avoid?
During this webinar we will discuss:
- Financial savings promised by the new economic model
- New challenges presented
- How to mitigate against such challenges
Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.
New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?
Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:
• The global perspective of the current state of web application vulnerabilities
• Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
• Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
• Remediation strategies to help defend against web apps attacks
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
Although vSAN provides a means for customers to have block-based storage, many customers still have a requirement for native file services. Join this session to learn about NetApp’s complimentary software solution, which provides file services for a vSAN deployment.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Healthcare organizations today are struggling with manual audit and reporting of patient data access records. The process is time-consuming, and although it helps meeting compliance needs, it is ineffective in identifying real-threats. Securonix Patient Data Analytics solution offers a machine learning based solution to help organizations automatically establish a baseline for normal patient and employee activities and identify malicious patterns. The tool reduces manual effort, helps identify real threats, and assists with compliance reporting.
We will cover:
- Applying identity context and behavior analytics to EMR audit logs
- Visualization, search and dashboard capabilities for investigation and reporting
- Real world customer case studies highlighting improved threat detection and audit efficiency
- Demo of the Securonix Patient data solution
Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.
This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.
David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:
- Natural language processing: finding keywords in relevant context within unstructured text
- Statistical NLP: sentiment analysis via supervised machine learning
- Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
- Graph analysis: finding actions outside the usual or expected network of people
- Heuristic rules: finding suspect actions based on past schemes or external datasets
- Topic modeling: highlighting use of keywords outside an expected context
- Anomaly detection: Fully unsupervised ranking of unusual behavior
Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
Intelligent application technology allows you to build apps with powerful algorithms, across platforms, with just a few lines of code. The answer lies in your application's architecture.
Join Pradeep Menon, Microsoft Data Solution Architect, and Karthik Rajasekharan, Microsoft Azure Product Marketing Director to learn:
- The different reference architectures and how to integrate these services into your applications immediately.
- A hands-on approach to implementing Cognitive Services on Azure
- About the next generation of application development and deployment
There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?
- Should your software emulate a data scientist?
- Learn about the power of data visualizations.
- Learn about creating value from disperse data sets.
Many organizations are implementing or assessing Skype for Business. Adoption of the technology is critical to success and delivering ROI, but how can this be measured and improved? This webinar will show how.