Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Symantec Cloud Workload Protection Product Demo Video Symantec Cloud Workload Protection Product Demo Video Symantec Recorded: Feb 24 2017 2 mins
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Comment protéger et surveiller vos données sensibles en tous lieux Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 24 2017 44 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Alex Shteynberg, Technical Solutions Professional, Microsoft Recorded: Feb 23 2017 19 mins
    Secure your IT infrastructure on-premises and in the cloud through early detection via effective threat intelligence. Microsoft Azure dashboards/glass pane provides simple yet holistic views into what's happening, with the intent of detection-to-mitigation. We'll take you through ‘a born in the cloud approach’ to IT backend infrastructure security that has a high time-to-value, with best practices.

    Join this webcast to learn how to:
    - Collect threat intelligence with good examples such as Malicious IPs and drill down to specific machines to take action/mitigation
    - Leverage Baseline Assessments, a powerful method, that leverages 180 points of security configurations to harden your servers
    - Understand how to bring the power of analytics to configure alerts with a consolidated view
  • Cloud Security: From Strategy to Incident Response Cloud Security: From Strategy to Incident Response Ondrej Krehel, CEO/Founder, LIFARS and Michael Landewe, Co-Founder, Avanan Recorded: Feb 23 2017 49 mins
    Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure.

    You might think your organization's cloud security posture is strong, but are there gaps you just don't know about? And if there were, how you would identify and remediate them? As companies continue to move to the cloud, it's becoming ever more important to have a multi-layered cybersecurity program in place.

    This webinar will address some of the most important trends in SaaS security, what it takes to be successful, and what you must do now to secure your cloud infrastructure and applications.

    Attendees will learn about:
    · The challenges in protecting users and data in the cloud.
    · How the cloud makes it difficult to identify and remediate security events.
    · What it takes to implement a successful SaaS security program.
    · How a multi-vendor, defense-in-depth approach can further secure their operations.
    · Why having an incident response plan for cloud security incidents is so important.
    · A new cloud security assessment solution to combat the SaaS security issues within their organization.
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Recorded: Feb 23 2017 53 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • Making your Data Come Together with IoT Intelligence Making your Data Come Together with IoT Intelligence Joshua Davis, MTC Cloud Solutions Architect Recorded: Feb 23 2017 51 mins
    The Internet of Things (IoT) starts with your things—the things that matter most to your business. IoT is about making your data come together in new ways. Tap into how data works for your business with IoT dashboards. Uncover actionable intelligence and modernize how you do business. See how IoT is revolutionizing businesses with field service organizations and driving business and digital transformation.

    Join this webcast to:
    - Learn why your business needs an IoT strategy
    - Understand how to connect and scale your IoT with efficiency
    - Analyze and act on untapped data
    - Integrate IoT with your business processes
    - Drive efficiency and scale in field services using IoT
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Recorded: Feb 23 2017 35 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Varun Santosh, Manager, Technical Marketing at VeloCloud Networks Recorded: Feb 23 2017 27 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Recorded: Feb 23 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • How Smartsheet operationalized Apache Spark with Databricks How Smartsheet operationalized Apache Spark with Databricks Francis Lau, Senior Director, Product Intelligence at Smartsheet Recorded: Feb 23 2017 61 mins
    Apache Spark is red hot, but without the compulsory skillsets, it can be a challenge to operationalize — making it difficult to build a robust production data pipeline that business users and data scientists across your company can use to unearth insights.

    Smartsheet is the world’s leading SaaS platform for managing and automating collaborative work. With over 90,000 companies and millions of users, it helps teams get work done ranging from managing simple task lists to orchestrating the largest sporting events and construction projects.

    In this webinar, you will learn how Smartsheet uses Databricks to overcome the complexities of Spark to build their own analysis platform that enables self-service insights at will, scale, and speed to better understand their customers’ diverse use cases. They will share valuable patterns and lessons learned in both technical and adoption areas to show how they achieved this, including:

    How to build a robust metadata-driven data pipeline that processes application and business systems data to provide a 360 view of customers and to drive smarter business systems integrations.
    How to provide an intuitive and valuable “pyramid” of datasets usable by both technical and business users.
    Their roll-out approach and materials used for company-wide adoption allowing users to go from zero to insights with Spark and Databricks in minutes.
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Recorded: Feb 23 2017 62 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • Reduce the Complexity of OpenStack Neutron Reduce the Complexity of OpenStack Neutron Charlie Gutierrez - Midokura, Frank Rego - SUSE Recorded: Feb 23 2017 37 mins
    Midokura’s award-winning Midokura Enterprise Management (MEM) technology provides a software layer directly within existing physical network hardware, turning physical machines into a virtual platform that can scale to hundreds of thousands of virtual ports. The MidoNet integration with SUSE OpenStack Cloud provides an integrated solution for rapid OpenStack deployment. Now, customers can enjoy the very best possible deployment experience with leading technology from Midokura and SUSE, built to scale right out of the box.
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap Recorded: Feb 23 2017 59 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • Evaluating Skype for Business Evaluating Skype for Business John Hand - Global Microsoft Alliance Director | Dave Bottomley - UC Solutions Engineer Recorded: Feb 23 2017 62 mins
    Skype for Business is transforming the UC landscape, but how can organizations effectively evaluate Microsoft's UC offering? This session will look at the key steps to make an effective evaluation of Skype for Business.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic Recorded: Feb 23 2017 57 mins
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Calculation Tools & ICT Insights on energy saving:SAT-S, Save@work, GreenSpector Thomas Corvaisier (Greenspector), Frédéric Croisson (Deloitte), Karen Robinson (Save@Work) Recorded: Feb 23 2017 64 mins
    The 4th ICTFOOTPRINT free webinar has crucial information on ICT Calculation tools and Sustainable ICT insights on energy savings, on 23rd February 2017, 15:00 CET.

    Thomas Corvaisier (CEO of GREENSPECTOR) will introduce the concept of software eco-design, and tell us how it may help lowering the consumption of IT resources while preserving performance and user experience.

    Frédéric Croisson, from Deloitte Sustainability, will showcase the ICTFOOTPRINT.eu Self-Assessment Tool for Services (SAT-S), a useful, quick and easy-to-use tool that calculates the carbon footprint of your ICT services. The tool helps users not only to make informed decisions about how to make an ICT service sustainable, but also discover the impact of ICT devices & activities in terms of Green House Gas emissions and primary energy consumption. (SAT-S will be launched very soon).

    Karen Robinson will share some sustainable ICT practices and introduce the save@work initiative, which encourages public sector employee’s to come together in teams to reduce the energy consumption of their building by making small changes to their everyday energy consuming behaviours. Adding an element of competition to the project has been a significant driver in encouraging teams to really examine and challenge those unconscious energy consuming behaviours. The scale of working in a large office has also highlighted those practices that on their own seem to make almost insignificant savings but when applied across an office of over 300 people, have a very different impact.

    The webinar will be moderated by Silvana Muscella, Project Coordinator of ICTFOOTPRINT.eu and CEO of Trust-IT Services. Silvana has a broad experience in ICT sector, focusing on high-level strategy building, the delivery of multichannel platforms, business acquisition & development & strategic marketing for international clients.
  • Cyberangriffe verhindern - sensible Daten schützen Cyberangriffe verhindern - sensible Daten schützen Thomas Hemker, Matthias Senft Recorded: Feb 23 2017 59 mins
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 55 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Best Practices for Combining DevOps, Cloud and IaaS on Azure Best Practices for Combining DevOps, Cloud and IaaS on Azure David Hansford, Technical Solutions Professional, Microsoft Recorded: Feb 22 2017 37 mins
    In today's day and age, it's more important than ever to work at the forefront of cutting edge cloud technologies and continue to inspire and empower your IT organizations.

    Microsoft Azure IaaS (Infrastructure-as-a-Service) empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

    Join this webcast to learn how to:
    - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
    - Develop cutting edge “born in the cloud” applications
    - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment
  • SQL Server 2016: Just a Few of Our DBA's Favorite Things SQL Server 2016: Just a Few of Our DBA's Favorite Things Rodney Landrum, Consulting Services Manager, Ntirety Recorded: Feb 22 2017 59 mins
    Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates his favorite new features of the latest Microsoft SQL Server 2016 Service Pack 1.

    During the webinar, Rodney will touch on the following:

    • A demo of his favorite new features in SQL Server 2016 and SP1 including:
    o Query Store
    o Database Cloning
    o Dynamic Data Masking
    o Create or Alter
    • A review of Enterprise features that are now available in standard edition
    • New information in Dynamic Management Views and SQL Error Log that will make your DBAs job easier.
  • Four Ways to Simplify Database Management Four Ways to Simplify Database Management Mike Kelly, CTO SelectStar Recorded: Feb 22 2017 27 mins
    If there’s anything as important as making sure an app is running, it’s making sure the data underneath it is available as well. But the rapid changes in database technology and the quick adoption of cloud infrastructure have made that task extremely challenging for most database administrators and DevOps teams.

    In just 30 minutes, you'll learn:

    - How to monitor all database types (including SQL, NoSQL, cloud) in a single tool

    - How to get up to speed quickly on new database technologies without adding experts to your team

    - The fastest way to get an assessment of your organization’s overall database health

    - Simple tools that will drastically reduce the time you spend on database and infrastructure administration
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Recorded: Feb 22 2017 34 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • Going Global with In-Memory Data Going Global with In-Memory Data Viktor Gamov, Senior Solution Architect Hazelcast, Michael Hilmen,Solutions Architect, Solace Feb 28 2017 3:00 pm UTC 60 mins
    Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
    This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
    In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.
  • Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Matt Serna, Manager, Industry Marketing; Jonathan Ben-Hamou, Enterprise Systems Architect, ICOE Group Feb 28 2017 4:00 pm UTC 60 mins
    As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.

    Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.

    Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.

    Attendees will learn:

    - What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
    - How to build and manage APIs in a way that improves health data security and increases IT agility.​
    - How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
  • Top 10 Business Intelligence Trends for 2017 Top 10 Business Intelligence Trends for 2017 Francois Ajenstat, Chief Product Officer, Dan Jewett VP, Product Management, and Josh Parenteau, Product Manager Feb 28 2017 4:00 pm UTC 60 mins
    Every year at Tableau, we look back at the previous 12 months and evaluate the new ways technology is changing the face of business decisions. That discussion drives our list of top business intelligence trends for the year.

    In this webinar, explore:

    •Emerging trends in business intelligence
    •Tableau experts' take on the changing BI landscape
    •Considerations for your 2017 business intelligence strategy
  • Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Satya Nadella, CEO, Microsoft; Curt Kolcun, VP, US Public Sector Feb 28 2017 5:00 pm UTC 15 mins
    Microsoft’s CEO, Satya Nadella sits down with Curt Kolcun, VP US public Sector about digital transformation and the changing landscape in the United States.
  • Clarifying the Cloud: Licensing Oracle in the Skytap Cloud Clarifying the Cloud: Licensing Oracle in the Skytap Cloud Nathan Biggs; House of Brick Technologies, CEO & Jeff Schroeder; Skytap, Cloud Solutions Architect Feb 28 2017 5:00 pm UTC 60 mins
    There is a lot of confusion around Oracle licensing, especially in virtualized or Cloud environments. In this session, we will provide an overview of the Skytap Cloud, and what Skytap has done to facilitate Oracle license-compliance in their cloud. We will provide education on the principles of Oracle licensing, and information on how those principles are applied to workloads running in the Skytap Cloud.
  • Key Considerations for Migrating Graphics Workloads to the Cloud Key Considerations for Migrating Graphics Workloads to the Cloud Alex Herrera, Sr. Analyst, Jon Peddie Research & Ziad Lammam, Teradici Feb 28 2017 6:00 pm UTC 45 mins
    Moving to “The Cloud” is becoming a norm these days as it now provides better security and flexibility that enterprises are looking for in today’s ever growing “Big Data” landscape! Organizations with graphics workloads and interactive applications are looking for ways to consolidate their workstations to decrease CapEx and OpEx while ensuring data security for a disperse and mobile workforce.

    Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will talk about on how enterprises can collocate their graphics intensive applications and workstations in the cloud to increase productivity and enhance collaborative working environment for creative professionals and design engineers in various verticals like: Media & Entertainment, Automotive & Manufacturing, Architecture, Engineering, Construction.

    This webinar will introduce key considerations in moving high-performance workstation to the cloud and provide valuable insights including:

    • Physical workstations vs. virtual workstations in the cloud
    • Choosing among cloud workstations - Private, Public or Hybrid
    • What to consider when moving to the cloud

    Teradici’s CTO Randy Groves will share how Cloud Access Software and PCoIP technology can enable you to securely migrate graphics intensive workloads and applications to the cloud while providing a seamless and “workstation-like” end user experience.

    Those who attend the webinar will receive a copy of the slide deck.

    Q&A will follow at the end of the session.
  • Doing More With Symantec Control Compliance Suite Doing More With Symantec Control Compliance Suite Anand Visvanathan, Principal Product Manager, Symantec Feb 28 2017 6:00 pm UTC 60 mins
    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    Register today
  • How Data Protection is Changing in the Modern (Hybrid Cloud) World How Data Protection is Changing in the Modern (Hybrid Cloud) World Seth Bobroff, Dir. Marketing, Western Digital; Arjan van Proosdij, Global Solutions Marketing, Veritas Feb 28 2017 6:00 pm UTC 30 mins
    Times they keep a-changin'. With unrelenting growth in big data, remote workforces becoming more prevalent and data being scattered across multiple locations, companies are forced to modernize their backup solutions to provide better protection and operational efficiency.

    In this webinar members of Veritas and Western Digital will explore the latest data protection trends and learn how a unified backup and recovery solution can reduce complexity, enable you to protect, locate, and recover more information in less time, and keep you ahead of exponential data growth.

    Times they keep a-changin', but that doesn't mean you have to be left behind.
  • Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Bich Le, Co-founder and Chief Architect, Platform9 Feb 28 2017 6:00 pm UTC 45 mins
    Container technology is hot and evolving every day by leaps and bounds. Just why are containers so attractive and how are they different from VMs? To add to the confusion, complex container environments need orchestration solutions, such as Kubernetes, to be managed effectively. There are a few different ways to deploy these solutions, each with their own drawbacks and benefits. In this BrightTALK session, we'll take a look at containers, container orchestration, and walk through a real-world application that shows why containers are leading the way.
  • Spring Boot 1.5 and Pivotal Cloud Foundry Spring Boot 1.5 and Pivotal Cloud Foundry Pieter Humphrey, Pivotal and Madhura Bhave, Pivotal Feb 28 2017 6:00 pm UTC 60 mins
    Spring Boot and Pivotal Cloud Foundry users won’t want to miss Spring team’s Madhura Bhave and Pieter Humphrey as they tour through the Spring Boot 1.5 release.

    Inspired in part by cool community open source work from Ordina JWorks, one of the hottest new directions that the two teams are working on is the integration of Spring Boot Actuators with Pivotal Cloud Foundry.

    Attendees will be given direct linkage to product management - this is your chance to influence future integration direction! You’ll also walk away understanding all the highlights of the Spring Boot 1.5 release, including exciting improvements in Kafka and JPA support.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Secure Digital Transformation: What’s New for Winter 2017 Secure Digital Transformation: What’s New for Winter 2017 Sherif Messiha Feb 28 2017 6:30 pm UTC 60 mins
    In this webinar, we ask one of our senior consultants to weigh-in on the newest changes and updates to the Enterprise Mobility + Security suite of Microsoft products, and how those changes can affect your business.
  • From Download to Engagement: Delivering the Right Mobile Apps at the Right Time From Download to Engagement: Delivering the Right Mobile Apps at the Right Time Mahdi Alirezaie, Technical Solutions Professional, Microsoft Corporation Feb 28 2017 7:00 pm UTC 60 mins
    Whether you’re a mobile-only startup looking to turn early adopters into evangelists or a multi-million dollar enterprise mobilizing your workforce, you need to ship the right apps to the right customer at the right time. You need users to use your apps, turning downloaders into engaged users. To win mobile users’ loyalty, you must continuously ship high quality software and continuously listen and learn from your users, giving them features before they know they want them. Mobile isn’t just build, release, and done, it’s a continuous cycle. In this webinar, you’ll see how HockeyApp helps you track real user behavior, understand how your apps behave in the wild, and easily distribute new apps to your beta users.

    You'll learn how to:
    - Capture usage data, analytics, and crash reports to identify trends
    - Get in-app feedback and respond to your users
    - Use HockeyApp to distribute your apps to various groups, including beta users and internal testers
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Feb 28 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Mar 1 2017 5:00 am UTC 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Network Security From the Cloud: the New Frontier  Network Security From the Cloud: the New Frontier  Mike Rothman, Analyst and President at Securosis and Ken Ammon, Chief Strategy & Technology Officer at OPĀQ Networks Mar 1 2017 4:00 pm UTC 60 mins
    By 2020, 68 percent of the cloud workloads will be in public cloud.The combination of cloud computing, mobility, and IoT is disrupting traditional bolt-on network security methods and requires a new approach to ensure corporate data and systems are protected, wherever they happen to be.

    The reality is that you can't possibly scale the management of infinite perimeters without breaking down longstanding barriers between network and security management. More and more organizations are no longer thinking in terms of a single, monolithic network. Instead, they are implementing application, site and user-specific networks, leveraging policies specifically designed to meet the needs of its constituent. Controls and policies are being defined within the network, using software defined networking technologies to route traffic efficiently and layer security services where necessary.

    Join Mike and Ken to see what steps organizations are taking to eliminate the complexity of today's traditional network security approach, more easily adapt to business changes, and tighten the reins on security control. 
  • Microsoft CISO: Cybersecurity in Action Microsoft CISO: Cybersecurity in Action Bret Arsenault, Chief Information Security Officer, Microsoft Mar 1 2017 4:00 pm UTC 30 mins
    Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.

    Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
  • Next-Generation Hyperconverged Solution for Efficient and Available IT Next-Generation Hyperconverged Solution for Efficient and Available IT Dinesh Singh, Solutions Marketing Manager, Hitachi Data Systems, John Nicholson, Senior Technical Marketing Manager, VMware Mar 1 2017 5:00 pm UTC 60 mins
    Want to simplify your data center’s complexity without creating management silos? Challenged with running IT on a limited budget? Get an overview of Hitachi’s next-generation hyperconverged solution, powered by VMware vSAN. Learn how this power couple introduces advanced automation and enterprise availability for core and edge applications.

    Join us for a live webcast on March 1, 2017. Hitachi Data Systems and VMware will discuss common challenges of legacy IT systems and how you can improve efficiency with a reliable hyperconverged solution.
  • Multicloud Strategies for Greater Business Impact Multicloud Strategies for Greater Business Impact Enrico Fuiano Sr. Solutions Marketing Manager – Cisco Mar 1 2017 5:00 pm UTC 60 mins
    Cisco has developed the Cisco Business Cloud Advisor (BCA) framework in collaboration with IDC. We analyzed over 6,100 organizations across 31 countries. Cisco BCA helps you continuously improve your multicloud environment following proven and vendor agnostic methodologies. The combination of BCA, our vast cloud portfolio and our rich partner ecosystem can fuel your digital transformation journey.  
  • Operatonal Simplicity in the Datacenter with Containers Operatonal Simplicity in the Datacenter with Containers Cody Hill, Lead Systems Engineer Platform 9 and Ashok Rajagopalan, Head of Product Datera Mar 1 2017 6:00 pm UTC 60 mins
    Join Platform9 and Datera to learn how their software solutions can provide the DevOps agility, and operational simplicity of the cloud for containers. Mainstream adoption of stateful applications have been foundational for containerized applications to get widely deployed.

    With Datera Elastic Data Fabric and Platform9 Managed Kubernetes, customers can manage any application on Containers.

    You will learn:

    How to automate provisioning
    How this solution simplifies operations and management
    How to save costs with elasticity
  • Testing at the Edges Testing at the Edges Franklin Webber, Training and Technical Content Lead Mar 1 2017 6:00 pm UTC 60 mins
    As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.

    In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.

    Join us to learn:
    - How to test recipes that are powered by search and data bags
    - How to test resource guards
    - How to test helper methods

    Who should attend:
    Chef users with experience using ChefSpec, InSpec, and Test Kitchen
  • How Digital Transformation is Accelerating High Performing Supply Chains How Digital Transformation is Accelerating High Performing Supply Chains Barbara Giamanco, Donniel Schulman & Brett Cooksey Mar 1 2017 7:00 pm UTC 60 mins
    According to Accenture, every high performing supply chain is a digital supply chain.

    They go on to say that, “Digital technology is disrupting traditional operations and now every business is a digital business. The impact on supply chain management is particularly great. Businesses cannot unlock the full potential of digital without reinventing their supply chain strategy.”

    It's time to learn how to reinvent your organization's supply chain to unlock even more business potential.

    Join this webcast to:
    - Learn how the modern buyer is causing a transformation of the traditional supply chain
    - See how digital technology can drive organizational change
    - Understand how disruptive technologies—social media, mobile, cloud and analytics—cause the emergence of a digital supply network
    - Appreciate the business advantages of a digital supply chain
    - Recognize the difference between an enhanced supply chain verses a re-invented network

    This webcast is part of our Microsoft Dynamics 365: Business Applications webcast series. Sign up for this session, or the entire series today!
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] Gonen Stein, CloudEndure and Andy Tzou, Google Mar 2 2017 4:00 pm UTC 30 mins
    Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud without the technical, performance, or financial challenges that normally strain IT resources. They'll dive into the technology behind the new automated migration service, which utilizes CloudEndure’s continuous, block-level replication, automated machine conversion, and application stack orchestration.

    This video will provide an overview of how Google and CloudEndure have partnered to create a self-service VM migration service. This service enables you to move your existing server infrastructure to Google Cloud Platform at no cost.

    Have you been waiting for just the right moment to migrate to the cloud? Have your questions answered about how companies are using the new automated migration service to simply and easily move to the cloud.
  • Two Clicks to Find and Fix Data Quality Issues in Salesforce Two Clicks to Find and Fix Data Quality Issues in Salesforce Donal Dunne, Jason Medd Mar 2 2017 5:00 pm UTC 30 mins
    Contact and lead records enter Salesforce from various sources, but bad data is costly, and leaves you unable to communicate with your customers. While many departments have different needs they are typically using the same contact data – And each one has their own approach to fixing bad data.

    Bad data in your Salesforce environment impacts your ability to;
    •Communicate with customers
    •Identify cross sell and upsell opportunities
    •Plan and align territories
    •Score and route leads
    •Bill customers

    To fix these and other issues caused by bad data it is imperative that you implement the right tools and processes to understand the scale of the problem and fix it.

    Informatica Cloud Data Quality Radar quickly identifies, fixes, and monitors data quality problems in your Salesforce environment. Attend this short webinar to hear how you can:

    •Easily identify and visualize data quality issues within your applications – and drive increased confidence in data
    •Automatically fix the most impactful data quality problems sooner - while reducing reliance on IT for data quality related activities
    •Continuously monitor data quality across source systems