Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Co dalej z moim środowiskiem VDP?
    Co dalej z moim środowiskiem VDP? Daniel Olkowski, DellEMC Recorded: Apr 28 2017 51 mins
    VMware ogłosił koniec rozwoju rozwiązania vSphere Data Protection (VDP) do backupu / odtwarzania środowisk VMware.
    W tym kontekście pojawiają się pytania:
    •Jak długo mogę korzystać z VDP?
    •Kiedy kończy się wsparcie?
    •Czy mogę zmigrować moje środowisko VDP do Avamara (pełnej wersji VDP)?
    •Jakie są koszty?
    •Jak technicznie wygląda migracja?
    •Czy są inne opcje?
    Zapraszam na krótką, 30 minutową sesję w trakcie której przedyskutujemy
    •Szczegóły dotyczące VDP i ogłoszenia VMware
    •Możliwości dalszego użytkowania VDP
    •Techniczne i komercyjne szczegóły dotyczące migracji
  • Inside Server Evolution and Spending: Insights from 451 Research
    Inside Server Evolution and Spending: Insights from 451 Research Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure Recorded: Apr 27 2017 60 mins
    As workload migration to public cloud continues, IT organizations face a wealth of challenges as they determine the most effective compute ecosystem for their needs. Server technologies are evolving quickly—from converged to hyperconverged to composable—and finding the right fit for on-premises workloads is now a critical component of infrastructure strategies. This webinar will explore the drivers behind enterprise server purchases and how they are planning for the future.

    Join Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure, for this interactive webinar highlighting analysis of customer spending and adoption trends from 451 Research’s latest survey of IT buyers.

    During the webinar, learn:

    -Drivers of today’s purchases of servers and converged infrastructure
    -Key customer pain points and objectives for servers and converged infrastructure
    -How cloud migration is impacting spending on servers and converged infrastructure
    -Where hyperconverged fits into new infrastructure deployments
    -How vendors are positioning themselves to win in this evolving compute market
  • How to “Future Proof” Data Protection for Organizational Resilience
    How to “Future Proof” Data Protection for Organizational Resilience Storage Switzerland, Carbonite Recorded: Apr 27 2017 61 mins
    Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case
    The NIST Cybersecurity Framework (CSF): A Federal Use Case Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Apr 27 2017 51 mins
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware
    RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware Bil Harmer, Strategist, Office of the CISO, Zscaler Recorded: Apr 27 2017 61 mins
    Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
    Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?

    Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.

    Bil will also cover:

    - How ransomware has evolved
    - Lessons learned from recent attacks
    - Why cloud sandboxing is so important
    - Tips for mitigating ransomware

    For more information about Zscaler, go to www.zscaler.com

    Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
  • Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack
    Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack Michael Landewe Recorded: Apr 27 2017 43 mins
    Every day, we test popular SaaS like Office365 and GSuite against the latest zero-day threats.
    In this webinar we will answer the questions that CISOs regularly ask:

    • Which SaaS offer the best built-in protection?
    • Is it worth paying more for Microsoft's Advanced Threat Protection?
    • Is there a difference in protection between email and file sharing?
    • Should I scan both inbound and outbound? What about internal email and sharing?
    • How do I add more security if I need it?

    Avanan's Cloud Security Platform is uniquely positioned to understand the security profile of most every cloud provider. Integrated with all major SaaS and partnering with over 70 security vendors, Avanan constantly monitors for the latests security threats and measures the risk profile of each cloud provider.

    We will discuss recent attacks and the speed of each cloud vendor's response. We will compare each SaaS window of vulnerability and adaptation to the changing threat vectors.

    Before and after the webinar, real time vulnerability information will be available at https://avanan.com/gauge
  • Breaking L2 Barriers for Storage Clusters
    Breaking L2 Barriers for Storage Clusters Jacob Smith, SVP, Engagement at Packet and Ashok Rajagopalan, Head of Product at Datera Recorded: Apr 27 2017 40 mins
    Discover how to create flexible, API-focused scale-out storage that supports today’s demanding enterprise applications. Join the live webinar from Datera and Packet.net for an advanced customer case study and technical deep dive.

    Viewers will get insights on how elastic block storage is evolving in on-premises clouds, challenges with current storage solutions scaling beyond a rack, and data center alternatives for service providers and cloud builders. Learn about Datera’s unique solution to scale easily across the data center and hear from Packet.net on how they are operationalizing Datera Elastic Block Storage.

    This insightful webinar is designed for service providers and data center professionals chartered with providing a high performance, consistent and profitable elastic block storage.
  • Your Are Compliant But Are You Secure?
    Your Are Compliant But Are You Secure? Pravin Goyal Recorded: Apr 27 2017 5 mins
    Pravin Goyal discusses differences between compliance and security
  • Overview & Demo: PowerCenter, Data Quality, Data Integration Hub 10.2 Unveiled
    Overview & Demo: PowerCenter, Data Quality, Data Integration Hub 10.2 Unveiled Ash Parikh, VP Product Marketing, Awez Syed, VP DI and Big Data, and Thomas Brence, Dir. Product Marketing, Informatica Recorded: Apr 27 2017 62 mins
    You want to transform your business, but your data is spread across a multitude of on-premise and cloud systems. How are you going to organize and manage it all? And how do you even know what data you have and if it’s clean and reliable? We have your answers.

    Discover how Informatica simplifies the journey to cloud at the latest unveiling of the world’s #1 data integration and data quality solution, including:
    - Informatica PowerCenter 10.2
    - Informatica Data Quality 10.2
    - Informatica Data Integration Hub 10.2
  • Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace Kevin Beaver, Information Security Consultant, Principle Logic & Jamie Chiu, Senior Mgr, Intel Security & Trent Fierro, Aruba Recorded: Apr 27 2017 58 mins
    Network security is no longer about firewalls and related perimeter protection. It extends all the way to endpoints and the information assets they process and store. At any given time, do you really know what’s on your network, how they got there, and if they might be creating quantifiable business risks? With the complexity of today’s wired and wireless networks, this is becoming an increasingly-difficult question to answer.

    Join information security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel for a discussion on the technical and operational security concerns impacting modern networks. You’ll hear real-world stories and obtain practical insight into what it takes to have a resilient environment that can withstand today’s threats and risks.
  • Cloud Migration with a Microservice Architecture: A Coca Cola Case Study
    Cloud Migration with a Microservice Architecture: A Coca Cola Case Study Danny Eng, Enterprise Integration Architect, Coca-Cola; Jag Ramaswamy, Enterprise Integration Lead, Coca-Cola Recorded: Apr 27 2017 39 mins
    Just a few years ago, The Coca-Cola Company (TCCC) was completely on-premises, looking for a way to move toward their cloud-first strategy. Watch TCCC’s presentation from MuleSoft’s Atlanta Summit to learn Coke’s journey with MuleSoft starting from evaluation to how they are currently taking an API-led approach to integration. With this, Coke is now creating great customer experiences and enabling their sales force to continue to lead through innovation.

    Attendees will learn how TCCC is using MuleSoft to:

    - Implement a microservices architecture
    - Automate release management to accelerate time to production
    - Move from a COE to a Center for Enablement (C4E) to maximize reuse
  • Enterprise Software in 2017: Why your CRM Matters More than Ever
    Enterprise Software in 2017: Why your CRM Matters More than Ever Jon P. Elliott, Dynamics Technical Specialist, Microsoft Recorded: Apr 27 2017 61 mins
    Today's Customer Relationship Management (CRM) sales tools and software are aiding enterprise business solutions and resource planning more than ever.

    Microsoft Dynamics AX helps enterprise organizations increase the speed of doing business by enabling people to make smarter decisions, redesign business processes faster, and fuel business success. When you can make smarter decisions more quickly, from anywhere, you can redesign business processes faster and grow business at your pace.

    Join this webcast to learn how Microsoft Dynamics AX can help you:
    - Accelerate product introductions
    - Make shop floor execution more agile
    - Introduce and maintain intelligent order fulfillment
  • Skype for Business: Monitoring Performance
    Skype for Business: Monitoring Performance David Branscome, Microsoft | John Hand, IR | Dave Bottomley, IR Recorded: Apr 27 2017 60 mins
    Skype for Business deployments can be complex, particularly in a multi-vendor environment. This session will look at how organizations can best monitor the performance of a Skype for Business deployment, what the out-of-the-box solution can manage and how it works in with Prognosis. Co-hosted with Microsoft, this promises to be a fantastic session.
  • Will Enterprise File Sync and Share Encryption Really Protect You?
    Will Enterprise File Sync and Share Encryption Really Protect You? George Crump, Storage Switzerland Recorded: Apr 27 2017 3 mins
    End-to-end encryption is important and offers a base level of security but if the EFSS vendor owns your keys then you may not have the protection you might think. In this StorageShort, Storage Switzerland and Ctera discuss the importance of key ownership as part of the encryption process.
  • How to Build An Advanced Email Security Strategy
    How to Build An Advanced Email Security Strategy Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint Recorded: Apr 27 2017 46 mins
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • IoT is everywhere, but DON’T PANIC. 6 Considerations to make them successful.
    IoT is everywhere, but DON’T PANIC. 6 Considerations to make them successful. Christian Dornacher, Director, Storage & Analytics Solutions EMEA, Hitachi Data Systems Recorded: Apr 27 2017 40 mins
    During this webinar we will discuss the top challenges for IoT projects, why many of these are not successful and considerations to turn them around. We will be using real life scenarios to discuss the challenges and demonstrate how customers solved these resulting in success.

    -Pre-Requisites, organizational and legal challenges
    -Setting achievable goals
    -Selecting relevant data sources
    -Selecting and building the Eco-System
    -Integrating data sources
    -From Prototype to production

    Stay tuned to more webinars in our series "The Hitchhikers Guide to IoT"!
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Recorded: Apr 26 2017 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • Why a Secure VDI & Unified Communications Solution is Key to Business Delivery
    Why a Secure VDI & Unified Communications Solution is Key to Business Delivery Dean Suzuki, TSP, Microsoft & Derek Thorslund, Product Manager, Citrix Recorded: Apr 26 2017 23 mins
    Skype for Business is an industry-leading unified communications solution for voice, video, and collaboration. When deployed in a centralized manner for delivery within Remote Desktop Services or Virtual Desktop Infrastructure (VDI), either on-premises or in Microsoft Azure, you can maintain control and maximize security. However, there can be performance, usability, and scalability challenges with this approach.

    Citrix and Microsoft have teamed together to develop an optimized solution that offers the best of both worlds. Centralize control while delivering a consistent Windows experience of the Skype for Business client on a variety of different endpoint types.

    Join this webcast to:
    - Learn the benefits of the joint Microsoft and Citrix approach to optimized Skype for Business delivery
    - Understand the proven architecture of the solution, including unique media offload to optimize the user experience
    - Hear about customers that are using this solution today at scale
  • How to Cut Disaster Recovery Expenses - Improve Recovery Times
    How to Cut Disaster Recovery Expenses - Improve Recovery Times Storage Switzerland, ClearSky Recorded: Apr 26 2017 61 mins
    4 steps for more affordable, effective disaster recovery. Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that's not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
  • Automating Security Event Reponses
    Automating Security Event Reponses Steve Turner, Solutions Architect, AWS Recorded: Apr 26 2017 46 mins
    With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to automatically respond to and process security events that may occur within your AWS environment. These including prevention, detection, response, and remediation. This session covers the process of automating security event response using various AWS building blocks, gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
  • What's new in Grafana & Sneak Peaks at vNext
    What's new in Grafana & Sneak Peaks at vNext Torkel Ödegaard, Co-founder and Creator, Grafana Labs Recorded: Apr 26 2017 60 mins
    This webinar will be focused on Grafana and the new features of Grafana 4
    - Native alerting: Alerts on thresholds and alert notifications can be added to graph panels. The addition of alerting transforms Grafana from a visualization tool into a truly mission critical monitoring tool.
    - Ad-hoc filters: This is a new and very different type of template variable, which allows you to create new key/value filters on the fly; creating new exploratory dashboards
    - UI and UX improvements: This release aimed at making the use of the software more intuitive for new users, and improving the experience for existing users.
    - Plugins and Dashboards: Learn more about official and community-built Grafana panels, data sources, apps and dashboards.
  • How Harvard Improves Scalable Cloud Network Security
    How Harvard Improves Scalable Cloud Network Security Leo Zhadanovsky, Thomas Vachon Recorded: Apr 26 2017 53 mins
    With constantly evolving threats across the Internet, Harvard University deployed a security network platform to mitigate cyber threats, current and future, to protect institutional and research data. By using multiple geographic locations, best of breed equipment, and network automation, Harvard provides visibility, availability, and multilayer protections for their cloud network. This talk discusses the benefits, considerations, and lessons learned from using their security network platform at the edge of the cloud. Learn how Harvard designed and deployed the platform, utilizing serverless architecture to orchestrate the solution from within to protect their most sensitive data and afford students, faculty, and staff the flexibility of cloud computing.
  • Why the Financial Industry Chooses Box Platform to Power Apps
    Why the Financial Industry Chooses Box Platform to Power Apps Mike Schwartz, Product Marketing, Box Recorded: Apr 25 2017 50 mins
    Financial services firms are finding themselves in the crosshairs of digitization. Disruptive newcomers leverage best-in-breed cloud services, while industry incumbents are realizing they need to do the same in order to make sure they can move fast, scale quickly, and disrupt the status quo.

    Watch this webinar to learn how Box Platform can play a critical role in enabling your firm's digital transformation. In this webinar, you'll hear:

    - Major trends in the financial industry that are driving the need for digital transformation
    - Features and capabilities of Box Platform that enable you to build new digital experiences
    - Use cases for Box Platform in the financial industry across banking, insurance, lending, wealth management, and more


    Whether you're a bank looking to streamline document-heavy processes, an insurance company reimagining the claims process, or a wealth management firm eager to increase collaboration between advisors and investors, this session has something for everyone.
  • Open Source Cassandra: Lessons Learned from Supporting 2,000 Clusters
    Open Source Cassandra: Lessons Learned from Supporting 2,000 Clusters Brooke Thorley, SVP Technical Operations Recorded: Apr 25 2017 60 mins
    Learn the tips and tricks from the field you need to ensure application success on Cassandra

    With almost 10 million node hours of operational experience running Cassandra, and currently managing and supporting hundreds of clusters and thousands of nodes globally for a diverse range of clients, Instaclustr has seen it all.

    Our 45 minute live webinar will provide you with vital tips and "lessons learned" to ensure your cluster runs smoothly.

    What you’ll discover:
    -The most common operational problems in Cassandra, and how to solve them.
    -How to diagnose and resolve unexplained performance problems
    -How to design your cluster to maximize availability
    -How to monitor for early warning signs
    -Expert tips and tricks from the field
  • Pivotal Cloud Foundry 1.10: First Look - Windows at Scale, Network Isolation
    Pivotal Cloud Foundry 1.10: First Look - Windows at Scale, Network Isolation Jared Ruckle, Pivotal and Pieter Humphrey, Pivotal Recorded: Apr 25 2017 75 mins
    Ship software early and often with Pivotal Cloud Foundry 1.10, now generally available. Join Jared Ruckle and Pieter Humphrey for a deeper look at these capabilities, demos, and expert Q&A about many of the new options, including:

    * Pivotal Cloud Foundry Runtime for Windows enables operators to run fleets of Windows Servers at scale
    * cf push .NET apps with the Hosted Web Core Buildpack
    * Steeltoe brings popular microservices patterns to .NET
    * Deploy apps to a specific host with isolation segments, and boost compliance.
    * Use distributed tracing in Pivotal Cloud Foundry Metrics to reduce latency in microservices

    Learn all about the latest updates to the leading multi-cloud platform in this online event.
  • The Performance Challenge: Providing Amazing Customer Experience No Matter What
    The Performance Challenge: Providing Amazing Customer Experience No Matter What Nick Panahi, Product Management, DataStax Apr 28 2017 3:00 pm UTC 60 mins
    Building and managing cloud applications is not easy. Delivering one with an amazing customer experience is even harder.

    Join us for “The Performance Challenge: Providing an Amazing Customer Experience No Matter What” webinar where we will deep dive into the challenges customers face with providing a consistent experience no matter where customers are, providing real-time access to data and how DataStax Enterprise can help.
  • Maximize Scale & Agility: Leveraging Public Cloud Best Practices & Optimization
    Maximize Scale & Agility: Leveraging Public Cloud Best Practices & Optimization Aaron Newman, CloudCheckr CEO/Co-founder Apr 28 2017 5:00 pm UTC 60 mins
    Building your workloads on AWS unleashes speed and agility. To keep your foot on the pedal and stay aggressive, you need to infuse governance and best practices into your patterns.

    Join CloudCheckr Co-Founder/CEO Aaron Newman in this webcast as he walks you through best practices and strategies for successfully scaling out your AWS environment. In this webinar, learn how to

    - Stay lean and maximize spend

    - Ensure proper controls are in place

    - Apply cost optimization strategies

    - Manage right sizing services and administrative privileges
  • CTO series: Episode 2: -What does a Good Strategy look like...?
    CTO series: Episode 2: -What does a Good Strategy look like...? Andrew Bird : Chief Digital Officer & EA Visionary May 2 2017 9:00 am UTC 30 mins
    An organisations strategy should be unique in terms of fit for its business model. In this context, good strategy should show direct linkage to the operating model of the business and the road map of how growth will be achieved.
    In this Episode 2 of the CTO series, we discuss the measure of linkage to the operating model and the tools which can be used to show alignment or otherwise to the business vision.
  • Is Your Security Keeping Pace with Your Cloud Initiatives?
    Is Your Security Keeping Pace with Your Cloud Initiatives? Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic May 2 2017 3:00 pm UTC 60 mins
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps
    The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management; Mark Daly, Client Architect, MuleSoft May 2 2017 3:00 pm UTC 60 mins
    With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.

    Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:

    - A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
    - A view of Enterprise Architecture and DevOps from a leader in the field
    - What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
  • Knowledge17 Sneak Peek: Our Best of ServiceNow
    Knowledge17 Sneak Peek: Our Best of ServiceNow Ellen Daley, Adam Mason, Carleen Carter, Meghan Lockwood May 2 2017 5:00 pm UTC 60 mins
    Knowledge17, ServiceNow's biggest event of the year, is just three weeks away. Join Acorio's Leadership Team on a panel discussion of what to expect at the fastest-growing enterprise cloud company's annual conference.

    We will fill you in with highlights of our Customer's center stage presentations, new technology and innovations, key success stories since last year, and the main themes they expect ServiceNow leadership share.

    This year's K17 theme is experiencing IT, Customer Service, HR & Security at Lightspeed. Get a head start on your competition by getting the inside scoop before you even reach the plane.

    - Preview main stage presentations by Acorio and clients
    - Sneak Peek at our new demo
    - Five tips to get the most out of your K17 experience

    And be sure to visit us at Booth #419
  • Virtual Load Balancer Challenges and How to Conquer Them
    Virtual Load Balancer Challenges and How to Conquer Them Ashish Shah May 2 2017 5:00 pm UTC 45 mins
    While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.

    Join us for this 30 minute webinar with Q&A to learn how to overcome the challenges of using virtual load balancers.
  • Making Container Orchestration Easy
    Making Container Orchestration Easy Bich Le - Chief Architect, Co-founder May 2 2017 5:30 pm UTC 45 mins
    Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
  • Automated Compliance Assessment for RBI Cyber Security Guidelines
    Automated Compliance Assessment for RBI Cyber Security Guidelines Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys May 3 2017 5:30 am UTC 60 mins
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
  • Dell EMC Servers Help Boost Cost Savings, Productivity and Innovation
    Dell EMC Servers Help Boost Cost Savings, Productivity and Innovation Shams Hasan, Infrastructure Solutions Marketing Manager, META Region May 3 2017 9:00 am UTC 60 mins
    With the server at the core of most modern data center trends, it’s crucial to understand how to maximize the value of both economics and innovation; let’s discuss how!
  • No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime
    No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime John Fokker, Raj Samani, Ben Potter May 3 2017 1:00 pm UTC 60 mins
    Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.
  • Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps
    Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps Zane Lackey, Signal Sciences and Kamala Dasika, Pivotal May 3 2017 4:00 pm UTC 60 mins
    As IT organizations build and release software continuously, how do security teams become enablers of this pace? How can you ensure that the higher rate of change is not leading to lesser security?

    Join our webinar to learn how Pivotal and Signal Sciences work together to make app deployments faster *and* safer in cloud-native environments.

    This webinar will cover:
    - Best practices for implementing new security programs and incentivizing their adoption
    - How to simplify application layer security deployments across a variety of apps, teams and cloud infrastructures
    - How threat visibility and real time attack telemetry brings security context into DevOps teams, and improves response times.
  • Tech Talk: WAN Op on Tap
    Tech Talk: WAN Op on Tap Derek Granath and Chris Rogers May 3 2017 6:00 pm UTC 60 mins
    This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
  • EU GDPR - Finding your data 'A Services Approach'
    EU GDPR - Finding your data 'A Services Approach' Dan Burt, EMEA Solution Services Architect, Hitachi Data Systems May 4 2017 12:00 pm UTC 60 mins
    As the 'business issue' of GDPR draws ever closer, we discuss how Hitachi Data Systems can aid you through a portfolio of services and technology to manage this new compliance hurdle and manage your data.This webinar will focus on how to ascertain what data is relevant to be compliant and how you can most effectively find it in your current IT environment.
  • Containers from Scratch
    Containers from Scratch Liz Rice, Technology Evangelist May 4 2017 2:00 pm UTC 45 mins
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Accelerate Mobilizing your Customers with SAP Cloud Platform
    Accelerate Mobilizing your Customers with SAP Cloud Platform David Sacks, Senior Director, Platform Partner Ecosystem, SAP, and Holger Fritznger, SAP May 4 2017 2:00 pm UTC 60 mins
    For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.

    Join us on May 4 to find out about the recently released SAP Cloud Platform SDK for iOS, the latest mobile tools for SAP Cloud Platform, and how extending your SAP partnership to include the Build engagement model of the SAP PartnerEdge program can help you monetize your software efforts.

    SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
    • Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
    • Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
    • Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
    • Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
    • Leverage SAP Digital Channels and flexible license options to market your packaged solution to approximately 300,000 SAP customers
  • AWS Cloud Compliance - What Is it and How to Achieve to It
    AWS Cloud Compliance - What Is it and How to Achieve to It CloudCheckr CEO Aaron Newman, Allgress President and COO Jeff Bennett, AWS Sr. Security Partner Strategist Tim Sandage May 4 2017 3:00 pm UTC 60 mins
    Running an organization in the dynamic, ephemeral cloud brings increasing complexity and challenges as your environment scales. The advantages of scalability and flexibility are unquestionable, but assessing and measuring compliance requirements is a full-time job. To mitigate risks in 2017 and beyond, enterprises must proactively plan for cloud-based continuous monitoring, reporting and alerts, and automated response to maintain their governance, risk and compliance posture.

    You’re invited to a live webinar with AWS, Allgress and CloudCheckr to learn how to achieve and demonstrate compliance in the cloud to satisfy the auditors, streamline reporting of technical and non-technical controls, and improve workflow across your key stakeholders. In this exclusive webinar, attendees will learn:

    ●What does it mean to ‘be compliant’ in the public cloud
    ●Why a shared responsibility model is critical for compliance and security in the cloud
    ●How 3rd party tools help augment the AWS compliance framework

    About the Speakers:

    CloudCheckr and Allgress, AWS Advanced Technology Partners with certified Security competency, enable organizations to reduce the complexity timeframe to achieving compliance in the AWS cloud using the integrated Regulatory Mapping Tool (RPM). Join CloudCheckr Co-Founder Aaron Newman, Allgress President and COO Jeff Bennett, and Amazon Web Services Sr. Security Partner Strategist Tim Sandage as they dive into specific ways of what is means to be compliant and stay that way in the public cloud.
  • Transforming Customer Experience Through an Always-On Data Platform
    Transforming Customer Experience Through an Always-On Data Platform Mike Gualtieri, VP & Principal Analyst, Forrester Research | Rajay Rai, Head of Digital Engineering, Macquarie Bank May 4 2017 3:00 pm UTC 60 mins
    According to Forrester Research, leaders in customer experience drive 5.1X revenue growth over laggards. And although 84% of companies aspire to be a leader in this space, only 1 in 5 successfully delivers good or great customer experience. Join us for our next webinar where Mike Gualtieri, VP and Principal Analyst at Forrester Research and Rajay Rai, Head of Digital Engineering at Macquarie Bank will share how Customer Experience can drive business results such as faster revenue growth, longer customer retention, greater employee engagement and improved profit margins.
  • Briefings Part 3: The Future of BYOD Security
    Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator May 4 2017 5:00 pm UTC 75 mins
    Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
  • Gain Visibility & Control of IT Assets in a Perimeterless World
    Gain Visibility & Control of IT Assets in a Perimeterless World Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys May 4 2017 6:00 pm UTC 60 mins
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Artificial Intelligence Powering Business Solutions
    Artificial Intelligence Powering Business Solutions Barbara Giamanco, CEO Social Centered Selling & Leslie Gaines-Ross, Chief Reputation Strategist, Weber Shandwick May 5 2017 6:00 pm UTC 60 mins
    AI is turning heads in the C-Suite. Are you plugged in to these new technologies?

    Artificial Intelligence (AI) is a hot topic these days, drawing the attention of not only technologists and research scientists, but of C-suite executives, as well. Organizations that are currently exploring the potential of technologies such as robotics, expert systems, machine learning, speech, computer vision, facial recognition, and more are poised to transform and impact how we all do business.

    Artificial Intelligence can deliver value for your organization and industry, and AI technologies can represent the best kind of collaboration between humans and machines.

    Join this webcast to:
    - Learn how to separate hype from the true potential that Artificial Intelligence offers
    - Understand common challenges to consider and address
    - Review the top business applications for artificial intelligence
    - Explore what artificial intelligence means for the future of the workforce

    This webinar is part of our Digital transformation through connected operations series. Sign up for this session, or the entire series today!
  • Redefining Cloud Security – Freedom. Visibility. Protection.
    Redefining Cloud Security – Freedom. Visibility. Protection. Alex Kurz, Director, Sales Engineering, CensorNet May 9 2017 9:00 am UTC 45 mins
    Remember the days when IT had full control of which applications were used across your organisation? Today’s reality is that business moves faster than ever before, and teams need to be agile and able to easily collaborate together. How do organisations embrace the advantages of the cloud while keeping security and compliance tight?

    In this session we discuss:
    -How modern working practices might not be secured by traditional means
    -The scale of Shadow IT; even in organisations that have no ‘official’ cloud infrastructure
    -The risk posed by well-meaning employees and why modern authentication matters
  • Fighting Fraud with Graph Databases
    Fighting Fraud with Graph Databases Kaush Kotak, Project Manager, Cambridge Intelligence May 9 2017 3:00 pm UTC 60 mins
    Modern fraud detection has significant engineering challenges. From managing the ingestion and scale, to the analysis of those patterns in real-time. We'll first take a look at how DataStax Enterprise Graph, powered by the industry’s best version of Apache Cassandra™, can meet those requirements to help you save the day.
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto May 9 2017 3:00 pm UTC 45 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the enterprise
    •What cloud access management is
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy