Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Oct 18 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Marcel Scherer, Lenovo und Carsten Duch, SUSE Recorded: Oct 18 2019 46 mins
    SAP Data Hub hat die Aufgabe, die heute vorherrschenden heterogenen Datenquellen, seien sie in der Cloud oder im eigenen Rechenzentrum, zentral und ohne vorherige Konsolidierung zugänglich und vor allem auswertbar zu machen. Die zugrundeliegende Softwarearchitektur basiert auf Containern und setzt eine Kubernetes-Implementierung voraus.
    Eine Möglichkeit, SAP Data Hub auf Enterpriseebene zu betreiben, ist die SUSE Container as a Service (CaaS) Platform. Um den Kunden bei der Planung der durchaus komplexen Applikationsumgebung bestmöglich zu unterstützen, haben Lenovo und SUSE eine gemeinsame Referenzarchitektur entwickelt. Ziel ist es, das Thema Infrastruktur für den Kunden schnell abzuhaken und sich auf die Anwendung zu konzentrieren.
    Erfahren Sie in diesem Webinar mehr über den Aufbau von SUSE CaaS Platform, Grundlagen von SAP Data Hub und wie eine skalierbare Hardwareplattform basierend auf Lenovo ThinkSystem-Servern aussehen könnte.
  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Recorded: Oct 16 2019 45 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Why it's Time to Kill Your VPN
    Why it's Time to Kill Your VPN
    Chris Scheels, Director of Product Marketing, Cyxtera Recorded: Oct 17 2019 38 mins
    VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?

    Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.

    Learn why:
    - VPNs cannot support your move to Zero Trust
    - Managing VPNs is too complex for delivering granular access to a mobile workforce
    - Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
  • Boost Developer Productivity with SUSE Cloud Application Platform
    Boost Developer Productivity with SUSE Cloud Application Platform
    Brent Smithurst, Product Marketing Manager, SUSE Recorded: Oct 17 2019 48 mins
    SUSE Cloud Application Platform is a modern application delivery platform that brings an advanced cloud native developer experience to Kubernetes. Developers can serve themselves and get apps to the cloud in minutes instead of weeks. SUSE Cloud Application platform eliminates manual IT configuration and helps accelerate innovation by getting applications to market faster. Streamlining application delivery opens a clear path to increased business agility, led by enterprise development, operations, and DevOps teams.

    Join us in this webinar for an overview of SUSE Cloud Application Platform. We’ll discuss and demonstrate how the platform builds on Kubernetes to add easy one step deployment of cloud native applications from the CLI, UI, or Helm Chart Repository using a variety of languages, frameworks, and services most appropriate for the task. Other topics will include installation options on a variety of Kubernetes services, application autoscaling, logging, metrics, and much more. SUSE Cloud Application Platform is 100% open source technology – learn how to get started with it today!
  • The Brave New World of 5G
    The Brave New World of 5G
    Johna Till Johnson, CEO and Founder, Nemertes Research Recorded: Oct 17 2019 54 mins
    5G is here. But what does it mean, and how can a new wireless standard transform enterprise organizations? Find out here. We'll delve into the changes 5G brings to wireless services, and how those changes will affect businesses today and going forward. And we'll provide practical next steps for organizations looking to move towards 5G.
  • How Do You Know Your Email Security Is Working?
    How Do You Know Your Email Security Is Working?
    Tom McNash, Senior Solutions Engineer, Cyren & Duncan Mills, Product Marketing Director, Cyren Recorded: Oct 17 2019 60 mins
    Whether you use Office 365 or an on-premises gateway, have you been able to quantify how much malware, phishing and spam is evading your email security and getting through to your users? Cyren has developed an Email Security Gap Analysis test to measure how well a company’s in-place security is performing, and has just published a new, updated report with aggregated data on results from assessments done in 2019.
    This webinar reviews the key statistics and general findings in that report, as well as case studies and segmented industry data, example emails and threats uncovered during assessments (appropriately anonymized), and it covers how to complete your own assessment. Webinar registrants will receive a complimentary copy of the report.
  • The IT Architect of the Future
    The IT Architect of the Future
    Simon Ratcliffe, CIO Advisor and Mentor, IT Evangelist Recorded: Oct 17 2019 38 mins
    The role of the architect has changed dramatically in the past few years and is headed for even more change as the landscape of possible technology options is only going to increase. Faced with a list of options that is increasing almost daily across a highly competitive landscape, many architectural decisions have become an exercise in avoiding error rather than exploring possibility.

    Whilst an acceptance of failure is becoming the norm in smaller development faced activities, architects must make big decisions that can affect the entire operation of an organisation. This webinar explores some ideas for architectural best practice and mechanisms for reducing risk whilst empowering architects to unleash some of the exciting new options available to them.
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Recorded: Oct 17 2019 47 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Geek's guide to the workspace (part 4): first you get content, then the apps
    Geek's guide to the workspace (part 4): first you get content, then the apps
    Brian Jozefat, Crystal Ricevuto Recorded: Oct 17 2019 30 mins
    Users create an ever-increasing number of documents, presentations, drawings and other content that are stored in files. There is also no shortage of locations to store those files. Making sure that your users have seamless access to all those files, in any repository, is key to providing a productive user experience. In this session, we will demonstrate how Citrix Workspace provides access to all those repositories, including the native Citrix Content Collaboration repository, existing repositories on-premises and in the cloud, and repositories inside Workspace apps to those integrated into Explorer and Finder, all with a seamless experience.
  • Performance testing latest trends and success cases
    Performance testing latest trends and success cases
    Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, Akamai Recorded: Oct 17 2019 57 mins
    Businesses experience disengaging clients if their websites and mobile apps don’t respond in 2, 3 seconds. They lose revenue and get bad media coverage when customer experience breaks because of large scale unforeseen load and access from increased user traffic.

    Be it an online sale event, a new financial service offering or a new game launch, every organization has planned or unplanned real-life situations where the user traffic increases 2X, 3X compared to normal days.

    Pressure is on for app dev and infrastructure teams. As they transform to deliver better apps more frequently, their continuous delivery and Agile + DevOps journeys break too if end to end performance testing at scale is not done regularly to most closely replicate real world conditions and for peaks.

    In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.

    Join us on 17 Oct, 14:00 Singapore time to learn:

    • Application performance needs in the accelerated digital world
    • Continuous performance testing meets continuous delivery
    • Modern performance testing trends
    • How to be ready for the unexpected with 2X, 3X, 4X user traffic
  • Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon Black Recorded: Oct 17 2019 60 mins
    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.

    Attendees will learn how to:

    - Automate the majority of successful data analysis procedure
    - Map adversary techniques to detection coverage
    - Test, validate, and continuously improve visibility
    - Make threat hunting a repeatable process that drives better security outcomes
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • [Panel] Exploring Digital Transformation Across Industries
    [Panel] Exploring Digital Transformation Across Industries
    Elisabeth Thomas, Launch Product Marketing | Arun Trivedi, Wipro | Monica Kumar, Nutanix | Tyler Ramby, Veeam Recorded: Oct 16 2019 41 mins
    It can be tricky to know how to modernize and mobilize business in the digital era. From retail to manufacturing, and transport to healthcare, digital transformation is changing the face of how many industries run, plan, and interact with customers, suppliers and partners.

    The right strategy can increase revenue, reduce cost over time, and allow a business to remain agile. Join this panel of experts as they share different digital transformation success stories and use cases, and show you how it can aid expansion into global markets.

    Speakers:
    Elisabeth Thomas, Founder, Launch Product Marketing (moderator)
    Arun Trivedi, Partner, Wipro Technologies
    Monica Kumar, SVP Marketing, Nutanix
    Tyler Ramby, Inside Systems Engineer, Veeam
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Recorded: Oct 16 2019 33 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • National Cyber Security Awareness Month- Protect IT
    National Cyber Security Awareness Month- Protect IT
    Kevin Haley | Eva Velasquez | Ryan Lawless Recorded: Oct 16 2019 55 mins
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass Recorded: Oct 16 2019 42 mins
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • Welcome Your New Robo Workers: Featuring Micro Focus RPA
    Welcome Your New Robo Workers: Featuring Micro Focus RPA
    Danny Cavion, Business Consultant and Michael Bettan, Practice Manager, Micro Focus Recorded: Oct 16 2019 50 mins
    Save robotic work for the robots. Micro Focus RPA robots can mimic human actions to perform everyday tasks. But—they are faster, more accurate, and never sleep. So they can handle mundane, repetitive, error-prone work. And you can focus on more strategic things.

    Join our webinar to:
    • Learn why you need RPA and how you benefit
    • Explore customer use cases for RPA
    • Hear about the new Micro Focus RPA product
    • See a demo of Micro Focus RPA and watch robots in action

    Welcome your new robo workers, liberate human brainpower, and ignite enterprise productivity.
  • Build your own BPM application
    Build your own BPM application
    Myriam Fentanes and Phil Simpson, Red Hat Recorded: Oct 16 2019 58 mins
    Have you ever built a working application that automates a business process? Now's your chance to try it hands-on. In this workshop, we’ll take you through the steps required to build a simple application based on a real-world use case: automating the handling of credit card disputes.

    We’ll use Red Hat® Process Automation Manager, a leading business process management (BPM) platform. Bring your laptop (no software installation required), and you’ll see how to get started with process modeling, decision modeling, and deploying your finished application to the cloud.

    We’ll cover:

    • How to create models of business processes and decisions using standard notations such as BPMN.
    • How to convert models into fully working applications with Red Hat Process Automation Manager.

    Featuring:
    Myriam Fentanes, Principal technical marketing manager, Business Automation, Red Hat
    Phil Simpson, Senior principal product marketing manager, Red Hat
  • Desktops as a service with Citrix
    Desktops as a service with Citrix
    Kireeti Valicherla, Paul Carley Oct 22 2019 9:00 am UTC 45 mins
    Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 22 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    Robin Gareiss, President and Founder, Nemertes Research Oct 22 2019 3:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • What Software Defined Storage Means for Storage Networking
    What Software Defined Storage Means for Storage Networking
    Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox Oct 22 2019 5:00 pm UTC 75 mins
    Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?

    Watch this SNIA webcast to learn:
    •How software-defined storage differs from integrated storage appliances
    •Whether SDS supports block, file, object, or all three types of storage access
    •Potential issues or pitfalls with deploying SDS
    •How SDS affects storage networking
    •Scale-up vs. scale-out vs. hyperconverged vs. cloud
  • When to Leverage the Internet for SD-WAN
    When to Leverage the Internet for SD-WAN
    John DeBella, Director of Infrastructure Management at Teradyne, and Aryaka experts Oct 22 2019 5:00 pm UTC 60 mins
    SPECIAL GUEST SPEAKER: John DeBella, Director of Infrastructure Management at Teradyne

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Global networking needs of enterprises have shifted dramatically. It is no longer just about having a static and eminently fair and stable network infrastructure of manually configured routers and deterministic - yet static - MPLS.

    The new digital enterprise model demands an underlying global network that is easy to consume, agile to react to business needs and simple to manage. Hence enterprises have turned to SD-WAN with alternative direct internet access (DIA) site-to-site connectivity that augments and replaces MPLS for business-critical applications.

    Join us as we discuss:

    >> How Teradyne leverages private and public internet connectivity to deliver an optimal application experience for all stakeholders

    >> New, recently-released built-in technologies that enable Ayaka to deliver on the needs of WAN transformation for digital enterprises

    >> What’s in it for network managers as they drive a Netops approach for their enterprises

    >> How to deliver on ‘internet-first’ approaches connectivity, tracking the ‘cloud-first’ approach for applications
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware
    Part 1: Why State and Local Governments are Prime Targets for Ransomware
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane Oct 22 2019 5:00 pm UTC 60 mins
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    Kate Holthouse, Sr. Value Engineer at Syniti Oct 22 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP's Advanced Data Migration. You will see how to transform your project by streamlining the migration using an agile methodology in a web-based platform. This solution provides a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your SAP S/4HANA migration.
  • Cloud Native SIEM: How to take ownership in a shared responsibility model
    Cloud Native SIEM: How to take ownership in a shared responsibility model
    Tafi Makamure, Technical Engineer Oct 23 2019 9:00 am UTC 45 mins
    One of the key obstacles in accelerating adoption of the cloud is ensuring the compliance and security posture of workloads in new cloud environments. Learn how to gain visibility and secure your workloads in modern hybrid or multi-cloud environments.
  • Cloud-Managed IT - Everything you always wanted to know
    Cloud-Managed IT - Everything you always wanted to know
    Amelie Sutsakhan, Product Marketing Manager, Cisco Meraki Oct 23 2019 9:00 am UTC 68 mins
    Join us for an introduction to Cisco Meraki and our cloud-managed IT products, including wireless APs, security appliances, switches, cameras, and EMM. You'll learn how cloud management offers greater reliability, easier management, and a lower TCO - and we'll show you a demo of the exciting features in the Cisco Meraki dashboard.
  • Prognosis for UC Live Demo [October 2019]
    Prognosis for UC Live Demo [October 2019]
    IR Senior Solutions Engineer Oct 23 2019 3:00 pm UTC 45 mins
    Live demo session of Prognosis for UC with one of our Senior Solutions Engineers.
  • SD-WAN Architecture Series: The Evolution of the Enterprise WAN
    SD-WAN Architecture Series: The Evolution of the Enterprise WAN
    Michael Leonard, Product Marketing Manager at VeloCloud, now part of VMware Oct 23 2019 4:00 pm UTC 41 mins
    In this webinar we will look at the drivers contributing to the changing architecture of the enterprise WAN. We will examine how the WAN is transforming into a software-defined WAN.

    You will learn about:
    •Limitations of conventional WAN
    •Use case for WAN optimization
    •Development of the Hybrid WAN
    •Evolution to SD-WAN
  • CCS [Ep.5]: Application Security Meets Multicloud
    CCS [Ep.5]: Application Security Meets Multicloud
    John Burke, CIO and Principal Research Analyst, Nemertes Research Oct 23 2019 5:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Experience-based networks, a new model for virtual networking
    Experience-based networks, a new model for virtual networking
    Dr. Ritesh Mukherjee, Vice President of Product Management at 128 Technology with Dino Farinacci and Shawn Zandi Oct 23 2019 5:00 pm UTC 60 mins
    The imminent advent of 5G, virtual reality (VR), connected cars, Internet of Things (IoT), and smart devices has moved us into the Experience Age. Consumers are now more informed and discriminating than ever before. Network deployments must mirror the adaptive and connected qualities of end users to succeed. In this webinar/panel discussion we will get perspective from network industry stalwarts on what features and functions networks must possess to create and deliver exceptional user experiences. It is time to reinvent the digital future to deliver exceptional user experiences.
  • Live DDoS Attack: Mitigate then Investigate
    Live DDoS Attack: Mitigate then Investigate
    David Elmaleh, Product Manager, Imperva and Andrew Shoemaker, Founder & CEO, NimbusDDOS Oct 23 2019 5:00 pm UTC 60 mins
    Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live layer 7 DDoS attack which showcases how these attacks can be the most difficult to mitigate, and get a closer look at real-world DDoS incidents where threat preparedness was overlooked. Plus, you will learn how to investigate and understand the components of a DDoS attack so that when – not if – a DDoS attack hits, you’re prepared to answer any questions that come your way.
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • The Top Cyber Threats Today and How to Protect against Them (APAC)
    The Top Cyber Threats Today and How to Protect against Them (APAC)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Oct 23 2019 11:30 pm UTC 45 mins
    The year 2018 and the first half of 2019 saw a significant number of major events showcasing cyber-criminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.

    Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.

    In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.

    We hope you can join us for this live, educational session.
  • Deutsch - Einführung in Cloud Managed IT
    Deutsch - Einführung in Cloud Managed IT
    Joel Vilaca | Cisco Meraki Oct 24 2019 9:00 am UTC 53 mins
    Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer Wireless-Access Points, Security Devices und Features, Switches, Mobile Device Management und Überwachungskameras.

    Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden.
  • Avoid performance stress when using hybrid cloud workloads
    Avoid performance stress when using hybrid cloud workloads
    Thomas Poppelgaard, Christiaan Brinkhoff Oct 24 2019 2:00 pm UTC 44 mins
    Performance is always key for the end user, whether it’s on-premises, hybrid, or public cloud workloads. If your environment faces performance issues, you’ll be pleasantly surprised by the same performance when you move to the cloud. What is the most cost-effective sizing for your virtual machines to get the best performance? Are GPU workloads still relevant? What about WAN optimizers for cloud workloads, such as the HDX Enlightened Data Transport (EDT) protocol and Citrix SD-WAN? During this session, Citrix Technology Professionals (CTPs) will walk you through best practices gathered while deploying workloads on several clouds in addition to Citrix Cloud. Join this session to learn the fundamentals, gain insights into Citrix Virtual Apps and Desktop workloads, and ultimately get prepared to work on your first or second date towards Citrix Cloud services.
  • Single and cohesive view into your healthcare IT environment
    Single and cohesive view into your healthcare IT environment
    Chuck Petrie & Peter Haagenson Nov 21 2019 4:00 pm UTC 60 mins
    Join Blue Medora experts, Chuck Petrie & Peter Haagenson, as they discuss the benefits of building a single view for end-to-end monitoring of your healthcare environment. Learn how monitoring Epic alongside the rest of your IT environment can increase reliability, improve productivity and lower cost of ownership.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.