Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Secure Identity – The foundation in driving Smart Campus initiatives
    Secure Identity – The foundation in driving Smart Campus initiatives
    Max Ebdy Regional Sales Manager, IIDI, Asia Pacific Recorded: Nov 24 2020 32 mins
    Digital transformation is happening everywhere and the higher education sector is not spared. With the current pandemic, the need to have a robust approach to continue their businesses and to offer relevant education offerings and services is key to their survivals.
    By expanding their education services wider and deeper, the need to have relevant tools to connect, to communicate and to collaborate drives this industry to develop Smart Campus initiatives. Secure Identity will be one of the key foundation blocks to enable and drive these initiatives.
    In this webinar, we will look at the current drivers for existing education institutes to embrace online and digital tools and what would be the impact if there is an absence of this secure identity. We will also discuss the approach of an secure identity issuance that will benefit education institutes whether they are serving their students within the physical building compounds, or in a mixture of both digital and physical environments.

    Join the webinar to hear:
    • Drivers for higher education sector to embrace smart campus initiatives.
    • Why secure identity is so crucial to smart campus initiatives?
    • What makes an identity secure ?
    • Issuance approach that is simple, smart and secure.
  • Building Applications on Kubernetes: Setting up your Workstation
    Building Applications on Kubernetes: Setting up your Workstation
    Josh Rosso, Staff Kubernetes Architect, VMware and Eric Smalling, Staff Kubernetes Architect, VMware Recorded: Nov 24 2020 109 mins
    Are you a developer responsible for developing applications to run on Kubernetes, but not sure where to start? Join our webinar to learn best practices for setting up your workstation—derived from hosts Josh Rosso and Eric Smalling’s experience working with developers in the field. They'll begin by sharing some tools you will want to work with such as Docker and a locally runnable Kubernetes cluster. Then they'll teach you about the basics and best practices involved with running applications in containers and, finally, how to deploy them on Kubernetes.

    P.S. Are you a beginner with Kubernetes? We recommend taking the Containers 101 and Kubernetes 101 courses on KubeAcademy prior to the webinar. While this is optional, taking those foundational courses will help you get the most out of the webinar.

    Containers 101: https://kube.academy/courses/containers-101
    Kubernetes 101: https://kube.academy/courses/kubernetes-101
  • Case Study: Listen to Molly Bloom's Rise Above the Unexpected.
    Case Study: Listen to Molly Bloom's Rise Above the Unexpected.
    Andre Durand, CEO of Ping Identity and Molly Bloom, Entrepreneur & Author of Molly's Game Recorded: Nov 24 2020 36 mins
    Join Andre Durand, CEO of Ping Identity in a fireside chat with Molly Bloom, Olympic-class skier, entrepreneur, and author of "Molly’s Game".

    From running one of the most exclusive high-stakes poker games in Hollywood to becoming a successful entrepreneur, Molly’s amazing story of failures and perseverance is truly remarkable and is particularly relevant to businesses in 2020.

    Learn about the repeatable strategies she used to create exclusive, personalised experiences for her players and to recover from disastrous circumstances. Hear how her strategies can help businesses turn their customers into loyal advocates.
  • Operational Excellence in the New Normal
    Operational Excellence in the New Normal
    Mitch Berk, Simon Perry, Darrly Miles, Dave Kofoed and Dany Leclerc Recorded: Nov 23 2020 49 mins
    As businesses continue their journey with remote work options for their task force, enabling access from BYO devices apart from corporate owned, providing the best user experience, securing and supporting their employee’s digital lifecycle becomes a challenge. Join us for this session and learn how to easily manage and support employees across environments using Workspace ONE Assist and Carbon Black.
  • Security Made Simple: Lunch & Learn Series Part 1 | HP Services
    Security Made Simple: Lunch & Learn Series Part 1 | HP Services
    Keri Atkins; NA PC Services Security BDM; Terry Van Roekel; Director AMS Security Services Recorded: Nov 23 2020 41 mins
    Traditional methodologies in securing the PCs have quickly become ineffective as an unintended consequence of the impact to IT resources by recent events. Hear from HP’s Security experts who will discuss how HP can help keep your organization safe by defending against cyberattacks without changing user behavior or increasing your IT Staff's workload.

    In this webinar, participants will:
    • Discover how you can implement a protection-first approach in your environment
    • Learn about HP’s industry-leading isolation, monitoring, and proactive solutions to secure your business
    • Determine the right Security solution for your needs

    Original Webinar Date: November 19th, 2020
  • Distributed development and native images: Quarkus, why and how?
    Distributed development and native images: Quarkus, why and how?
    Georgios Andreanakis, Red Hat; Dominik Winter, Viada; Sun Tan, Red Hat; Mark Little, Red Hat; Michael Simons, Neo4j Recorded: Nov 23 2020 90 mins
    Distributed development and native images with modern approaches to persistence on top of an extensible base features makes developer dreams come true. Learn why and how Quarkus is solving the most pressing problems in modern architecture and how to migrate existing services.

    Agenda:

    • 3-tier vs. Microservices. How to get Spring Boot into the cloud
    Georgios Andreanakis, Senior Software Engineer, Red Hat

    • Mono2micro Decoupling with MicroProfile RESTClient and Quarkus
    Dominik Winter, Senior Consultant, Viada

    • Kubernetes Native Development. Be CodeReady
    Sun Tan, Senior Software Engineer. Red Hat

    • Quarkus, GraalVM, Mandrel, OpenJDK. A Runtimes tale
    Mark Little, Vice President, Middleware Engineering, Red Hat

    • Quarkus meets Neo4j
    Michael Simons, Software Engineer, Neo4j
  • No time to patch your Linux Servers? How to stay protected
    No time to patch your Linux Servers? How to stay protected
    Alex Gounares, CEO, Polyverse Recorded: Nov 23 2020 35 mins
    Find out how you can secure your Linux systems against memory exploits and reduce the strain of patching on your IT team with Polymorphing for Linux. Join Pete as he explains more about this ground-breaking technology. Available for all versions of Enterprise Linux including Red Hat, SUSE, and Canonical (Ubuntu).
  • How Katz Media Group Transitioned from 0% to 100% Cloud Data Centers
    How Katz Media Group Transitioned from 0% to 100% Cloud Data Centers
    Presented by AWS and Druva, featuring Robert Lyons, CTO, Katz Media Group Recorded: Nov 23 2020 35 mins
    Accelerate cloud migration with cloud-based data protection. Watch this webinar to learn how Druva, powered by AWS, helped national media conglomerate Katz Media Group shift from on-premises data center protection to a 100% cloud-based solution — kick-starting an organizational shift to the cloud that enabled more agility, efficiency, and cost-savings.

    Watch to learn how Druva’s cloud-native data protection solution built on AWS empowered Katz Media Group to:

    • Validate the shift from capital expenses (CapEx) to operating expenses (OpEx) with TCO savings of up to 50%
    • Improve organizational agility, data security, and accessibility with a comprehensive cloud-based solution
    • Boost employee productivity through a single console that manages endpoints, data centers, and cloud-native workloads
    • Accelerate time to value with easy deployment and single-click backup and disaster recovery from the cloud
  • Ransomware Prevention Report: How to Address a Pervasive and Unrelenting Threat
    Ransomware Prevention Report: How to Address a Pervasive and Unrelenting Threat
    Justin Henderson, Certified SANS Instructor Recorded: Nov 23 2020 64 mins
    Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities and now it’s even targeting itself toward halting critical ICS/SCADA operations. This webcast will explain why and how ransomware is spreading, introduce standards and provide guidance for detecting and recovering from ransomware, based on US-CERT and NIST resources.

    Attendees will learn how to:

    * Adapt their architectures to enable more effective ransomware detection and response
    * Secure their systems against phishing, USB, web drive-bys and other attack vectors
    * Reduce vulnerabilities through appropriate policies and user training
    * Use baselining, monitoring, logging and analysis to detect ransomware
    * Engage reporting, forensics and secure storage in the battle against ransomware
    * Address RIPlace ransomware and its abuse of the Rename operation

    The webcast will also provide special considerations that ICS/SCADA organizations need to address.


    SPEAKER BIO: Justin Henderson is a certified SANS instructor who authored the SEC555 SIEM with Tactical Analytics course and co-authored SEC455 SIEM Design and Implementation and SEC530 Defensible Security Architecture and Engineering. He is a member of the SANS Cyber Guardian Blue Team who is passionate about making defense fun and engaging. Justin specializes in threat hunting via SIEM, network security monitoring and ad hoc scripting.
  • Harnessing the Power of the Clinical Data Avalanche
    Harnessing the Power of the Clinical Data Avalanche
    SciMar ONE, LLC Recorded: Nov 23 2020 35 mins
    There is new lexicon for an old scientific challenge. The World Health Organization (WHO) has named the overabundance of COVID-19 information the “infodemic.” While COVID-19 has highlighted the challenge of identifying, aggregating and analyzing validated clinical data to fight diseases; other scientifically complicated diseases with large patient populations have the same challenge. Diseases meeting these criteria are referred to as emerging diseases, because while they may not be new, the science has evolved, and their markets are projected to emerge.

    In this webinar you will learn:

    - Discuss the data avalanche and its impact on the healthcare industry today.
    - Explain the utility of different clinical data types by various stakeholders in healthcare.
    - Determine challenges of culling the data avalanche quickly and efficiently.
    - Discuss potential pros and cons of data sharing amongst stakeholders.
  • Is Linux Secure By Default?
    Is Linux Secure By Default?
    Ell Marquez Recorded: Nov 23 2020 29 mins
    The Linux operating system is secure by default because Windows is the most used operating system globally. Thus attackers create viruses and malware to target Windows systems. While cringe-worthy to read, these are all real statements being touted in the technology sector. This is a false narrative that is still frequently touted in the technological world.
    This webinar will highlight the common myths proliferated around the Linux operating system. As well as how they are endangering companies' production environments, and steps companies can take to mitigate the new techniques attackers are using to benefit from these myths.

    Topics covered:
    How recent attacks have shifted to focusing on the Linux ecosystem.
    How Linux malware is being crafted and detected.
    What you can do to protect yourself from the change in attacker's techniques.
  • Back to basics - learn how to find, win and keep customers in the next normal
    Back to basics - learn how to find, win and keep customers in the next normal
    Áine Corcoran, Regional Vice President - Startups UK, Salesforce Kevin Martin, Solution Engineer, Salesforce Recorded: Nov 23 2020 47 mins
    On-Demand Webinar
    Are you an SME who’s way of working has radically changed in recent months but now you want to get back on the path to growth? After spending much of this year on survival mode, it's never been a more important time to get back to basics to build security, future-proof your business model and be ready for growth in the next normal.
  • Building an Intelligent Enterprise by harnessing the power of cloud
    Building an Intelligent Enterprise by harnessing the power of cloud
    Mathew Joseph, Wipro Ammar Fayoumi, Cloudera Ranjit Rajan, IDC Recorded: Nov 23 2020 57 mins
    The pandemic is the most significant cloud transformation catalyst for businesses. Long digital transformation roadmaps have now been compressed into days and weeks as organizations race to adapt to the new normal.
    Organizations and governments are increasingly optimistic about the potential of the cloud, not just to unlock cost-efficiencies and data storage possibilities but also to fast-track their journey toward a truly connected Intelligent Enterprise, driven by Artificial Intelligence (AI).
    Attend this joint webinar by Wipro, Cloudera, and IDC to evaluate where you are in the cloud transformation journey. Get insights into proven strategies to overcome challenges with cloud adoption and migration. Learn how you can accelerate your organization’s digital transformation-led innovation.
    During the course of the webinar, we will discuss:
    ● The implication of current cloud capability trends in the market and how the pandemic has geared up digital transformation.
    ● Challenges with cloud adoption — change management, security, and deriving ROI
    ● Cloud accelerators to simplify the cloud adoption journey and ensure resiliency, business continuity, and cost-efficient operations.
    ● How organizations can leverage data as a strategic asset in digital transformation.
    ● How to drive innovation and build an Intelligent Enterprise through cloud adoption and AI initiatives
  • Tech Jam Series - How to Eliminate Your 2nd Data Center
    Tech Jam Series - How to Eliminate Your 2nd Data Center
    Bob Williamsen Recorded: Nov 23 2020 26 mins
    In this session, we will cover how you can use Dell Cloud Storage Services to eliminate the expenses and headaches of operating a second site, learn how you a can use the Cloud to provide your DR site or handle other workloads.

    Presenters: Ray Kalmbach, Field CTO, Faction and Anthony Derrico, Account Executive, Dell EMC
  • Integration und Automatisierung gegen Ransomware und andere Bedrohungen (German)
    Integration und Automatisierung gegen Ransomware und andere Bedrohungen (German)
    Daniel Prauser Recorded: Nov 23 2020 54 mins
    Vor kurzem haben wir ein Webinar auf der Webseite itsicherheit-online.com abgehalten. Hier bieten wir die Aufzeichnung von diesem Webinar an.

    Die Kompromittierung der eigenen IT-Infrastruktur ist heute keine Frage des "ob" mehr, sondern eine des "wann". Die Kombination aus Cloud und Home Office sowie der Übergang zu DevOps-Modellen mit Containern und Microservices bieten eine Vielzahl neuer Angriffsmöglichkeiten. Traditionelle, signaturbasierte Abwehrmaßnahmen wie etwa Antiviren-Programme sind oft nicht geeignet, aktuelle Angriffsmuster wie etwa Emotet zu erkennen.
    Insbesondere die Gefahr von Zero-Day-Attacken erfordert einerseits ein konsequentes Schwachstellen-Management, um die Angriffsfläche wirkungsvoll zu verringern. Andererseits werden Detection&Response-Systeme benötigt, die einen dennoch erfolgreichen Eindringling früh erkennen und unverzüglich Gegenmaßnahmen einleiten können.
    Die enge Integration beider Systeme sowie ein hoher Grad an Automatisierung sorgen dafür, dass die Zahl der aufwändig zu bearbeitenden falsch-positiven Alarme minimiert und die Untersuchung von Verdachtsfällen erheblich beschleunigt werden.
  • Enterprise Networks in the Era of the Remote Workplace
    Enterprise Networks in the Era of the Remote Workplace
    Stephen Tsang, General Manager, ICT Infrastructure, NTT Ltd. / Yanchu Zhang, Principal Consultant, Network Services, NTT Ltd. Recorded: Nov 23 2020 40 mins
    During this period when most organizations have accelerated their digital workplace strategy, the surge of multimedia collaboration combining voice and video, heightened access to cloud applications and increased data storage have all placed huge stresses on current enterprise networks.

    During this webinar, Stephen and Yanchu will discuss the challenges that remote workplaces have placed on enterprise networks, including:
    • Bandwidth scalability and cost
    • Cloud application performance
    • Security
    • Visibility and monitoring

    They will also share how network and ICT infrastructure should be transformed using software-defined technology to meet the challenges of this new era.

    Speakers:
    • Stephen Tsang, General Manager, ICT Infrastructure, APAC, NTT Ltd.
    • Yanchu Zhang, Principal Consultant, Network Services, NTT Ltd.
  • How Switching Off Your Firewall Can Actually Make You Safer
    How Switching Off Your Firewall Can Actually Make You Safer
    Samuel Rhea, Director of Product Management, Cloudflare and Adam Shepherd, Reviews and Community Editor, IT Pro Recorded: Nov 23 2020 24 mins
    For many years, the corporate VPN has been regarded as more of a necessary evil than a treasured part of the business’ IT estate; although VPN appliances were vital for allowing employees to access corporate tools and resources while outside the office, they were slow, cumbersome and frustrating to use. They’re also often ill-suited to the high demands placed on them by the modern SaaS applications relied on by many businesses.

    Thankfully, organizations no longer have to depend on physical VPN appliances; they can utilise the power of the cloud to authenticate and protect their employees wherever they are in the world, depending the edge of the corporate network, whatever that edge happens to look like.

    Join IT Pro reviews and community editor Adam Shepherd and Cloudflare product manager Sam Rhea to find out:
    - How Cloudflare for Teams can protect devices, networks, and internal applications without compromising performance
  • Put your IT platform to work
    Put your IT platform to work
    James Falkner, Jason Dobies, Sophie Watson and Phil Simpson; Red Hat Recorded: Nov 20 2020 37 mins
    Digital transformation requires not only changing your organization's process and culture, but also transforming the underlying technology to match the requirements of change. Developers, IT and business leaders, and more recently, data scientists, all have a stake in their organization's transformation journey. Red Hat technology helps keep the focus on innovation, so the technology works for you—rather than the other way around.

    In this session, a panel of Red Hat experts will discuss common customer challenges faced in transforming technology to match people and process. We'll also share how Red Hat customers across different industries have overcome those challenges during their transformation. In addition, we'll discuss how Red Hat OpenShift and Red Hat Application & Data Services work together as a platform that successfully develops and delivers new and innovative capabilities for their customers.

    Presented by:
    James Falkner, Product Marketing Director, Red Hat
    Jason Dobies, Developer Advocate, Red Hat
    Sophie Watson, Principal Data Scientist, Red Hat
    Phil Simpson, Senior Principal Product Marketing Manager, Red Hat
  • Four Threats Hitting Your Edge
    Four Threats Hitting Your Edge
    Akamai's Steve Winterfeld - Advisory CISO, and Tony Lauro - Director of Security Technology & Strategy Recorded: Nov 20 2020 37 mins
    One of the keys to building an effective defensive perimeter is understanding how the threat is attacking. While you can’t defend against everything, we will cover four of the top issues that you should be prepared for.

    This talk will review trends we are seeing in the following threat vectors:

    - DDoS (both Blackmail and Mega Attacks)
    - Formjacking / Skimming (i.e., Magecart)
    - Credential Stuffing (Account Takeover)
    - Malware C2 (Domain Generation Algorithms)

    Join us as we share real-world examples our customers experience every day and the evolving defensive techniques we use to mitigate the risk these attacks represent.
  • HCL Commerce Fall 2020 Release - Sneak Peek
    HCL Commerce Fall 2020 Release - Sneak Peek
    Gary Schoch, GM, Brian Gillespie, Head of Product Management, Martin Tavener, CTO EMEA, Tony Stankoski, HCL Discover SME Recorded: Nov 20 2020 27 mins
    Join us as we share what's coming in our Fall 2020 release in December. New Google capabilities, Unica Discover integration, embedded CMS and DAM capabilities and much more. Don't miss this opportunity to hear from our leaders and get excited about the new capabilities!
  • Discover how to achieve and increase operational resilience with VMware and AWS
    Discover how to achieve and increase operational resilience with VMware and AWS
    Michael Armstrong, Vern Bolinius, Chris Porter Recorded: Nov 20 2020 74 mins
    Organizations are experiencing a number of changes in their business operations. VMware Cloud™ on AWS delivers a scalable and secure cloud service in the AWS Cloud. VMware Cloud™ on AWS can help businesses alleviate potential business disruptions for our customers in 3 ways.
    Attend the webinar to discover how!
  • The 2020 State of CASB in Europe
    The 2020 State of CASB in Europe
    James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEA Recorded: Nov 20 2020 56 mins
    With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud. Organisations have adopted or plan to adopt Cloud Access Security Brokers (CASBs) to help them.
    Join Proofpoint experts as they discuss the findings of a newly conducted research among security professionals to determine the needs of enterprises from CASBs, and whether or not their expectations are being met.
    In this session, they will explore:
    - Where is CASB on the adoption curve?
    - How security professionals use CASB for visibility, compliance, data security, threat protection and access control
    - Effectiveness and next evolution of CASBs
  • Apache Kafka® Use Cases for Financial Services
    Apache Kafka® Use Cases for Financial Services
    Tom Green, Senior Solutions Architect, Confluent. Recorded: Nov 20 2020 62 mins
    Traditional systems were designed in an era that predates large-scale distributed systems. These systems often lack the ability to scale to meet the needs of the modern data-driven organisation. Adding to this is the accumulation of technologies and the explosion of data which can result in complex point-to-point integrations where data becomes siloed or separated across the enterprise.



    The demand for fast results and decision making, have generated the need for real-time event streaming and processing of data adoption in financial institutions to be on the competitive edge. Apache Kafka and the Confluent Platform are designed to solve the problems associated with traditional systems and provide a modern, distributed architecture and Real-time Data streaming capability. In addition these technologies open up a range of use cases for Financial Services organisations, many of which will be explored in this talk. .



    By attending this talk you will develop a new understanding of:



    •How Apache Kafka enables a 360 view of the customer

    •How to provide a back bone for distribution of trade data

    •How Kafka and Confluent Platform enable you to meet regulatory requirements for trade information, payments, liquidity

    •How to overcome security concerns with SIEM

    •How to integrate mainframe data with event streaming and the cloud

    •How to reduce fraud with real-time fraud processing, fraud analytics and fraud notifications.

    •How to Develop and enhance microservices.
  • SD-WAN Extends Into the Realm of SAS
    SD-WAN Extends Into the Realm of SAS
    Shefali Chinni, Senior Product Marketing Manager Recorded: Nov 20 2020 49 mins
    Advancing your digital transformation means adopting new technologies and deploying infrastructure in new ways. Whether you’re moving to the cloud or deploying on-premises, transforming your network is essential to a successful transformation. In this live webcast, we will update you on our network transformation vision, which, for the 3rd year in the row, has been named a leader in the 2020 Gartner Magic Quadrant for WAN Edge Infrastructure.
    Join us to learn about the new Secure Access Service Edge (SASE) platform that delivers intrinsic security and Zero Trust Network Access (ZTNA) for organizations embracing cloud and SaaS. Along with SD-WAN work from home (WFH) subscriptions, you can now provide your remote workforce with the benefits of network optimization -- assured application performance with advanced security at an affordable cost.
  • 東映アニメーション担当者に聞く、クラウドシフトを支えるモバイル活用基盤のつくり方
    東映アニメーション担当者に聞く、クラウドシフトを支えるモバイル活用基盤のつくり方
    東映アニメーション株式会社 経営管理本部 情報システム部  賀東 敦 氏 / Jamf Japan 松嶋 真悟 Nov 24 2020 5:00 am UTC 60 mins
    #Mac #複数拠点のデバイス管理 #リモートワーク #セキュリティ #Jamf Pro #Active Directory
    #クリエイティブ #製作

    アニメ制作やキャラクター商品開発・販売など、幅広い事業を行う東映アニメーション株式会社。

    同社は、複数拠点でアニメ制作が進行し、リモートワークも導入されています。これらは、従業員が安心して業務に集中できる生産性高い環境を提供するために、モバイルを活用して様々な機能をクラウドへ移行することで実現されました。IT基盤の構築・運用を担当される賀東 敦氏から、IT環境のクラウドシフトの取り組みついてお話を伺います。

    Jamf Pro 導入前の製品検証、導入プロセス、そして、運用まで。Jamf Pro によって現場の力を最大限に高めるためにフォーカスしたポイントや、乗り越えた課題まで、率直なお話を弊社Jamfの松嶋が聞き手として加る、対談形式のウェビナーです!

    このような方におすすめ
    ・複数拠点に渡ったIT環境やリモートワークの対応について事例を知りたい
    ・オンプレミスからクラウドへの移行に関する事例を知りたい
    ・複数拠点で働く従業員の運用支援とその具体的な施策を知りたい

    入力いただいた情報は、Jamf および Jamf のパートナー企業からの電話、Eメール、郵送物などにより、Jamf のサービス、イベント・セミナー、その他業務にお役立ていただける情報のご案内に利用します。個人情報は、Jamf のプライバシーポリシーに基づいて適切に取り扱います。個人情報の利用は、各案内でお知らせする手順に従って停止することができます。
  • Delivering Secure, Agile and Resilient Networking with SD-WAN
    Delivering Secure, Agile and Resilient Networking with SD-WAN
    Dustin Kehoe, GlobalData | Peter Bocquet, VMware | Richard Thomas, Telstra | Anoop Mohanan, Telstra Nov 24 2020 6:00 am UTC 45 mins
    The global pandemic has resulted in an overnight shift to remote working and cloud migration for many organisations, putting significant strain on global infrastructure. Networks now need to balance speed, resiliency and security with the end user experience.

    This was seen in a recent survey of global IT managers shown that network investments are a high priority in 2020 and 2021(1).

    To minimise unplanned network downtime, which is the single biggest cost and inhibitor to innovation and transformation, businesses need a strong network underlay as much as the overlay.

    Join us for a fireside chat with GlobalData, VMware and Telstra, to understand the major shifts in corporate networking strategy and how to successfully implement it.

    Agenda
    1. Overview of the corporate networking market
    2. Current enterprise challenges – enable employees with Work @Home, video conferencing, VOIP calling and benefits of an SD-WAN overlay.
    3. Benefits of an SD-WAN underlay with Zero Preventable Downtime risk management
    4. Differences between network resiliency and security
    5. Modern managed services – what’s changed?
    6. What a successful networking strategy looks like

    (1) GlobalData Research on ICT Spending: Pre and Post-Covid, 2020. n=4,181

    By registering, you give consent to receive marketing and promotional emails from VMware and its partners. Feel free to share this event with your friends and colleagues.
  • DevSecOps in a Cloud, Containers and Kubernetes World
    DevSecOps in a Cloud, Containers and Kubernetes World
    Helen Beal - Chief Ambassador at DevOps Institute | Alan Murphy - F5 | Gemma Allen - Barracuda | Mark Peters - Technica Nov 24 2020 8:00 am UTC 59 mins
    Results from the RightScale 2019 State of the Cloud Report found that “Container use is up, and Kubernetes use is skyrocketing. The use of Docker containers continues to grow, with adoption increasing to 57 percent from 49 percent in 2018. Kubernetes achieving even faster growth, increasing from 27 percent to 48 percent adoption.”

    With the increasing move to Kubernetes and beyond, it's essential that DevSecOps best practices are incorporated. Join episode 6 of Day-To-Days DevOps, where host Helen Beal will be chatting to guests from the world of DevSecOps, cloud, containers and Kubernetes about:

    - How to shift left to a DevSecOps mindset
    - What the best practices are to protect your Kubernetes environment without compromising agility
    - Practical tips to overcoming the challenges of implementing DevSecOps in the cloud

    Guests include:
    Gemma Allen - Cloud Solutions Architect, Barracuda
    Alan Murphy - Senior Product Manager, F5
    Mark Peters - Lead Information Assurance/Security Engineer, Technical
  • Malware Evasion: Why It Works
    Malware Evasion: Why It Works
    Guy Rosefelt - Sangfor Product Marketing Director Nov 24 2020 8:00 am UTC 60 mins
    Everyone has NGAV, EDR, anti-malware, etc. installed. Yet, ransomware and APTs still infiltrate and infect organizations with abandon. In this webinar, Sangfor will discuss the most common techniques next-gen malware uses to evade detection and provide recommendations on what your endpoint protection should do to better detect and block the sneaky malware.
  • Kosten nachhaltig optimieren in AWS
    Kosten nachhaltig optimieren in AWS
    Markus Schmid and Christian Elsenhuber Nov 24 2020 9:00 am UTC 68 mins
    Oftmals wird das Thema der Kosten erst in zweiter Instanz analysiert, da andere Dinge im Vordergrund stehen – genau da setzt dieses Webinar an, erfahren Sie alles zu Kostenoptimierung in AWS.

    In vielen AWS Implementierungen stehen die neuen Möglichkeiten und die Innovation im Vordergrund. Das Thema Kosten kommt häufig erst dann zur Sprache, wenn die monatliche Abrechnung eintrifft. Wenn die Kosten das geplante bei weitem übersteigt, werden kurzfristige Aktionen durchgeführt um die Kosten in den Griff zu bekommen: Abschalten von ungenutzten Diensten, Verschieben von geplanten Projekten oder den Entwicklern werden Berechtigungen genommen. In diesem Webinar möchten wir aufzeigen welche Sparmaßnahmen es grundsätzliche gibt, welche Optionen AWS konkret anbietet und wie diese am besten eingesetzt werden können, um damit langfristig die Kosten zu optimieren. Dadurch kann nicht nur Geld eingespart werden, sondern auch Innovation weiter vorangetrieben werden und Budget für Neues eingesetzt werden.

    Highlights aus der Agenda:
    Möglichkeiten der Kostenoptimierung
    Optimierung der Kosten mit AWS
    Werkzeuge die bei der Optimierung helfen
    Optimierung einer AWS Umgebung am konkreten Kundenbeispiel

    Ihre Referenten:
    Marcus Schmid, Solution Architect, Rackspace Germany GmbH
    Christian Elsenhuber, Solution Architect, AWS
  • Archiving Innovations: Meeting today’s Compliance and e-discovery needs
    Archiving Innovations: Meeting today’s Compliance and e-discovery needs
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Competitive Specialist, Proofpoint Nov 24 2020 9:30 am UTC 37 mins
    Economics, social and regulatory pressures have fundamentally changed the demands on archiving solutions. This creates new challenges and opportunities for the enterprise – from need of supervision to help ensure regulatory compliance and provide proof of compliance, to broader application of the technology. For instance, the monitoring of business digital communications for opportunities for training or targeted actions can help improve employee performance, reduce policy violations, and much more.
    Welcome to the next wave in Archiving Compliance technologies.
    In this Live Webinar, we’ll discuss how archiving has evolved to address today’s information management challenges and unveil how you can improve information governance, compliance and financial position by:
    Streamlined e-discovery to increase efficiency and reduce costs.
    Refined insights expand visibility for mitigating risks.
    Enhanced regulatory compliance supervision to improve review accuracy across email, social, and enterprise collaboration data.
    As an added bonus, we’ll wrap up the webinar with a live demo of Proofpoint Enterprise Archive, including key features in E-Discovery Analytics and Intelligent Supervision.
  • CMSIS: Practical use in embedded software development
    CMSIS: Practical use in embedded software development
    Vladimir Marchenko, Product Manager MDK Core and Middleware, Arm & Bruno Castelucci, Principle FAE, Arm Nov 24 2020 9:30 am UTC 60 mins
    Arm creates standards, tools and design flows that help developers create reliable and secure products faster. Cortex Microcontroller Software Interface Standard (CMSIS) helps to:

    - Improve the software portability and re-usability
    - Move quickly through product development from evaluation platform to bespoke production hardware
    - Easily manage software components over the product lifecycle
    - Optimize the resource use to minimize system cost
  • Prevent IT Issues with Holistic Visibility Monitoring
    Prevent IT Issues with Holistic Visibility Monitoring
    Pierrick Martel, Global Product Marketing Manager and Eileen Lee Lavergne, Technology Marketing Consultant Nov 24 2020 10:00 am UTC 38 mins
    While you’re working tirelessly to see your organization through the never ending journey to modern IT, you're hitting blind spots in your hybrid infrastructure.
    Gartner says most IT teams share your pain. Teams are bogged down by a growing expanse of too many tools and no way to see from the cloud to the edge.

    This 45-minute webinar will deliver the strategies and processes that will rally your team around a single, sharable view of the IT system, helping teams to:
    • Anticipate downtime
    • Cut down on complexity
    • Achieve against SLAs
    • Improve accountability and clarify lines of responsibility
    • Focus on adding value – not just fixing the issues
    • Share actionable insights to fix errors before they happen
  • 5G Waves of Opportunity for Enterprise Applications
    5G Waves of Opportunity for Enterprise Applications
    John Delaney, Associate VP, Mobility IDC & Johan Arts, Senior VP Equinix EMEA Nov 24 2020 10:00 am UTC 35 mins
    The advent of 5G promises an acceleration in the process of digital transformation by providing a pervasive, high-performance connectivity fabric. For the first time, 5G offers enterprise networking that combines the performance and reliability of wireline with the flexibility and scalability of wireless. Everything can become mobile, and everything can become part of the enterprise's diverse, expanding ecosystems.


    This webinar, co-hosted by IDC and Equinix, provides an overview of 5G's capabilities, and of the ways in which they can be harnessed to drive operational transformation. You will learn:


    • What new capabilities 5G brings to networks, and how those capabilities make 5G the first enterprise-grade mobile infrastructure
    • How enterprises are already using 5G to build competitive differentiation, in verticals ranging from manufacturing, through healthcare to the public sector
    • How advanced 5G capabilities will underpin the transformation of enterprises into hubs at the centre of digital ecosystems
    • What you can do now to get ready for the 5G revolution
  • Pluralsight Cloud Labs Workshop
    Pluralsight Cloud Labs Workshop
    Anthony Campanale, Principle Solutions Architect Nov 24 2020 10:00 am UTC 45 mins
    With Cloud environments becoming the default for many organisations, finding a safe place to develop the associated tech skills is key. Pluralsight’s Cloud Labs enable learners to get hands-on practice in a provisioned cloud environment, in the vendor sandbox of their choice.

    Join Pluralsight’s Anthony Campanale on Tuesday November 24th at 10am GMT to demonstrate how you can develop practical cloud experience with step-by-step instructions and sandboxed environments for public cloud providers (e.g. AWS, Azure, Google Cloud Platform).
  • Carrier Grade Networking at the Edge
    Carrier Grade Networking at the Edge
    Terry Young, Director Service Provider Product Marketing; Siddhartha Aggarwal, Lead Product Marketing Engineer Nov 24 2020 10:00 am UTC 59 mins
    While service providers, enterprise transform networks to telco cloud and distributed edge architectures, traffic and subscriber volumes keep climbing. The global pandemic has added to that growth, pushing Internet traffic up 50% in some markets. Service providers, enterprise and educational institutions across the world are scrambling to increase capacity and strengthen security as subscribers work and play more at home, enterprises shift to on-line business models and higher education organizations support remote learning. One area that can quickly get overwhelmed is the CGNAT infrastructure – that capability in service provider and enterprise networks that manages the pool of IPv4 and IPv6 addresses.

    During this session we are going to discuss the challenges now faced by service providers, including real world case studies.. We will also review some of the CGNAT features and products that comprise A10 Networks Thunder CGN solution and can help optimize existing CGNAT infrastructure, deploy capabilities in new edge architectures, meet short term capacity requirements, extend the IPv4 lifetime and transition to IPv6.

    The session will cover:

    •Impact of global pandemic on service provider, enterprise and education institution networks
    •Market and Network Technology Trends:
    •On-going need for CGNAT and IPv4 – IPV6 Migration
    •Security and capacity Challenges in distributed architectures
    •Real World Case Studies
    •A10 Networks Thunder CGN Solution
  • Return to Work Action Plan: Wellness, HR, and IT Infrastructure
    Return to Work Action Plan: Wellness, HR, and IT Infrastructure
    Simon Ratcliffe, Ensono | Mike Kiersey, Dell Boomi | Yvonne Stewart, Dell I Sophie Bryan, Ordinarily Different Ltd. Nov 24 2020 10:00 am UTC 60 mins
    "Work Reimagined" For A Hybrid Workforce Episode 2

    The new world is hybrid, and the working environment will never return to how it once was. With this in mind, how can you lead a return to work in a way that reflects the new normal?

    When planning a return to the office, there are a number of key considerations. Leaders must consider how to drive strategy in a way that protects and supports the mental wellbeing of their employees, as well as their physical health. It is important that moving forward, we take the lessons from the pandemic and the hybrid model of work, and apply them to the workplace. Allowing employees to work remotely, supporting their home life, and continuing to push a collaborative effort is key to keeping employees productive and healthy.

    As well as prioritising employee mental health, it is important that organisations have the iT infrastructure in place to monitor and log the data needed for HR and facilities to maintain the proper health and safety restrictions. HR titles will now be intrinsically linked in order to collaborate and ensure the most stringent safety standards. However, your infrastructure must support this. With Boomi solutions, those in HR will be able to track data securely and efficiently, with the ability to interpret data and set up a safe and supportive workplace, keep offices and remote employees connected, and ensure that the digital workspace is safe from disruption.

    In this session we will explore:
    - How to champion the mental wellbeing and wellness of your employees while planning a return to the office
    - How to optimise your existing IT infrastructure to support HR as they log and monitor data, keeping those in the workplace safe
    - How can we ensure that a return to the workplace helps drive social impact, like reducing our carbon footprint and emissions
  • 2020 Global Encryption Trends: Are you protecting what matters the most?
    2020 Global Encryption Trends: Are you protecting what matters the most?
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; John Grimm, VP Strategy & Business Development, nCipher Security Nov 24 2020 12:00 pm UTC 60 mins
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.

    The 2020 Global Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.

    Join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and John Grimm, VP of Strategy and Business Development at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges. You'll take away:

    - Data to benchmark your encryption strategy by industry and by country
    - Where organizations are using Hardware Security Modules for increased trust and key protection
    - Features of encryption solutions that provide the most value
  • Building Highly Scalable Apps with Okta
    Building Highly Scalable Apps with Okta
    Jeremie Certes, Senior Product Marketing Manager, Okta Nov 24 2020 2:00 pm UTC 31 mins
    Building a modern app requires the perfect blend of technologies that enable scalability and security for your customers. Some organizations build these solutions themselves, spending a large amount of developer resources on security, authentication, authorization, and user management.

    But this approach can mean less time spent on an app’s core functionality. That’s why Okta’s Customer Identity offering is different. It enables developers to stay up-to-date with scalability and security needs out of the box, while still allowing for flexible customizations that directly address your organization’s needs.

    Watch this on-demand webinar to learn:

    - How to reduce development time for your app’s digital experiences
    - The components of a modern customer identity and access management solution
    - How Okta can eliminate your app’s security gaps
  • Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Steve Carter | Senior Product Marketing Manager, Nutanix Nov 24 2020 2:00 pm UTC 43 mins
    Converged infrastructure is several steps up from legacy infrastructure, it loses out when it comes to the cost-saving, application-securing, VM-moving power of hyperconvergence.

    Join us for this webinar where Steve Carter, Senior Product Marketing – Nutanix, will take you through how you can simplify your IT infrastructure.

    In this webinar you will learn:
    • What are the primary benefits of HCI compared to Converged Infrastructure?
    • How WebScale IT infrastructure innovations make HCI possible
    • How HCI enables IT to be agile and cost conscious in the face of business uncertainty
  • Best Practices - Implementing Cloud-based Data Protection
    Best Practices - Implementing Cloud-based Data Protection
    Colin West - EMEA SE Director, Druva Nov 24 2020 2:00 pm UTC 20 mins
    Join Druva for a 30 minute briefing and learn what to look for when evaluating cloud-based Data Protection solutions. We’ll discuss the best practices for a backup solution that protects your on premise data whilst ensuring the data protection repository is away from your network.
    Register Now

    Storage Managers, Data Protection administrators, and anyone responsible for data would be interested in this webinar on Best Practices. Register and learn
    - Why data protection works best in a cloud-native environment
    - Real-world solutions architecture will be discussed with respect to Data protection
    - Modernize your Data Protection by considering what to look for in a cloud-based solution

    We expect the session to be well subscribed, so register now!
  • Email security threats - how to protect your business, people and data
    Email security threats - how to protect your business, people and data
    Nishant Taneja & Olesia Klevchuk, Product Marketing, Barracuda, Bryan Glick, Editor in chief, Computer Weekly Nov 24 2020 2:00 pm UTC 42 mins
    Traditional email security solutions aren’t enough to protect businesses anymore. Strategies and processes need to be in place to actively defend your business, people and data against sophisticated email threats.

    Join Bryan Glick, Editor in chief at Computer Weekly, Olesia Klevchuk and Nishant Taneja, Product Experts from Barracuda as they explore strategies to improve your email protection and answer questions:

    - Why is email still the #1 threat vector?
    - What types of attack strategies are cybercriminals using during the pandemic?
    - How can IT security professionals make sense of the threat landscape?
    - How does remote work change the perspective on security?
    - What threats should end users be on the lookout for?
    - With email communication and messaging becoming integral to remote work, what can employees do to stay safe?
    - Why do traditional defenses fail to detect and stop advanced attacks?
    - Should organizations deploy 2FA to prevent account takeover?
    - When threats do get through, how should incident response work?
    - Beyond technology tools, how can organizations improve their defenses?

    Save your spot now.
  • The Top Seven Tips for Securing SAP SuccessFactors
    The Top Seven Tips for Securing SAP SuccessFactors
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud Nov 24 2020 3:00 pm UTC 60 mins
    Numerous organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.

    To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.

    In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
    - Maintaining continuous visibility into applications usage
    - Controlling access from trusted locations and devices
    - Maintaining optimized protection wherever data travels
    - Enforcing policies to ensure compliance [ex. GDPR]
    - Encrypting any protected data with full key control
    - Detecting threats including malware and compromises
    - Performing context-driven forensic investigation

    Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
  • Best Practices für die Verwaltung von TLS-Zertifikaten im Unternehmen
    Best Practices für die Verwaltung von TLS-Zertifikaten im Unternehmen
    Sven Skerka, Senior Strategic Account Manager und Athar Anjum, Enterprise Security Specialist, DigiCert Nov 24 2020 3:00 pm UTC 45 mins
    TLS/SSL-Zertifikate gelten nach wie vor als globaler Standard zum Schutz der Kommunikation zwischen IT-Netzwerken, Geräten und Anwendungen. Trotzdem kommt es immer wieder zu Ausfällen, entweder durch menschliche Fehler oder aufgrund schlecht organisierter TLS-Lebenzyklusprozesse. Nehmen Sie am Webinar von DigiCert zum Thema „Best Practices für die Verwaltung von TLS-Zertifikaten im Unternehmen“ teil. In diesem 30-minütigen Vortrag mit anschließender Live-Beantwortung von Fragen geben unsere Experten Sven Skerka und Athar Anjum Einblicke in Best Practices für das TLS/SSL-Management und stellen ein Sicherheitskonzept mit vier Phasen vor:

    • Identifikation und Analyse Ihrer TLS-Umgebung
    • Fehlerbehebung und Kontrolle Ihrer Zertifikate
    • Sicherung Ihrer Ressourcen mittels Standardisierung und Automatisierung
    • Tools und Taktiken zur Überwachung

    Verpassen Sie nicht diese Gelegenheit, mehr über eine robuste Strategie zur TLS/SSL-Zertifikatsverwaltung zu erfahren und Ihre Fragen direkt an ausgewiesenen Experten aus diesem Bereich zu stellen.
  • Begin your hybrid cloud journey with Red Hat and AWS
    Begin your hybrid cloud journey with Red Hat and AWS
    Dan Juengst, Senior Principal Technology Evangelist, Red Hat and David Duncan, Partner Solution Architect, AWS Nov 24 2020 4:00 pm UTC 61 mins
    Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud environment, you often end up being overwhelmed and discover that vendors don’t use the same language when talking about them.

    Detailed planning with Red Hat and Amazon Web Services (AWS) can help you successfully create, scale, and migrate innovative applications to an agile hybrid cloud environment as big as you need and available whenever and wherever you need it.

    In this webinar, we’ll:
    •Share a series of questions you might consider when planning your hybrid cloud journey.
    •Discuss how the Red Hat and AWS partnership can simplify a potentially complicated journey.
  • What’s New in Apple OS Upgrades: macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14
    What’s New in Apple OS Upgrades: macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14
    Garrett Denney, Jamf Nov 24 2020 4:00 pm UTC 36 mins
    Exciting operating system (OS) announcements came out of Apple's Worldwide Developers Conference. And as promised, macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14 will be coming to an Apple device near you. Are you ready?

    In our webinar, What's New in Apple OS Upgrades, we’ll show you what these new operating systems offer for productivity, security and management capabilities.

    We'll cover:
    - A brief overview of macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14
    - New management functionality and what it means for IT
    - How to seamlessly upgrade your Apple fleet
    - How same-day support benefits IT stakeholders
  • How to shape your data centre for the new normal
    How to shape your data centre for the new normal
    Data centre experts from BT and Cisco Nov 24 2020 4:00 pm UTC 21 mins
    The new normal has accelerated the pace of change. Digital transformation means that your existing data centre needs to deliver more.

    In the next webinar of our 'Shape the future of infrastructure' series, we’ll explore:
    •how to implement new technology in private data centres
    •how to get cloud-like agility within your data centre
    •the features of Cisco ACI and what it delivers.

    Our data centre optimisation portfolio expert, Charles Greenaway, will be joined by Louise O’Neil, head of new customer sales and Gareth Furse, an account manager in solutions SP sales from Cisco to offer their views on the options available to you.

    Speakers:
    •Jonathan Sumner, Head of marketing, Network, Cloud & Consultancy, BT
    •Louise O’Neill, Director, Banking & Financial Services, BT
    •Charles Greenaway, Customer CTO, BT
    •Gareth Furse, Service creation & portfolio manager, Enterprise networking, Cisco
  • IoT [Ep.4] Use Case Drilldown: Healthcare, Manufacturing, and Smart Buildings
    IoT [Ep.4] Use Case Drilldown: Healthcare, Manufacturing, and Smart Buildings
    Johna Till Johnson, CEO and Founder, Nemertes Research Nov 24 2020 4:00 pm UTC 60 mins
    Some of the top use cases for IoT are Healthcare, Smart Buildings, and IIOT (industrial IoT). How are companies approaching these use case? What security measures are they taking? How well are the teams driving these use cases engaged with one another, and with the IT, cybersecurity, and other technology teams? This webinar drills down into the current state of these critical use cases, and provides technology leaders with insight into how companies are organizing around delivering IoT.
  • CIF Talks: Cyber Security Considerations - Working From Anywhere! #WFA
    CIF Talks: Cyber Security Considerations - Working From Anywhere! #WFA
    Alex Hilton, CEO of the Cloud Industry Forum and Rob May, MD at Ramsac Nov 24 2020 4:00 pm UTC 60 mins
    Join Alex Hilton, CEO of the Cloud Industry Forum and Rob May, MD at Ramsac as they discuss the cyber security considerations of working from anywhere.
  • Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product Manager Nov 24 2020 4:00 pm UTC 44 mins
    Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

    * Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
    * How to set triggers based on thresholds important to your business
    * Set feature flags to control specific parts of your environment to reduce stress levels.

    See a Honeycomb demo, ask questions and learn more.