Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Red Hat & Helevetia Recorded: Jul 19 2019 32 mins
    Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.

    In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:

    • Prometheus to gather the metrics for the platform.
    • AWS CloudWatch to gather metrics for additional components/services.
    • Grafana to centralize from multiple sources and visualize all of the cluster metrics.
    • Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
    • Slack to notify the operations team.
    • Dynatrace for application and end-to-end monitoring.
  • TNS Special Podcast with Tom Gillis & Sylvain Cazard
    TNS Special Podcast with Tom Gillis & Sylvain Cazard
    Tom Gillis and Sylvain Cazard, VMware Recorded: Jul 19 2019 26 mins
    Hear from Industry veteran, Tom Gillis, Senior Vice-President and General Manager of VMware’s Network and Security Business Unit during his recent visit to London for a fascinating and wide-ranging conversation: his extensive background in the industry, and his views on how digital transformation is driving a fundamental shift in the way we architect networks and conceptually approach IT security.

    You’ll also hear from the horse’s mouth about VMware’s latest star launches in the Networking and Security space: NSX-T 2.4, the Service -Defined Firewall and how we confidentially expect that these will revolutionise the market.

    Taking part to give the perspective from this side of the Atlantic is Sylvain Cazard, Vice-President of VMware’s Software-Defined Datacenter business in EMEA.
  • The (virtualised) network, providing a new approach to security podcast
    The (virtualised) network, providing a new approach to security podcast
    VMware’s Scott McKinnon, Business Solutions Architect and Garry Owen, Networking & Security Solutions Marketing Recorded: Jul 19 2019 27 mins
    The second fastest growing cost in IT is security. The fastest? The financial impact of breaches. Something isn’t working, which means a new approach is needed.

    Hear from VMware’s Scott McKinnon and Garry Owen as they talk about the end of castle walls, the beginning of app defence, and what you need to do to secure your business in the era of ever-evolving threats.
  • Developing and Deploying Applications in a Multisite Hybrid Cloud
    Developing and Deploying Applications in a Multisite Hybrid Cloud
    Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery Service Recorded: Jul 19 2019 46 mins
    You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.

    In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.

    We’ll cover:

    •The Red Hat IT standard development and deployment pattern.
    •How to automate your CI/CD delivery pipeline, from merge request to release.
    •How to implement basic supply chain security to support application integrity.
    •How we deal with security and change management requirements.
    •The tools and processes needed to implement this model.

    This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
  • How is Security Transforming?
    How is Security Transforming?
    Featuring Sylvain Cazard, VP EMEA, Networking & Security Recorded: Jul 19 2019 4 mins
    Is your business struggling to secure its IT as it goes through digital transformation?

    Sylvain Cazard, VP EMEA, Software Defined Datacenter, Networking & Security at VMware EMEA explains how the current security model is broken, with businesses managing too many security vendors and focusing too heavily on a reactive approach.
    With intrinsic built-in security, VMware’s infrastructure means you’re better protected, so you can focus more on innovation and performance.

    Find out how VMware could transform your businesses’ security:
    https://blogs.vmware.com/emea/en/priority/security/
  • Ask an Expert: Ansible Network Automation
    Ask an Expert: Ansible Network Automation
    Ajay Chenampara, Senior Specialist Solutions Architect, Ansible Network Automation, Red Hat & Andrius Benokraitis, Principal Recorded: Jul 19 2019 54 mins
    Check out this webinar if you're interested in the latest questions around network automation. Want more? Visit our Github Community for Network Automation (https://github.com/network-automation). Want to join the Github Community? Have a question? Email us at ansible-network@redhat.com. Register for an upcoming Ask an Expert webinar. Any question - from beginner to advanced - is welcome, and will be addressed in an open forum with Ansible staff.
  • Optimizing for Success in the Cloud
    Optimizing for Success in the Cloud
    Meg Ramsey, Vice President Cloud Services - Sungard AS & Bill Martorelli, Principal Analyst - Forrester Recorded: Jul 19 2019 28 mins
    This 30-minute webinar, Optimizing for Success in the Cloud, features guest speaker Forrester Principal Analyst, Bill Martorelli, talking about the latest trends in digital transformation and how accomplishing success doesn’t have to disrupt ongoing operations. Sungard AS’ Meg Ramsey discusses the Sungard AS solutions that deliver innovative digital services your business needs with the quality your customers demand.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Dirk Thelen und Dirk Schüler Recorded: Jul 19 2019 49 mins
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • Manufacturing Intelligence: Keep Your Processes Under Control
    Manufacturing Intelligence: Keep Your Processes Under Control
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. Danny Stout, Sr. Solutions Consultant, TIBCO Softwar Recorded: Jul 18 2019 8 mins
    The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products.

    Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs.

    What You Will Learn:

    Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes
    How multi-variate statistical process control can help to detect deviations from a baseline
    How to monitor in real time the OEE and produce a 360 view of your factory
    The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jul 18 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red Hat Recorded: Jul 18 2019 44 mins
    The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?

    Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.

    In this webinar, we’ll cover:

    •Challenges of brownfield migrations.
    •Common pitfalls.
    •Things to consider before, during, and after migration.
    •Phases of the example migration.
  • Choosing the Right Cloud HSM
    Choosing the Right Cloud HSM
    Gary Marsden, Senior Director of Data Protection Services at Thales Recorded: Jul 18 2019 44 mins
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Recorded: Jul 18 2019 61 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • Hybrid Identity and What it Means to You
    Hybrid Identity and What it Means to You
    Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuth Recorded: Jul 18 2019 42 mins
    Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.

    Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.

    Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.

    The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
  • Dell Technologies Cloud Powered by VMware
    Dell Technologies Cloud Powered by VMware
    Andrew Duce – VMware Director of Solutions Product Marketing and Mike Hamilton - Dell Technologies Sales Recorded: Jul 18 2019 52 mins
    Dell Technologies makes it easy to deploy and run applications anywhere without having to refactor them. We help customers deliver integrated cloud infrastructure (compute, storage, networking & security) on premises, or in the cloud, fast and reliably. The key to unlock this is to have consistent infrastructure and operations across clouds.

    Click here for more information:
    https://www.dellemc.com/en-us/solutions/cloud/dell-technologies-cloud.htm
  • Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Cherie Martin - Product Marketing, Aruba Recorded: Jul 18 2019 54 mins
    Join us July 18th at 10am PDT as we discuss how to:
    •Consistently deliver high-quality network and application services
    •Reduce help desk tickets
    •Identify and resolve issues before they affect your users

    This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.

    Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
  • Identity is a Game Changing Model for Cloud Security - So What is it?
    Identity is a Game Changing Model for Cloud Security - So What is it?
    Mark Jimenez, Technical Marketing Engineer, Aporeto Recorded: Jul 18 2019 63 mins
    Migrating workloads to the cloud can be a daunting task for many enterprise organizations. This is especially challenging when trying to combine an on-prem static environment that relies on IP addresses for security with the dynamic nature of the cloud, where IP addresses are ephemeral by design and any unsecured endpoint can leave your business exposed. Have you been thinking, if only there was an easier way to make security uniform across my entire cloud/hybrid environment, is backward compatible, future built, easily scales, infrastructure agnostic and provides end-to-end visibility all within a single tool? The answer is YES! The solution is Identity!


    Aporeto uses rich identity (not IP addresses) to eliminate the constraints from traditional Firewalls, VPNs, Cloud Security Groups, SDNs, and virtual appliances. Aporeto fingerprints servers, services, and workloads to generate actual application identity. Application identity enables stronger security because it only allows sanctioned whitelist communications. Security policies remain portable and persistent. Aporeto enables distributed workload protection with centralized visibility and control.

    In this webinar you will learn:
    •How Aporeto uses identity context, vulnerability data, threat monitoring and behavior analysis to build and enforce authentication, authorization and encryption policies for applications.

    •How Aporeto auto-generates a unique workload “fingerprint” by combining workload metadata from any available system and user identity data from OIDC-compliant providers.

    •How Aporeto allows you to microsegment and secures your network across heterogeneous infrastructures that include: containers, Kubernetes, serverless, service mesh, and VM architectures for a Zero Trust security posture.

    Presenter:
    Mark Jimenez, Technical Marketing Engineer, Aporeto
  • CDC for Snowflake
    CDC for Snowflake
    Sean Anderson - Director of Product Marketing at StreamSets | Dash Desai - Technology Evangelist at StreamSets Recorded: Jul 18 2019 58 mins
    Your cloud database is helpful only if it is real-time, which means looking beyond migration and batch uploads. Whether synchronous and asynchronous syncing, we explore how users can design robust change/data/capture (CDC) jobs between Snowflake and on-premise data warehouses. We will configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service. We will show an initial load with full table creation and a schedule to initiate incremental data captures.

    In this webinar we will:
    -Show how to configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service.
    -Show an initial load with full table creation and a schedule to initiate incremental data captures.
  • The Problems with Your IT Problem Management – And How to Solve Them
    The Problems with Your IT Problem Management – And How to Solve Them
    Bill Talbot, Mike Bombard & Ryan Schmierer Recorded: Jul 18 2019 55 mins
    There are tasks being performed and called “IT problem management” at every type and size of business. But most of those fall short of the goals of true, proactive problem management – to resolve incidents, identify and address their root causes, and reduce occurrence and recurrence of incidents and problems.

    How best to ensure your IT people, processes, and technologies are adequately prepared to deliver proactive problem management?

    Learn more from experienced experts at this informative, valuable one-hour webinar.

    Speakers:

    • Bill Talbot – trusted adviser to more than 150 companies over more than 20 years, focused on IT asset management (ITAM)
    • Mike Bombard – Chief Operating Officer, Virima Technologies
    • Moderator: Ryan Schmierer, a recognized industry thought leader in the areas of Digital Transformation, IT Strategy, Service Management and Operations.

    If you are an IT decision maker, or a change, configuration, or incident manager, you’ll want to attend this event. Bring your questions and experiences for a spirited discussion, and leave with ideas you can use.
  • Cut the Digital Transformation Fluff: Creating Metrics That Matter
    Cut the Digital Transformation Fluff: Creating Metrics That Matter
    Jeffrey Hammond, Forrester Research & Patrick Feeney, Healthcare Services Corporation Recorded: Jul 18 2019 63 mins
    As the old adage goes, “you can’t manage what you can’t measure.” But what if the measurements are part of the problem? After all, you can move the needle on what you measure, but there may be unanticipated outcomes. When it comes to transforming how an organization delivers software, how you measure success also needs to change.

    Despite a marked adoption of agile development practices in the last five years, Forrester Research found that developers haven’t made much progress at delivering software faster. What’s the disconnect? Forrester has found a number of interrelated factors behind organizations that outperform in software delivery. One of them is metrics.

    Join this webinar with special guests Jeffrey Hammond, Forrester Research Analyst, and Patrick Feeney, Senior Director of IT Digital Products at Healthcare Services Corporation (HCSC), to learn:

    ● The types of metrics high-performance software teams are using
    ● Which metrics are counterproductive to improving software delivery
    ● How HCSC has used metrics to manage software delivery change
    ● Which roles should be using which metrics and when

    Speakers:
    Jeffrey Hammond, Vice President and Principal Analyst, Forrester Research
    Patrick Feeney, Senior Director, IT Digital Products, Healthcare Services Corporation
  • Explore the Benefits of Endpoint Detection and Response Tools and Services
    Explore the Benefits of Endpoint Detection and Response Tools and Services
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec Recorded: Jul 18 2019 58 mins
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts, including:

    - Trends impacting threat detection efforts
    - How organizations are using EDR and MEDR solutions
    - The benefits of using an MEDR service
  • Automating Container Security
    Automating Container Security
    Thomas Robinson, Solution Architect, AWS & Dan Hubbard, CEO, Lacework Recorded: Jul 18 2019 49 mins
    Using containers in AWS enables agile orchestration of application capabilities and require less coordination and oversight than on-premises or virtualization infrastructure. While containers allow you to build and release fast, security teams need to assess how they maintain security for these new capabilities.

    In this session, experts from AWS and Lacework will explain how to use Amazon Container Services to easily deliver applications, and how to automate container security so you can enable your DevOps team to build fast while remaining secure.
  • How to Build A Strong Data Culture & Bring Data to All Levels of Decision Making
    How to Build A Strong Data Culture & Bring Data to All Levels of Decision Making
    Jed Guitno, Senior Analyst, Toyota Jul 22 2019 6:00 am UTC 16 mins
    Jed Guinto began his career as an Aerospace Engineer but in the last 3 years has made a career change into the exciting world of data. Now working at Toyota Australia and currently the Lead Takata Recall Analyst for the largest Safety Recall in Automotive History, he is an avid Tableau lover, evangelist, teacher and online trainer with now well over 100,000 students. His vision for the future is to use Tableau to empower Toyota employees at all levels to solve their own data problems and reduce reliance on BI Teams and external Companies, hence bringing the technology, knowledge and control back to the people.
  • SAP HANA Made Simple with Solutions from Dell EMC
    SAP HANA Made Simple with Solutions from Dell EMC
    Karem Kamal - Sr. SAP Solution Architect – Presales META Jul 22 2019 11:00 am UTC 60 mins
    DELL EMC solutions FOR SAP HANA
  • Modernize Your Network Operations with Network Functions Virtualization
    Modernize Your Network Operations with Network Functions Virtualization
    Pano Xinos, Global Telco Marketing Lead, Red Hat Jul 22 2019 6:00 pm UTC 15 mins
    This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.

    In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.

    OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
  • HIPAA Compliance Risks That Can End Your Business
    HIPAA Compliance Risks That Can End Your Business
    Dr. Ranya Habash Jul 22 2019 7:00 pm UTC 49 mins
    If your organization stores or backs up any data related to medical information – for example, leave of absence data or healthcare claims associated with company personnel records, or if you’re an MSP, customer patient records – you’re subject to HIPAA regulations.

    Further, if you store HIPAA-related data, you’re also a target for hackers. Medical data can be worth 10x more than credit card numbers to a cybercriminal.

    HIPAA compliance failures and data breaches can end your business. Dr. Ranya Habash, Chief Medical Officer, Everbridge, delivered a riveting keynote on this topic at Connect IT Global, and in this new webinar she shared a doctor’s perspective on what you need to know NOW to understand and mitigate the risks related to HIPAA compliance.

    You’ll learn:

    - How easy it is to fall out of compliance with HIPAA. No matter what your business – you can even be a subcontractor for a covered business associate – you are subject to HIPAA penalties for compliance failures.

    - How costly compliance failures can be. You can be fined a minimum of $100 per violation up to $50,000, even if you were unaware of and couldn’t have avoided breaking HIPAA rules. Penalties jump rapidly, and could put you out of business.

    - The upside to compliance for both internal IT and MSPs. In reducing risk, you become a trusted advisor – and more.

    Learn from Dr. Habash’s unique perspective, and take away approaches to reduce your HIPAA compliance risk.
  • Symantec - Comprehensive about Security
    Symantec - Comprehensive about Security
    Darren Thomson, EMEA CTO Symantec Jul 22 2019 9:00 pm UTC 11 mins
    As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.

    Join Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
  • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief Podcast Jul 23 2019 8:00 am UTC 22 mins
    On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security.
  • Understanding DataOps and Its Impact on Application Quality
    Understanding DataOps and Its Impact on Application Quality
    George Demarest, Senior Director of Product Marketing, Unravel; Chris Riley, Editor, Sweetcode.io Jul 23 2019 9:00 am UTC 59 mins
    Modern day applications are data driven and data rich. The infrastructure your backends run on are a critical aspect of your environment, and require unique monitoring tools and techniques. In this webinar learn about what DataOps is, and how critical good data ops is to the integrity of your application. Intelligent APM for your data is critical to the success of modern applications. In this webinar you will learn:

    The power of APM tailored for Data Operations
    The importance of visibility into your data infrastructure
    How AIOps makes data ops actionable
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Jul 23 2019 10:00 am UTC 60 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jul 23 2019 12:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    • Identify and extract traffic from over 3,000 applications
    • Detect and manage shadow IT and rogue apps
    • Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • The perfect storm: the impact of fragmentation and complexity
    The perfect storm: the impact of fragmentation and complexity
    Darren Thomson, EMEA CTO, Symantec and Dr Chris Brauer Goldsmiths University Jul 23 2019 1:00 pm UTC 32 mins
    Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to keep their business safe. Over a quarter say they are vulnerable to avoidable incidents.

    A brand new survey of over 3,000 cyber security professionals reveals that intense pressure is affecting decision making and increasing the risk of critical mistakes. Put simply, today’s constant state of high alert is unsustainable.

    Join leading psychologist Dr Chris Brauer from Goldsmith’s College, University of London, and Symantec EMEA CTO Darren Thompson, as they present the survey findings, and analyse what they mean for organisations like yours, including:

    -What cyber security leaders and professionals really feel about their roles in 2019
    -How to build a plan to reduce stress and improve cyber security effectiveness
    -Why the Symantec Integrated Cyber Defense Platform can help put your plan into action.
  • Cybersecurity Insights: Security in the Digital Era
    Cybersecurity Insights: Security in the Digital Era
    John Pescatore - Director, SANS Institute Jul 23 2019 1:00 pm UTC 10 mins
    Infrastructure and security have always been linked, but not particularly successful. Why has it failed in the past and what needs to happen now? Learn how organizations can make major advances without adding more complexity
  • Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Jig Ruparel (Principal Strategic Architect) & David Ginsburg (VP, Product and Solutions Marketing) Jul 23 2019 2:00 pm UTC 45 mins
    Are you executing upon your WAN transformation, but are running blind as to whether SD-WAN performance problems are due to the network or your applications? An end-to-end managed SD-WAN service can facilitate an integrated approach to visibility that will help you better understand how your WAN is performing. By offering a unified view into both network and application performance, it enables more effective problem identification and resolution. In addition, a sophisticated customer and partner portal, combined with the SD-WAN service’s back-end orchestration, will remove visibility silos, ultimately increasing productivity and saving you time and money.

    In this webinar, you will learn:

    * How SD-WAN deployments can create visibility islands and their impacts on ensuring application performance

    * How an end-to-end managed SD-WAN service can eliminate these gaps

    * What elements of an SD-WAN service you need to monitor and why

    * What tools are available to integrate network and application visibility, and how they can make the most of your SD-WAN investment

    * Advanced networking analytics guidance
  • Successful compliance and governance in a cloud-first world
    Successful compliance and governance in a cloud-first world
    Alex Hilton, CEO, Cloud Industry Forum and Sean Roberts, General Manager, Public Cloud, Ensono Jul 23 2019 2:00 pm UTC 30 mins
    Every organization is moving to the public cloud in order to scale and innovate. With that comes challenges in securing and monitoring environments as you continue to grow.

    Wherever you are in your cloud journey, if compliance and governance is a concern to you, then participating in this webinar is vital.

    Learn from cloud experts Alex Hilton, CEO, Cloud Industry Forum and Sean Roberts, General Manager, Public Cloud, Ensono on:
    •What does cloud governance truly mean and why it is so important
    •The 3 steps you need to take to make yourself secure and compliant in the public cloud
    •.How can customers effectively brace new cloud technologies to drive innovation
    and more!
  • [Ep. 2]: Cloud Calling - What do Organizations Need to Know To Succeed
    [Ep. 2]: Cloud Calling - What do Organizations Need to Know To Succeed
    Irwin Lazar, VP and Service Director, Nemertes Research Jul 23 2019 3:00 pm UTC 60 mins
    Whether moving to UCaaS or hosted services, successfully moving calling platforms to the cloud requires addressing PSTN connectivity, management, and network performance among other things.
    Failure to do so can lead to poor performance, unhappy employees, and high operating costs.

    In this webinar we'll share insight based on Nemertes' recently released Workplace Collaboration: 2019-20 Research Study and provide practical guidance for IT leaders as they plan or continue their cloud communications journeys. Specifically we'll address the proper role of SIP trunking, SD-WAN, and speciality management tools to ensure success.
  • Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Greg Page, Senior Product Specialist, Hyperscale Solutions, Commvault Jul 23 2019 4:00 pm UTC 60 mins
    Is your organization struggling with inefficiencies from an outdated, scale-up approach to managing and protecting data? The need for a fully integrated data protection appliance to deliver greater availability and scalable services for on-premises applications and data is becoming a necessity.

    Join us as we discuss the benefits of a scale-out infrastructure and how the launch of Commvault HyperScale™ Appliance and Commvault HyperScale™ Software address the shift enterprises are making towards secondary storage as a means to drive key business and IT transformation initiatives.

    In this webinar, you will learn:
    •Scale-out vs. scale-up infrastructures
    •How to leverage a scale–out infrastructure
    •How you can save time and drive greater value with an integrated data protection appliance or reference design architecture
    •How Commvault HyperScale™ Appliance tightly integrates compute, storage, full lifecycle data protection and analytics into a single platform

    It’s time for a fresh approach to solving data management challenges. Register today and learn how you can achieve IT agility through a scale-out infrastructure.
  • DataOps & DevOps: Why Developers Need to Treat Database Code Just Like App Code
    DataOps & DevOps: Why Developers Need to Treat Database Code Just Like App Code
    Stephen O’Grady, RedMonk | Adam Bowen, Delphix | Robert Reeves, Datical Jul 23 2019 4:00 pm UTC 59 mins
    Application developers want a fast DevOps process. However, database development and DataOps processes follow a different workflow - which ends up creating a significant bottleneck in an otherwise streamlined process.

    But, it doesn’t have to be that way.

    When it comes to data and database code many application development best practices still apply. Watch this webinar to hear from leaders at RedMonk, Datical and Delphix as they share the key DevOps and DataOps practices every application developer should know to treat database code just like app code.
  • Proofpoint Demo: Security Awareness Training
    Proofpoint Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Jul 23 2019 5:00 pm UTC 36 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Automate Coupa procure-to-pay and order-to-cash processes
    Automate Coupa procure-to-pay and order-to-cash processes
    Rich Dill, Jim Cantrell, and Nakul Mistry Jul 23 2019 5:00 pm UTC 45 mins
    Join us July 23rd to learn how to streamline workflows between Coupa and other enterprise applications like Workday using the SnapLogic Intelligent Integration Platform. This webinar is relevant for anyone using Coupa who wants to dramatically reduce the time they spend building critical integrations in support of eProcurment, trading partner management, supply chain analytics, and more.

    This webinar will include:

    - Self-service integration use cases: order-to-cash, procure-to-pay
    - Quick SnapLogic overview: accelerate data and process flow across applications, databases, data warehouses, big data streams, and IoT deployments
    - Live demo: See how to rapidly build Coupa-Workday integration pipelines in a visual drag-and-drop way

    SnapLogic supports thousands of integrations for 1,300+ subscribing enterprise clients around the world. Attend the webinar and see how this AI-powered platform can accelerate your business spend management processes.

    Register now!

    SPEAKERS:

    Nakul Mistry, Head of Technology Partnerships, SnapLogic
    Rich Dill, Enterprise Solution Architect, SnapLogic
    Jim Cantrell, Senior Director of Business Development, SnapLogic
  • 2019 Security Congress Preview – Cloud Security
    2019 Security Congress Preview – Cloud Security
    Richard Tychansky, Travis Jeppson, Brandon Dunlap (Moderator) Jul 23 2019 5:00 pm UTC 60 mins
    (ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 3000+ attendees and over 180 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Jig Ruparel (Principal Strategic Architect) & David Ginsburg (VP, Product and Solutions Marketing) Jul 23 2019 5:00 pm UTC 45 mins
    Are you executing upon your WAN transformation, but are running blind as to whether SD-WAN performance problems are due to the network or your applications? An end-to-end managed SD-WAN service can facilitate an integrated approach to visibility that will help you better understand how your WAN is performing. By offering a unified view into both network and application performance, it enables more effective problem identification and resolution. In addition, a sophisticated customer and partner portal, combined with the SD-WAN service’s back-end orchestration, will remove visibility silos, ultimately increasing productivity and saving you time and money.

    In this webinar, you will learn:

    * How SD-WAN deployments can create visibility islands and their impacts on ensuring application performance

    * How an end-to-end managed SD-WAN service can eliminate these gaps

    * What elements of an SD-WAN service you need to monitor and why

    * What tools are available to integrate network and application visibility, and how they can make the most of your SD-WAN investment

    * Advanced networking analytics guidance
  • Packet Pushers Webinar: Anuta ATOM - Assurance, Telemetry and Orchestration
    Packet Pushers Webinar: Anuta ATOM - Assurance, Telemetry and Orchestration
    Anuta Networks Jul 23 2019 5:00 pm UTC 43 mins
    Anuta ATOM is a multi-domain and multi-vendor network automation solution. In this session, Anuta Networks demonstrates the ATOM support for Low-Code Automation, Model-Driven Telemetry, and Closed-Loop Assurance. For more, see: https://anutanetworks.com/packetpushers
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Jul 23 2019 5:00 pm UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.

    Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.

    Discover:

    - Why the Internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Data Forensics: What is it?
    Data Forensics: What is it?
    David Morris, Lance James and Mark Rasch Jul 23 2019 5:00 pm UTC 75 mins
    This session will delve into the area of Data Forensics specifically addressing when and why a Data Forensic investigation would occur and how to conduct a Data Forensic investigation.
  • Managed Cloud Services Webinar
    Managed Cloud Services Webinar
    Shai Garg, Director of Product Management & Jim Vaugn, VP of Service Jul 23 2019 5:00 pm UTC 30 mins
    Our Distributed Cloud Services are designed to provide the benefits of Quantum products and technology with a cloud-like user experience, either via fully managed Operational Services, or via Storage-as-a-Service (STaaS) offerings.

    At the core of Quantum’s Distributed Cloud Services is our Cloud-Based Analytics (CBA) software. Quantum products can connect to the CBA software to send log files and other telemetry data about their environment to this central hub, making them part of Quantum’s distributed cloud.