Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Key Considerations of an Effective Cloud Strategy
    Key Considerations of an Effective Cloud Strategy Matt Nolan - Senior Cloud Architect, Red Hat and Stephane Lefrere - Director, Cloud infrastructure Practice, Red Hat May 22 2018 9:00 am UTC 60 mins
    One of the most pressing questions enterprises have to answer is: “Should we move to the cloud or stay on-premise?” For many, the answer is a blend of both. Determining your organization’s cloud strategy can be complex. Important considerations must be made around security and compliance requirements, balancing the needs of developers, as well as the existing infrastructure implementations.

    In this webinar, we’ll identify multiple considerations you’ll face when starting to think about your cloud strategy and walk through how to manage those critical choices. We’ll cover how to:
    - Evaluate the mix of private and public cloud options are best for your business
    - Prioritize services for your developers and end users
    - Identify new approaches to enable freedom of choice, mobility, and accelerate service delivery
    - Define a cloud strategy that accelerates your ability to deliver new applications and innovative solutions
  • Understand the Performance of Customer Facing Applications
    Understand the Performance of Customer Facing Applications Heather Abbott, SVP of Corporate Solutions, Nasdaq Barry Russell, GM, AWS Marketplace May 22 2018 1:00 pm UTC 45 mins
    Come learn how NASDAQ used AWS Marketplace to purchase and launch AppDynamics unified Application Performance Management (APM) and business performance monitoring solution for their migration to AWS.


    With AppDynamics, NASDAQ was able to move their critical applications to AWS and used AppDynamics to accelerate, visualize and validate the migration process. This allowed NASDAQ to improve their applications in AWS with business performance monitoring and make clear, understandable correlations between the quality of their customer experience with their applications.
  • GDPR: Identifying and Responding to a Data Breach
    GDPR: Identifying and Responding to a Data Breach Duncan Brown IDC, Ilias Chantzos, Sunil Choudrie and Giampiero Nanni,Symantec May 22 2018 1:00 pm UTC 60 mins
    With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.

    Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss

    •Findings from the current IDC GDPR Assessment
    •Gain practical advice on GDPR breach notification rules
    •Guidance issued from European Data Protection Authorities
    •Data transfers and how a breach can affect multiple locations and jurisdictions.
  • Travel & Expense: Ein integrierter Ansatz
    Travel & Expense: Ein integrierter Ansatz SAP Concur Expert May 22 2018 1:00 pm UTC 45 mins
    - Lernen Sie, wie einfach es ist, eine Geschäftsreise mit SAP Concur zu buchen

    - Wie Sie als Manager einen unmittelbaren Überblick über die Buchungen Ihrer Mitarbeiter haben und nachvollziehen können, ob sie die Reiserichtlinien befolgen

    - Wie Ihre Geschäftsreisenden Reisekosten mit ExpenseIt mühelos erfassen und automatisch richtig aufschlüsseln
  • The jury is out on digital
    The jury is out on digital Scott Gibson; Group Executive: Digital Business Solutions, & Wayne Speechly; MD - Digital Advisory, Dimension Data May 22 2018 2:00 pm UTC 45 mins
    People in organisations are talking about digital. Of particular interest, is how organisations are understanding its application to their business and how digital spans every aspect of the organisation.
    Is digital being seen as the success story that everyone expects it to be? Are benefits actually being delivered and do leaders know where the value lies?

    During this Webinar, our presenters will share the thinking of global leaders around digital and more specifically the top challenges, best practices, and insights garnered from Dimension Data’s ‘Digital Means Business’ research report. Looking not only at how organisations are making sense of digital, but how they are mobilising the organisation for sustainable digital transformation. Digital applied effectively and diligently – can help organisations emerge as leaders in the digital age, but there are still many challenges to overcome.
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer May 22 2018 3:00 pm UTC 75 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • The Need for Universal Identity Management
    The Need for Universal Identity Management Garrett Bekker of 451 Research & Lewis Carpenter of Auth0 May 22 2018 3:00 pm UTC 60 mins
    Companies seeking identity and access management (IAM) solutions are confronted with a fragmented marketplace. There are various solutions aimed at solving authentication and authorization, but each tends to focus squarely on a single audience, whether it’s consumers (B2C), business partners (B2B), employees (B2E), or IoT devices. This siloed approach makes the process both confusing and costly for those needing identity across the entire organization and beyond.

    Fortunately, change is underway and enterprises are realizing that a universal approach to identity is saving money, time, and most importantly, giving developers the freedom they need to focus on product innovation rather than security. Today’s marketplace demands a more adaptable solution that can handle the rigors of identity, and anticipate the needs of the future.

    Join this exciting webinar with Garrett Bekker, principal analyst at 451 Research, on the current state of the IAM industry, his take on its evolution and where it needs to go, as well as an overview on Auth0’s universal approach to identity.

    During this webinar, participants will learn:
    •The necessary evolution of the IAM industry
    •The valuable resources and costs wasted when disparate identity management solutions are used within one enterprise
    •Benefits of a “hybrid” approach and how it solves multiple use cases simultaneously
    •What “cloud nirvana” is and why platform convergence is necessary now for tomorrow’s economy
  • Hybrid IT is the New Normal
    Hybrid IT is the New Normal David Gehringer, Principal, Dimensional Research and Ian Bromehead, Dir of Product Marketing, Operations Bridge, Micro Focus May 22 2018 3:00 pm UTC 60 mins
    How to Effectively Manage and Monitor a Hybrid IT Environment

    Are you having challenges in dealing with cloud based application issues across multiple cloud providers? If so, you’re not alone. 80% of companies are dealing with 2-10 cloud providers and some even more.

    Join us on this webcast as we discuss the findings from the recent Dimensional Research survey of over 500 enterprise cloud professionals who shared their challenges and needs for Hybrid IT monitoring. We’ll review the survey results including the data and analysis.

    You will also receive a complimentary copy of the Dimensional Research report to help you understand where you are in comparison to companies included in the study.
  • Is a SIEM Solution Right for Your Business?
    Is a SIEM Solution Right for Your Business? Guy Duchatelet, Alert Logic, Tony Bradley, Alert Logic May 22 2018 3:00 pm UTC 60 mins
    SIEM solutions can be a powerful tool to help improve an organization’s security, effectively detect cyber security threats, and provide valuable insights. However, while SIEM technology is a proven, traditional approach, they are most useful for organizations with a well-staffed security team. So what about small- to mid-sized organizations? Is a SIEM solution right for you?

    Hear from Alert Logic’s threat experts on why a SIEM alone may not be the best solution for your business. In this webinar, we explore:

    • The actual costs of integrating SIEM security
    • Analytics and additional tuning required to get meaningful results from a traditional SIEM
    • Alternatives to SIEM purpose-built to deliver security results for the SMB space

    For many organizations, a Managed Detection and Response (MDR) service is a simpler, modern alternative to SIEM, delivered as a service to help organizations save time, money and frustration. Gain accurate, actionable threat insight and remediation advice, aligned with today’s threat environment, delivered predictably as a service.
  • Transform Your CMS Into a Social Powerhouse
    Transform Your CMS Into a Social Powerhouse Seth Cleaver, Sitefinity Technical Engineer at Progress May 22 2018 3:00 pm UTC 60 mins
    Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.

    In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.

    You’ll learn:

    - What social enhancements are available in the latest release of Sitefinity
    - Some useful ideas to increase the social savviness of your website
    - How to integrate a social platform into Sitefinty using OAuth

    Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
  • Solving Mobile Security: Peer-tested Strategies That Work
    Solving Mobile Security: Peer-tested Strategies That Work Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC May 22 2018 5:00 pm UTC 60 mins
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • GDPR: Protecting Your Data
    GDPR: Protecting Your Data Ulf Mattsson, Martyn Hope, Mark Rasch, David Morris May 22 2018 5:00 pm UTC 90 mins
    Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.

    Specifically, we will cover:

    What is considered "Personal Data" and why it needs to be "protected"

    The Legal Aspects of Data Protection under GDPR.

    The technical ways to protect/pseudonymization

    In this Session you will learn from the leading experts:
    - Ulf Mattsson: The father of database Encryption.
    - Martyn Hope: The Co-Founder of the GDPR Institut.
    - Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
  • Security in the Age of Hybrid Cloud
    Security in the Age of Hybrid Cloud Ajay Uggirala and Marty Jost — Product Marketing, Imperva May 22 2018 5:00 pm UTC 60 mins
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • Implementing a Digital Transformation Strategy on AWS for Financial Services
    Implementing a Digital Transformation Strategy on AWS for Financial Services Paul Duvall, CTO Stelligent May 22 2018 5:00 pm UTC 60 mins
    In today’s digital-first market, financial services organizations are only as competitive as their ability to rapidly develop and deploy new applications and products, provide optimal customer service while still maintaining or exceeding industry compliance and security standards.

    Join Stelligent CTO Paul Duvall to learn how customers are driving a digital transformation strategy through DevOps automation on Amazon Web Services (AWS) to provide superior digital customer experiences and gain a competitive edge.

    About Stelligent: Stelligent provides DevOps automation professional services on AWS, enabling engineering teams to focus on creating software users love. Our goal is to work closely with customers to develop fundamentally secure infrastructure automation code, deployment pipelines, and feedback mechanisms for faster, more consistent software and infrastructure deployments. As a Premier AWS Consulting Partner, and AWS DevOps and Financial Services Competency holder, we use our demonstrated expertise to help customers benefit from continuous AWS innovation.
  • 15 Failure Points in Kubernetes and How to Monitor Them
    15 Failure Points in Kubernetes and How to Monitor Them Jorge Salamero Sanz May 22 2018 5:00 pm UTC 30 mins
    There is a lot of discussion nowadays on how to use containers in production - are you there already?

    When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From an agnostic monitoring solution perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks May 22 2018 6:00 pm UTC 60 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Free Up Time with Cloud Managed WiFi
    Free Up Time with Cloud Managed WiFi Martine Velkeniers: Product Marketing Manager and Roderick Dixon: Solutions Marketing Manager at Aruba May 22 2018 6:00 pm UTC 60 mins
    Learn how to free up your time with cloud-managed WiFi, qualify for a free Aruba Instant Access Point and try Aruba Central for free!

    Join our webinar on May 22nd, 2018, IT for SMB: Free Up Your Time with Cloud Managed WiFi and see why it’s critical to choose access points and management tools that meet the demands of your guests, employees and IT team.

    Guest speaker Justin Hart from Blue Dog RV will share why he chose Aruba for his network and you’ll learn about key considerations for WiFi success without consuming all your IT resources:

    • Scaling your network to your users and locations
    • Managing your network the way you want
    • Detecting user-level activity so that you can better prioritize applications and plan your network expansion
  • Estratégia Mobile – Garanta a segurança sem abrir mão da experiência do usuário
    Estratégia Mobile – Garanta a segurança sem abrir mão da experiência do usuário Danilo Barsotti - Solution Account Director May 22 2018 6:00 pm UTC 120 mins
    Já parou para pensar quão fácil é para um fraudador fazer troca de chips e obter dados de um dispositivo móvel? Ou falsificar a geolocalização para evitar elevação de nível de autenticação? Ou ainda executar um aplicativo em um emulador? Conhecemos esses ataques como Fraude SIM SWAP, Fake Geolocation e App Emulator, respectivamente – e são apenas alguns exemplos de ameaças as quais seu negócio está exposto.
  • GDPR - Is Data Still the New Currency?
    GDPR - Is Data Still the New Currency? Primitive Logic CEO Jill Reber & President Kevin Moos May 22 2018 9:00 pm UTC 60 mins
    Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
  • Quanta-LIVE Webinar: From Silo to  Hyper-converged Infrastructure
    Quanta-LIVE Webinar: From Silo to Hyper-converged Infrastructure Wendy Wu, Biz Dev Team Lead, QCT & Trista Huang, Biz Dev Team, QCT May 23 2018 1:00 am UTC 60 mins
    Enterprises around the world strive to stay ahead and would like to rearrange their data centers to support new ways of doing business. However, there are lots of challenges that one must face on this transformation journey. In this webinar, Wendy Wu, Business development team lead for VMware solutions from QCT (Quanta Cloud Technology) will elaborate the challenges you may face and how can you leverage QCT and Intel’s knowledge and efforts to address those challenges and find the fastest path to your data center transformation.
  • Semantic AI: Bringing Machine Learning and Knowledge Graphs Together
    Semantic AI: Bringing Machine Learning and Knowledge Graphs Together Kirk Borne, Principal Data Scientist, Booz Allen Hamilton & Andreas Blumauer, CEO, Managing Partner Semantic Web Company May 23 2018 1:00 pm UTC 60 mins
    Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."

    This webinar covers:

    - An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
    - How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
    - How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
    - Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
  • Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash
    Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash Ori Modai, VP R&D, Iguazio May 23 2018 3:00 pm UTC 60 mins
    Using Flash to substitute memory in databases can substantially increase density, reduce costs and improve durability. However, most databases access Flash through traditional storage and file system layers, utilizing only a fraction of Flash’s potential speed. As a result, companies keep using in-memory databases with expensive memory and limited data capacity and resiliency. Ori Modai will explain how to build real-time intelligent apps which run across large data sets and reach in-memory database performance with Intel’s NVMe Flash. He will describe the challenges posed by traditional database and storage architectures and will present a new database design which maximizes the value of flash, reaching 20x lower costs and 100x higher density. The session will include a technical deep dive followed by real-world customer use-cases in the fields of IoT edge and online AI applications.
  • Reduce Costs, Increase Efficiencies in Your Data Center
    Reduce Costs, Increase Efficiencies in Your Data Center Bob Madaio, VP, Infrastructure Solutions Marketing & Paul Lewis, Global Vice President, Industry and Enterprise Architecture May 23 2018 4:00 pm UTC 60 mins
    Transform your business with data center modernization. Learn how Hitachi Vantara’s robust set of systems, software and services are designed to help customers achieve desired business outcomes in the data center.

    In this webinar, you’ll:
    •Learn how to reduce cost, maximize efficiencies and effectiveness across all data center operations.
    •See real-life examples of how Hitachi provides solutions to increase agility and improve customer experiences.
    •Discuss key elements needed to achieve a modern data center.
  • Salient Features of a Secure Enterprise Container Registry Solution
    Salient Features of a Secure Enterprise Container Registry Solution Praveen Rajagopalan and Vikas Grover, Red Hat May 23 2018 4:00 pm UTC 60 mins
    Containers are mainstream and a strategic priority for enterprises everywhere. While they are enabling teams to migrate workloads to microservices and enabling flexible scalable workloads, a key question arises, where do we store and manage our container images?

    While the answer to this question is a Container Registry, do you know what to look for when evaluating enterprise container registry solutions? Have you identified your organization's requirements for container registries?

    Join Praveen Rajagopalan and Vikas Grover from Red Hat to hear and discuss about an enterprise container registry solution that has all the required enterprise security features.

    Praveen and Vikas will discuss various options such as:

    Container Size: Optimized storage of container Images
    Availability: Geo-replication technology for Multi-Data Center
    Hosting: Cloud or On Prem
    Security
    Vulnerability scanning of images
    Access control (RBAC)
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director May 23 2018 4:00 pm UTC 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!