Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • The SOC Protection You Need To Defend Against Cloud Threats
    The SOC Protection You Need To Defend Against Cloud Threats John Carse, VP Security Operations, Alert Logic Feb 21 2018 4:00 pm UTC 60 mins
    It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.

    Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.

    Register now to get answers to these important questions:

    • What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
    • How does a 24x7 managed security service integrate with and enhance your security capabilities?
    • How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?
  • Redefine Manufacturing with IoT, AI and Analytics
    Redefine Manufacturing with IoT, AI and Analytics Milos Milojevic, Pierre Audoin Consultants & Greg Kinsey, Hitachi Vantara & Sachin Andhare, Hitachi Vantara Feb 21 2018 4:00 pm UTC 60 mins
    The internet of things (IoT) fundamentally changes how products are manufactured, consumed and serviced. With IoT technologies, artificial intelligence (AI) and predictive analytics, manufacturers can achieve greater efficiencies, build flexible operations and deliver superior products and services.

    In this webinar, you’ll learn:
    •Key trends, challenges and opportunities in the manufacturing industry based on PAC research.
    •How Hitachi addresses digital transformation with machine learning and advanced analytics.
    •Top use cases from global manufacturers who see strong outcomes and high return on investment with IoT.
  • Best Practices in Preventing Credential Phishing in Healthcare
    Best Practices in Preventing Credential Phishing in Healthcare Chris Sherman, Forrester Senior Analyst & Matt Mellen, Healthcare Security Architect, Palo Alto Networks Feb 21 2018 5:00 pm UTC 60 mins
    Email attacks and phishing attacks are not going away any time soon.

    According to the 2017 HIMSS Healthcare IT Cybersecurity Study, almost 90% of all U.S. respondents report that phishing, and education about phishing, represent their top vulnerabilities and opportunities for improvement.

    Join us for a webinar hosted by Matt Mellen, a healthcare specialist at Palo Alto Networks and featuring guest speaker Chris Sherman, Forrester Senior Analyst, serving Security and Risk professionals.

    Matt is Palo Alto Networks healthcare specialist who is a former IT Security Manager at a world-renowned hospital. Chris leads Forrester’s healthcare infosecurity coverage and has published multiple reports on best practices within the areas of healthcare and medical device security.

    Register for the webinar and learn:
    * The current – and future – state of healthcare security.
    * Successful approaches your healthcare IT peers have followed to lower risks from phishing.
    * How to prepare your healthcare organization for credential phishing attacks.
  • Healthcare orgs: Slay the risks of data-enabling your care providers
    Healthcare orgs: Slay the risks of data-enabling your care providers Mitchell Parker, Indiana University Health, Information Security & Compliance & Salim Hafid, Product Marketing, Bitglass Feb 21 2018 5:00 pm UTC 60 mins
    The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.

    For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.

    In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.

    Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.
  • From VMWare to Canonical OpenStack
    From VMWare to Canonical OpenStack Stephan Fabel, Arturo Suarez Feb 21 2018 5:00 pm UTC 60 mins
    OpenStack has often been positioned as an alternative to traditional proprietary virtualization environments. Join Arturo Suarez and Stephan Fabel for:
    >A breakdown of differences between OpenStack versus traditional proprietary virtualization and information on identifying when it makes sense to use one or the other
    >Analysis on TCO, best practices and risks
    >A demo on how to migrate from a traditional proprietary environment into an OpenStack cloud
  • Building a Marketing Analytics Platform with Informatica, Google Cloud & Looker
    Building a Marketing Analytics Platform with Informatica, Google Cloud & Looker Naveen Punjabi, Strategic Technology Partnerships, Google & Erin Franz, Technology Alliances Manager, Looker Feb 21 2018 6:00 pm UTC 60 mins
    Are you looking for ways to improve the effectiveness of your digital marketing efforts? Having the insight to provide the most relevant engagement across each touchpoint along a customer journey is key. Naveen Punjabi, Strategic Technology Partnerships of Data and Analytics, from Google, and Erin Franz, Technology Alliances Manager, at Looker will share how you can drive actionable marketing campaigns and establish a data-driven, self-service marketing culture by integrating data from across your enterprise to power your marketing campaigns.

    During this webinar, learn how to:
    • Access marketing and customer data from anywhere using Informatica Intelligent Cloud Services
    • Load marketing and customer data into BigQuery to power marketing analytics
    • Visualize and garner insights into all your marketing and customer data with Looker
  • Are you ready for the new MFA requirements for PCI Compliance?
    Are you ready for the new MFA requirements for PCI Compliance? Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec Feb 21 2018 6:00 pm UTC 60 mins
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • The Best VMware Public Cloud Backup & DR Options
    The Best VMware Public Cloud Backup & DR Options Storage Switzerland, Druva Feb 21 2018 6:00 pm UTC 60 mins
    5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
    Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:

    1. No hardware, no software, or deployment hassle
    2. Improved Business Agility
    3. Dynamic DR and Workload Mobility
    4. Simplified Management
    5. Significantly Lower TCO
  • GDPR and Email: How To Tackle The Risk In Your Inbox
    GDPR and Email: How To Tackle The Risk In Your Inbox Marc French, Senior Vice President & Chief Trust Officer, Mimecast Feb 21 2018 7:00 pm UTC 60 mins
    Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.

    But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:

    * Critical areas of GDPR risk in email
    * How to defend email systems and protect data in the face of spiraling attacks
    * Why having the right archive and backup strategy is important
    * The importance of a business continuity plan for email

    About the Speaker:
    Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
  • Critical Building Blocks for GDPR Compliance
    Critical Building Blocks for GDPR Compliance Scott Wenzel, BackOffice Associates Feb 21 2018 8:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) requires a strong information governance (IG) foundation to enable organizations to identify where personal data exists and the risks associated with it. Achieving compliance is about effectively setting, managing and auditing data related policies and processes – how a business collects and uses data. Strong data governance will be key as will ensuring that policies and rules are enforced and monitored.

    This session will focus on how Information Governance and Stewardship are critical for ongoing GDPR compliance and addresses key areas such as article 16, article 32 and more.

    Join this webinar to learn more about how to:
    - Enforce governance policies through business processes
    - Automatically apply and enforce your data quality processes and controls on all data in all systems in your organization
    - Apply predictive processing and a guided experience through machine learning
    - Improve data quality as required by article 16 immediate remediation, and ensure rule bindings associated with personal data have a high priority.

    About the presenter:
    Scott Wenzel has over 25 years of technology experience, helping companies integrate, manage, and improve the quality of their data. Scott specializes in Data Governance, Data Integration and Data Quality applications on multiple database and BI platforms and has extensive experience in Regulated Industries, Public Sector, Healthcare, Insurance, and Utility industries. He has spoken at numerous seminars and conferences (SAP SAPPHIRE, ASUG and others) on these and other related topics.
  • GDPR Data Protection: Your Checklist for Email and File Sharing Protections
    GDPR Data Protection: Your Checklist for Email and File Sharing Protections Timothy Edgar, Privacy Attorney & Brett Dorr, Director of Solutions Engineering at Virtru Feb 21 2018 9:00 pm UTC 45 mins
    Featuring Timothy Edgar, former national security and intelligence official, cybersecurity expert, privacy attorney and civil liberties activist; and Brett Dorr, Director of Solutions Engineering at Virtru.

    You've got until May 25, 2018 to comply with GDPR guidelines. Are your email and file sharing systems ready?

    In this session, privacy attorney Timothy Edgar and data protection advisor Brett Dorr will provide valuable insights and actionable advice to help you ensure you’re prepared.

    Join us, to understand the relevant areas of concern — especially if you are considering or have already made a move to the cloud.

    Attend this webinar to learn:
    - How GDPR affects all companies doing business in the EU
    - Why email protection is important in GDPR
    - Key areas related to data protection for emails and files
    - What GDPR says specifically about encryption, key management, and access control
    - Technical solutions to help you enable compliance when exchanging personal data by email

    We’re looking forward to answering your GDPR data protection questions.
  • Addressing the Overlooked Aspects of GDPR
    Addressing the Overlooked Aspects of GDPR David Warburton, Senior Systems Engineer, F5 Networks Feb 22 2018 11:00 am UTC 45 mins
    From May 2018 the EU General Data Protection Regulation (GDPR) will come into effect. Much has been written about the large fines that will be imposed for non-compliance, but what are the less well known aspects of GDPR that you need to address to meet the required standards?

    Join us for this informative webinar to learn more about:
    - The importance of performing risk and data protection impact assessments and what you need to consider
    - Why availability and resilience of information is critical to GDPR compliance
    - How increasing levels of encryption may prevent visibility of data breaches
    - How to ensure secure access to your applications and data
    - With only three months to go, this webinar will help your organisation prepare better for successful GDPR compliance.
  • Panel Discussion: The Road to a Data-Driven Business
    Panel Discussion: The Road to a Data-Driven Business Jen Stirrup, Gordon Tredgold, Joanna Schloss, & Lyndsay Wise Feb 22 2018 1:00 pm UTC 60 mins
    Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
  • SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion
    SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion Tony Banuelos, Product Manager Feb 22 2018 3:00 pm UTC 60 mins
    En los ultimos diez años el perfil de trafico en redes cambio por completo comparado con los diez años anterior. El “internet of things” (IoT), variaciones y numero de dispositivos conectados a la red, video, imagenes, voz, transacciones de tarjeta de credito, wifi y mucho mas han cambiado las funciones requeridas que redes deben ofrecer. En comercio, especificamente, se deben ofrecer funciones para separar el tipo de trafico que se maneja sobre la misma red. La habilidad de separar trafico de PCI, guest wifi y voz es critico para ofrecer los servicios necesarios dentro de una tienda al por menor. Es aqui donde segmentacion de trafico juega un rol importante dentro de la red.

    Este webinar cubrira los siguientes topicos:

    - Que es segmentacion en relacion a SD-WAN
    - Importancia de segmentacion en tiendas al por menor, ilustrado con usos de caso
    - Demostracion de segmentacion en SD-WAN
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey
    The clock is ticking: GDPR: Act now to accelerate your GDPR journey Robert Arandjelovic and Sunil Choudrie, Symantec Feb 22 2018 3:00 pm UTC 45 mins
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
  • Optimizando costos y mejorando la eficiencia del Storage en el Data Center
    Optimizando costos y mejorando la eficiencia del Storage en el Data Center Cesar Lorca, SUSE Systems Engineer Feb 22 2018 4:00 pm UTC 75 mins
    *Esta es la segunda sessión del webinar*

    ¿Por qué optar por un enfoque de software para el almacenamiento empresarial?

    Adoptar correctamente el enfoque de almacenamiento definido por software deberá proporcionarte una solución altamente ampliable que reduzca de manera radical los costes de almacenamiento tanto en gastos de operaciones como de capital. También tiene que ser una solución sencilla, resistente y flexible, y ofrecer una funcionalidad líder del sector.

    Únase a nosotros en este Webinar y saiba más.
  • Stateful containers for DevOps and Beyond
    Stateful containers for DevOps and Beyond Michael Mattsson - Container Technical Marketing Engineer & Stacey Gilmore Product Marketing Feb 22 2018 4:00 pm UTC 60 mins
    2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
  • UC Optimization for Pros
    UC Optimization for Pros Tim Poindexter, VP Marketing | Dave Bottomley, Senior Solutions Engineer Feb 22 2018 4:00 pm UTC 60 mins
    In today’s business world, communication matters more than ever. People want to communicate in new ways everyday: more channels, more devices, more flexibility. But these demands rely on a new generation of technology, operating in real-time. What happens if the technology isn’t reliable? Digital services to customers are unreachable. Phones stop working. Video conferences crash.

    A small outage can have a big impact. Businesses need to react quickly and get to the root cause to find a solution. They need to ensure their UC is reliable, and optimized.

    Unified communications are the arteries and veins of your organization and its connection to the outside world. Internally, you can’t function properly when there are problems. Externally, you’re paralyzed when there’s an outage. Unified communications keep the heart of the organization pumping.

    Without effective communications and collaboration capabilities, employees are at a competitive disadvantage with slower product development and decision making overall. Reliable communications and collaboration infrastructure that helps employees work efficiently enables your organization to breathe.
  • IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed
    IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed Hyoun Park and Valicom Feb 22 2018 5:00 pm UTC 60 mins
    Recommended Audience: CFOs, CIOs, IT Directors, Network Directors, Telecom Directors, Mobility Directors, Enterprise Architects, Procurement Directors

    Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.

    Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.

    In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.

    This Amalgam Insights webinar is generously sponsored by Valicom
  • [Panel] When iOS Code is Leaked: How Companies Can Manage App Security
    [Panel] When iOS Code is Leaked: How Companies Can Manage App Security Jeanne Morain, James Jardine, Don Cox Feb 22 2018 6:00 pm UTC 60 mins
    Last week it was uncovered that an intern at Apple leaked some of the iPhone's source code was leaked on GitHub.

    The code was for iBoot, a component of the iPhone's OS. While it was an older version of iOS 9 and Apple has declared the leak shouldn't be of concern to the average user, the community has been scratching their heads wondering how sensitive code from a conglomerate like Apple could accidentally be made public.

    We hear about data leaks and security breaches almost on a weekly basis now, but when it comes to something so widely used by global consumers, it poses an even bigger concern that human error could potentially have disastrous results.

    Join this expert panel with moderator Jeanne Morain, Digital & Cloud Strategist, iSpeak Cloud, and panelists James Jardine, CEO & App Security Consultant, Jardine Software, and Don Cox, Advisory Board Member at Netswitch Technology Management and Virtual Rehab, Inc.

    They will discuss and explore the following:

    - What are the potential ramifications of such a breach?
    - Dark web
    - Company costs and impact on brand and PR
    - What are action items companies can do to prevent such a breach from happening?
  • The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My!
    The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My! Marci Parker, Garrison Ball, Meghan Lockwood Feb 22 2018 6:00 pm UTC 60 mins
    With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Feb 22 2018 6:00 pm UTC 60 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
    2018 Disaster Recovery Checklist - 5 Key Areas to Improve Storage Switzerland, Unitrends Feb 22 2018 6:00 pm UTC 60 mins
    Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.