Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
Join this conversation between Primitive Logic’s technology solutions experts and Latham & Watkins’ Privacy and Data Protection legal expert to understand GDPR key points and technical solutions to help your GDPR readiness.
- What steps do you have to take to address the expanded definition of Personal Data?
- Consent Management Considerations
- What do the Privacy Rights given to data subjects mean for your digital data governance solutions?
Day 1 of 3 day series:
Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
~ Day 2 – Focus on Privacy side of GDPR from a technology perspective
~ Day 3 – Focus on Security side of GDPR from a technology perspective
Jill P. Reber, Primitive Logic CEO
Kevin Moos, Primitive Logic President
Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
APIs are powerful, and for many teams, very new. A strategy for APIs is complex because it needs to cover many areas. Many teams don't know how to articulate the benefits of APIs to craft a strategy. And defining and using an API strategy involves many roles and teams—not just techies anymore.
In this webcast, you’ll get a general introduction to ""the API economy"" and winning strategies in that economy. Topics will include:
- Business drivers for APIs and API management.
- API strategy models and methodology.
- Case studies from actual teams.
- Best practices of successful API teams.
- Practical checklists.
In this webinar, discover how AWS customers are using our AI solutions to transform their companies and their products. We'll look at multiple use cases from different industries (media, finance, travel, retail, consumer applications, security and law enforcement), both in the enterprise and the startup settings. We'll also overview the growing family of Amazon AI services and look at how they can help you bring innovative AI capabilities to your own applications.
You will hear customer examples, including:
- How Expedia uses Deep Learning to automatically select the best images to display on hotel pages
- How CSPAN uses Amazon Rekognition to identify 90,000+ speakers in their video archives
- How Duolingo uses Amazon Polly to generate lifelike audio clips to help students learn foreign languages
- How Hotels.com uses Amazon Translate for automatic website translation
Who Should Attend: Business Directors, Business Leaders, Project Managers, IT Managers, Business Consultants, Heads of Innovation, Data Scientists and Product Marketeers.
Découvrez comment protéger les ressources les plus précieuses de votre entreprise, vos données, avec les solutions de protection des données Dell EMC. Confortablement installé dans votre bureau ou à la maison, rejoignez vos collègues et experts pour participer à ce webinaire sur la protection des données et découvrir comment Dell EMC, Numéro 1 dans ce domaine, vous aide à protéger vos données contre les attaques de type Ransomware et construire votre dernière ligne de défense.
Imagine the following scenario: You enter (or return to) the United States and border officials demand that you hand over your cell phone and PIN. Or, perhaps you are stopped at a checkpoint or pulled over by law enforcement officials and they make the same demand. Suppose they want all passwords to access your data? Even worse, they want to copy all of your data – can they do that? Demands by law enforcement officials to search mobile devices without a warrant seem to be a daily occurrence. In this session, privacy industry veterans will discuss the legalities of searching cell phones and other mobile devices, including your rights and how you can minimize your exposure.
Is your business at risk of toxic data? Effective on 22nd February, the Notifiable Data Breaches (NDB) scheme under the Privacy Act establishes new requirements for entities in responding to data breaches. Paul Bruton, director, Data Intelligence at Hitachi Vantara, Asia Pacific, explains what these changes mean for businesses and their data strategy, also in the context of the General Data Protection Regulation (GDPR).
With Red Hat it's easy to create mobile apps for the enterprise that integrate with back-office processes and systems! In this video we demonstrate a mobile app for insurance claims processing, built with Red Hat Mobile Application Platform and Red Hat JBoss BPM Suite.
Everyone is trying to achieve high quality, fast deployment, and easy maintenance for their applications. Learn to get these benefits for your Java apps with DevOps-enabling technologies, containers, cloud platforms, and central management tools.
When insurer Aviva Group acquired Friends Provident International, it needed to replace aging proprietary systems that were expensive to maintain, and whose licenses were soon to expire. It chose a new solution based around Red Hat JBoss Middleware, which has reduced costs and improved response time for end users. Red Hat Consulting provided expert help, enabling Aviva to hit a tight six-month deadline.
This video provides a walkthrough of the Red Hat Mobile Application Platform running on OpenShift Container Platform, demonstrating how mobile applications can be built quickly and deployed to OpenShift. Red Hat Mobile Application Platform enables developers build enterprise-grade mobile apps that can run on devices but connect securely to enterprise applications and systems in the datacenter.
If you own vRealize, but have yet to use it for full-stack dashboarding, rapid root cause analysis or hybrid cloud performance tuning, you're missing out. Watch experts from Blue Medora walk you through: How to unify on-and off-premises operations data within vRealize; Ways to create custom dashboards that give you a 360 view of your entire environment; and tips for using dashboards to pinpoint root causes up to 60% faster
In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.
IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.
Join this session to learn about:
- The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
- The current challenges of copy data management and how to address them
- A dive into a TCO study depicting the savings achieved through this architectural change
- Why snapshots are obsolete and you to achieve near-instant data recovery
- A look into additional use cases of copy data for DevOps team
The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.
Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
> Their motivations and challenges.
> The strategies they're adopting for migration.
> What cloud migration in practice looks like.
Connecting all the pieces to make zero downtime continuous delivery happen at scale is a challenge. Join this webcast to see real teams bring all the components together to make high-velocity deployment to Kubernetes scale. Get a hands-on view of the critical steps that go into making container management a scalable process that not only allows teams to delivery faster but with more confidence in the final result.
Dan O’Prey, Chair of Hyperledger Marketing Committee and CMO at Digital Asset
Tracy Kuhrt, Community Architect, Hyperledger
Hyperledger is an umbrella open source project started in December 2015 by the Linux Foundation to support the collaborative development of blockchain-based distributed ledgers across industries. A blockchain is a continuously growing list of records, called blocks, that are linked and secured using cryptography. Transactions between two parties are recorded efficiently and in a verifiable and permanent way.
In this webinar, Dan O’Prey and Tracy Kuhrt will present an update on the blockchain market, industry trends, and new Hyperledger projects. They will discuss the technical items delivered over the last 6 months and focus areas for Hyperledger in 2018.
Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Office 365.
This hands-on demo will provide examples of the key Office 365 use cases:
• Zero-day Malware
• Data Leakage
• Account Takeover
• Auditing and Compliance
We’ll show you how to:
• Stop phishing and malware in Office 365 mail
• Quarantine infected files within One Drive,
• Control sensitive information and prevent data leakage,
• Protect against the insider threat, and
• Monitor and enforce regulatory compliance for all users.
It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.
Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.
Register now to get answers to these important questions:
• What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
• How does a 24x7 managed security service integrate with and enhance your security capabilities?
• How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?
The internet of things (IoT) fundamentally changes how products are manufactured, consumed and serviced. With IoT technologies, artificial intelligence (AI) and predictive analytics, manufacturers can achieve greater efficiencies, build flexible operations and deliver superior products and services.
In this webinar, you’ll learn:
•Key trends, challenges and opportunities in the manufacturing industry based on PAC research.
•How Hitachi addresses digital transformation with machine learning and advanced analytics.
•Top use cases from global manufacturers who see strong outcomes and high return on investment with IoT.
Email attacks and phishing attacks are not going away any time soon.
According to the 2017 HIMSS Healthcare IT Cybersecurity Study, almost 90% of all U.S. respondents report that phishing, and education about phishing, represent their top vulnerabilities and opportunities for improvement.
Join us for a webinar hosted by Matt Mellen, a healthcare specialist at Palo Alto Networks and featuring guest speaker Chris Sherman, Forrester Senior Analyst, serving Security and Risk professionals.
Matt is Palo Alto Networks healthcare specialist who is a former IT Security Manager at a world-renowned hospital. Chris leads Forrester’s healthcare infosecurity coverage and has published multiple reports on best practices within the areas of healthcare and medical device security.
Register for the webinar and learn:
* The current – and future – state of healthcare security.
* Successful approaches your healthcare IT peers have followed to lower risks from phishing.
* How to prepare your healthcare organization for credential phishing attacks.
The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.
For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.
In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.
Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.
OpenStack has often been positioned as an alternative to traditional proprietary virtualization environments. Join Arturo Suarez and Stephan Fabel for:
>A breakdown of differences between OpenStack versus traditional proprietary virtualization and information on identifying when it makes sense to use one or the other
>Analysis on TCO, best practices and risks
>A demo on how to migrate from a traditional proprietary environment into an OpenStack cloud
Are you looking for ways to improve the effectiveness of your digital marketing efforts? Having the insight to provide the most relevant engagement across each touchpoint along a customer journey is key. Naveen Punjabi, Strategic Technology Partnerships of Data and Analytics, from Google, and Erin Franz, Technology Alliances Manager, at Looker will share how you can drive actionable marketing campaigns and establish a data-driven, self-service marketing culture by integrating data from across your enterprise to power your marketing campaigns.
During this webinar, learn how to:
• Access marketing and customer data from anywhere using Informatica Intelligent Cloud Services
• Load marketing and customer data into BigQuery to power marketing analytics
• Visualize and garner insights into all your marketing and customer data with Looker
5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:
1. No hardware, no software, or deployment hassle
2. Improved Business Agility
3. Dynamic DR and Workload Mobility
4. Simplified Management
5. Significantly Lower TCO
Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.
But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:
* Critical areas of GDPR risk in email
* How to defend email systems and protect data in the face of spiraling attacks
* Why having the right archive and backup strategy is important
* The importance of a business continuity plan for email
About the Speaker:
Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
The General Data Protection Regulation (GDPR) requires a strong information governance (IG) foundation to enable organizations to identify where personal data exists and the risks associated with it. Achieving compliance is about effectively setting, managing and auditing data related policies and processes – how a business collects and uses data. Strong data governance will be key as will ensuring that policies and rules are enforced and monitored.
This session will focus on how Information Governance and Stewardship are critical for ongoing GDPR compliance and addresses key areas such as article 16, article 32 and more.
Join this webinar to learn more about how to:
- Enforce governance policies through business processes
- Automatically apply and enforce your data quality processes and controls on all data in all systems in your organization
- Apply predictive processing and a guided experience through machine learning
- Improve data quality as required by article 16 immediate remediation, and ensure rule bindings associated with personal data have a high priority.
About the presenter:
Scott Wenzel has over 25 years of technology experience, helping companies integrate, manage, and improve the quality of their data. Scott specializes in Data Governance, Data Integration and Data Quality applications on multiple database and BI platforms and has extensive experience in Regulated Industries, Public Sector, Healthcare, Insurance, and Utility industries. He has spoken at numerous seminars and conferences (SAP SAPPHIRE, ASUG and others) on these and other related topics.
Featuring Timothy Edgar, former national security and intelligence official, cybersecurity expert, privacy attorney and civil liberties activist; and Brett Dorr, Director of Solutions Engineering at Virtru.
You've got until May 25, 2018 to comply with GDPR guidelines. Are your email and file sharing systems ready?
In this session, privacy attorney Timothy Edgar and data protection advisor Brett Dorr will provide valuable insights and actionable advice to help you ensure you’re prepared.
Join us, to understand the relevant areas of concern — especially if you are considering or have already made a move to the cloud.
Attend this webinar to learn:
- How GDPR affects all companies doing business in the EU
- Why email protection is important in GDPR
- Key areas related to data protection for emails and files
- What GDPR says specifically about encryption, key management, and access control
- Technical solutions to help you enable compliance when exchanging personal data by email
We’re looking forward to answering your GDPR data protection questions.
From May 2018 the EU General Data Protection Regulation (GDPR) will come into effect. Much has been written about the large fines that will be imposed for non-compliance, but what are the less well known aspects of GDPR that you need to address to meet the required standards?
Join us for this informative webinar to learn more about:
- The importance of performing risk and data protection impact assessments and what you need to consider
- Why availability and resilience of information is critical to GDPR compliance
- How increasing levels of encryption may prevent visibility of data breaches
- How to ensure secure access to your applications and data
- With only three months to go, this webinar will help your organisation prepare better for successful GDPR compliance.
Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
En los ultimos diez años el perfil de trafico en redes cambio por completo comparado con los diez años anterior. El “internet of things” (IoT), variaciones y numero de dispositivos conectados a la red, video, imagenes, voz, transacciones de tarjeta de credito, wifi y mucho mas han cambiado las funciones requeridas que redes deben ofrecer. En comercio, especificamente, se deben ofrecer funciones para separar el tipo de trafico que se maneja sobre la misma red. La habilidad de separar trafico de PCI, guest wifi y voz es critico para ofrecer los servicios necesarios dentro de una tienda al por menor. Es aqui donde segmentacion de trafico juega un rol importante dentro de la red.
Este webinar cubrira los siguientes topicos:
- Que es segmentacion en relacion a SD-WAN
- Importancia de segmentacion en tiendas al por menor, ilustrado con usos de caso
- Demostracion de segmentacion en SD-WAN
With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.
Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.
Don’t leave it to chance – register now.
Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.
Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
MÁS CAPACIDAD DE ALMACENAMIENTO POR MENOS
¿Por qué optar por un enfoque de software para el almacenamiento empresarial?
Adoptar correctamente el enfoque de almacenamiento definido por software deberá proporcionarte una solución altamente ampliable que reduzca de manera radical los costes de almacenamiento tanto en gastos de operaciones como de capital. También tiene que ser una solución sencilla, resistente y flexible, y ofrecer una funcionalidad líder del sector.
2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
In today’s business world, communication matters more than ever. People want to communicate in new ways everyday: more channels, more devices, more flexibility. But these demands rely on a new generation of technology, operating in real-time. What happens if the technology isn’t reliable? Digital services to customers are unreachable. Phones stop working. Video conferences crash.
A small outage can have a big impact. Businesses need to react quickly and get to the root cause to find a solution. They need to ensure their UC is reliable, and optimized.
Unified communications are the arteries and veins of your organization and its connection to the outside world. Internally, you can’t function properly when there are problems. Externally, you’re paralyzed when there’s an outage. Unified communications keep the heart of the organization pumping.
Without effective communications and collaboration capabilities, employees are at a competitive disadvantage with slower product development and decision making overall. Reliable communications and collaboration infrastructure that helps employees work efficiently enables your organization to breathe.
Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.
Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.
In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.
This Amalgam Insights webinar is generously sponsored by Valicom
Last week it was uncovered that an intern at Apple leaked some of the iPhone's source code was leaked on GitHub.
The code was for iBoot, a component of the iPhone's OS. While it was an older version of iOS 9 and Apple has declared the leak shouldn't be of concern to the average user, the community has been scratching their heads wondering how sensitive code from a conglomerate like Apple could accidentally be made public.
We hear about data leaks and security breaches almost on a weekly basis now, but when it comes to something so widely used by global consumers, it poses an even bigger concern that human error could potentially have disastrous results.
Join this expert panel with moderator Jeanne Morain, Digital & Cloud Strategist, iSpeak Cloud, and panelists James Jardine, CEO & App Security Consultant, Jardine Software, and Don Cox, Advisory Board Member at Netswitch Technology Management and Virtual Rehab, Inc.
They will discuss and explore the following:
- What are the potential ramifications of such a breach?
- Dark web
- Company costs and impact on brand and PR
- What are action items companies can do to prevent such a breach from happening?
With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?
Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:
- How to monitor services and apps built on top of containers
- The benefits of transparent instrumentation for metric collection
- Using dashboards to quickly see and share performance data
- How to quickly determine the what and the why of what’s happening in your environment
Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.