Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Max Ebdy Regional Sales Manager, IIDI, Asia PacificRecorded: Nov 24 202032 mins
Digital transformation is happening everywhere and the higher education sector is not spared. With the current pandemic, the need to have a robust approach to continue their businesses and to offer relevant education offerings and services is key to their survivals.
By expanding their education services wider and deeper, the need to have relevant tools to connect, to communicate and to collaborate drives this industry to develop Smart Campus initiatives. Secure Identity will be one of the key foundation blocks to enable and drive these initiatives.
In this webinar, we will look at the current drivers for existing education institutes to embrace online and digital tools and what would be the impact if there is an absence of this secure identity. We will also discuss the approach of an secure identity issuance that will benefit education institutes whether they are serving their students within the physical building compounds, or in a mixture of both digital and physical environments.
Join the webinar to hear:
• Drivers for higher education sector to embrace smart campus initiatives.
• Why secure identity is so crucial to smart campus initiatives?
• What makes an identity secure ?
• Issuance approach that is simple, smart and secure.
Josh Rosso, Staff Kubernetes Architect, VMware and Eric Smalling, Staff Kubernetes Architect, VMwareRecorded: Nov 24 2020109 mins
Are you a developer responsible for developing applications to run on Kubernetes, but not sure where to start? Join our webinar to learn best practices for setting up your workstation—derived from hosts Josh Rosso and Eric Smalling’s experience working with developers in the field. They'll begin by sharing some tools you will want to work with such as Docker and a locally runnable Kubernetes cluster. Then they'll teach you about the basics and best practices involved with running applications in containers and, finally, how to deploy them on Kubernetes.
P.S. Are you a beginner with Kubernetes? We recommend taking the Containers 101 and Kubernetes 101 courses on KubeAcademy prior to the webinar. While this is optional, taking those foundational courses will help you get the most out of the webinar.
Andre Durand, CEO of Ping Identity and Molly Bloom, Entrepreneur & Author of Molly's GameRecorded: Nov 24 202036 mins
Join Andre Durand, CEO of Ping Identity in a fireside chat with Molly Bloom, Olympic-class skier, entrepreneur, and author of "Molly’s Game".
From running one of the most exclusive high-stakes poker games in Hollywood to becoming a successful entrepreneur, Molly’s amazing story of failures and perseverance is truly remarkable and is particularly relevant to businesses in 2020.
Learn about the repeatable strategies she used to create exclusive, personalised experiences for her players and to recover from disastrous circumstances. Hear how her strategies can help businesses turn their customers into loyal advocates.
Mitch Berk, Simon Perry, Darrly Miles, Dave Kofoed and Dany LeclercRecorded: Nov 23 202049 mins
As businesses continue their journey with remote work options for their task force, enabling access from BYO devices apart from corporate owned, providing the best user experience, securing and supporting their employee’s digital lifecycle becomes a challenge. Join us for this session and learn how to easily manage and support employees across environments using Workspace ONE Assist and Carbon Black.
Keri Atkins; NA PC Services Security BDM; Terry Van Roekel; Director AMS Security ServicesRecorded: Nov 23 202041 mins
Traditional methodologies in securing the PCs have quickly become ineffective as an unintended consequence of the impact to IT resources by recent events. Hear from HP’s Security experts who will discuss how HP can help keep your organization safe by defending against cyberattacks without changing user behavior or increasing your IT Staff's workload.
In this webinar, participants will:
• Discover how you can implement a protection-first approach in your environment
• Learn about HP’s industry-leading isolation, monitoring, and proactive solutions to secure your business
• Determine the right Security solution for your needs
Georgios Andreanakis, Red Hat; Dominik Winter, Viada; Sun Tan, Red Hat; Mark Little, Red Hat; Michael Simons, Neo4jRecorded: Nov 23 202090 mins
Distributed development and native images with modern approaches to persistence on top of an extensible base features makes developer dreams come true. Learn why and how Quarkus is solving the most pressing problems in modern architecture and how to migrate existing services.
• 3-tier vs. Microservices. How to get Spring Boot into the cloud
Georgios Andreanakis, Senior Software Engineer, Red Hat
• Mono2micro Decoupling with MicroProfile RESTClient and Quarkus
Dominik Winter, Senior Consultant, Viada
• Kubernetes Native Development. Be CodeReady
Sun Tan, Senior Software Engineer. Red Hat
• Quarkus, GraalVM, Mandrel, OpenJDK. A Runtimes tale
Mark Little, Vice President, Middleware Engineering, Red Hat
• Quarkus meets Neo4j
Michael Simons, Software Engineer, Neo4j
Alex Gounares, CEO, PolyverseRecorded: Nov 23 202035 mins
Find out how you can secure your Linux systems against memory exploits and reduce the strain of patching on your IT team with Polymorphing for Linux. Join Pete as he explains more about this ground-breaking technology. Available for all versions of Enterprise Linux including Red Hat, SUSE, and Canonical (Ubuntu).
Presented by AWS and Druva, featuring Robert Lyons, CTO, Katz Media GroupRecorded: Nov 23 202035 mins
Accelerate cloud migration with cloud-based data protection. Watch this webinar to learn how Druva, powered by AWS, helped national media conglomerate Katz Media Group shift from on-premises data center protection to a 100% cloud-based solution — kick-starting an organizational shift to the cloud that enabled more agility, efficiency, and cost-savings.
Watch to learn how Druva’s cloud-native data protection solution built on AWS empowered Katz Media Group to:
• Validate the shift from capital expenses (CapEx) to operating expenses (OpEx) with TCO savings of up to 50%
• Improve organizational agility, data security, and accessibility with a comprehensive cloud-based solution
• Boost employee productivity through a single console that manages endpoints, data centers, and cloud-native workloads
• Accelerate time to value with easy deployment and single-click backup and disaster recovery from the cloud
Justin Henderson, Certified SANS InstructorRecorded: Nov 23 202064 mins
Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities and now it’s even targeting itself toward halting critical ICS/SCADA operations. This webcast will explain why and how ransomware is spreading, introduce standards and provide guidance for detecting and recovering from ransomware, based on US-CERT and NIST resources.
Attendees will learn how to:
* Adapt their architectures to enable more effective ransomware detection and response
* Secure their systems against phishing, USB, web drive-bys and other attack vectors
* Reduce vulnerabilities through appropriate policies and user training
* Use baselining, monitoring, logging and analysis to detect ransomware
* Engage reporting, forensics and secure storage in the battle against ransomware
* Address RIPlace ransomware and its abuse of the Rename operation
The webcast will also provide special considerations that ICS/SCADA organizations need to address.
SPEAKER BIO: Justin Henderson is a certified SANS instructor who authored the SEC555 SIEM with Tactical Analytics course and co-authored SEC455 SIEM Design and Implementation and SEC530 Defensible Security Architecture and Engineering. He is a member of the SANS Cyber Guardian Blue Team who is passionate about making defense fun and engaging. Justin specializes in threat hunting via SIEM, network security monitoring and ad hoc scripting.
There is new lexicon for an old scientific challenge. The World Health Organization (WHO) has named the overabundance of COVID-19 information the “infodemic.” While COVID-19 has highlighted the challenge of identifying, aggregating and analyzing validated clinical data to fight diseases; other scientifically complicated diseases with large patient populations have the same challenge. Diseases meeting these criteria are referred to as emerging diseases, because while they may not be new, the science has evolved, and their markets are projected to emerge.
In this webinar you will learn:
- Discuss the data avalanche and its impact on the healthcare industry today.
- Explain the utility of different clinical data types by various stakeholders in healthcare.
- Determine challenges of culling the data avalanche quickly and efficiently.
- Discuss potential pros and cons of data sharing amongst stakeholders.
The Linux operating system is secure by default because Windows is the most used operating system globally. Thus attackers create viruses and malware to target Windows systems. While cringe-worthy to read, these are all real statements being touted in the technology sector. This is a false narrative that is still frequently touted in the technological world.
This webinar will highlight the common myths proliferated around the Linux operating system. As well as how they are endangering companies' production environments, and steps companies can take to mitigate the new techniques attackers are using to benefit from these myths.
How recent attacks have shifted to focusing on the Linux ecosystem.
How Linux malware is being crafted and detected.
What you can do to protect yourself from the change in attacker's techniques.
Áine Corcoran, Regional Vice President - Startups UK, Salesforce Kevin Martin, Solution Engineer, SalesforceRecorded: Nov 23 202047 mins
Are you an SME who’s way of working has radically changed in recent months but now you want to get back on the path to growth? After spending much of this year on survival mode, it's never been a more important time to get back to basics to build security, future-proof your business model and be ready for growth in the next normal.
Mathew Joseph, Wipro Ammar Fayoumi, Cloudera Ranjit Rajan, IDCRecorded: Nov 23 202057 mins
The pandemic is the most significant cloud transformation catalyst for businesses. Long digital transformation roadmaps have now been compressed into days and weeks as organizations race to adapt to the new normal.
Organizations and governments are increasingly optimistic about the potential of the cloud, not just to unlock cost-efficiencies and data storage possibilities but also to fast-track their journey toward a truly connected Intelligent Enterprise, driven by Artificial Intelligence (AI).
Attend this joint webinar by Wipro, Cloudera, and IDC to evaluate where you are in the cloud transformation journey. Get insights into proven strategies to overcome challenges with cloud adoption and migration. Learn how you can accelerate your organization’s digital transformation-led innovation.
During the course of the webinar, we will discuss:
● The implication of current cloud capability trends in the market and how the pandemic has geared up digital transformation.
● Challenges with cloud adoption — change management, security, and deriving ROI
● Cloud accelerators to simplify the cloud adoption journey and ensure resiliency, business continuity, and cost-efficient operations.
● How organizations can leverage data as a strategic asset in digital transformation.
● How to drive innovation and build an Intelligent Enterprise through cloud adoption and AI initiatives
In this session, we will cover how you can use Dell Cloud Storage Services to eliminate the expenses and headaches of operating a second site, learn how you a can use the Cloud to provide your DR site or handle other workloads.
Presenters: Ray Kalmbach, Field CTO, Faction and Anthony Derrico, Account Executive, Dell EMC
Vor kurzem haben wir ein Webinar auf der Webseite itsicherheit-online.com abgehalten. Hier bieten wir die Aufzeichnung von diesem Webinar an.
Die Kompromittierung der eigenen IT-Infrastruktur ist heute keine Frage des "ob" mehr, sondern eine des "wann". Die Kombination aus Cloud und Home Office sowie der Übergang zu DevOps-Modellen mit Containern und Microservices bieten eine Vielzahl neuer Angriffsmöglichkeiten. Traditionelle, signaturbasierte Abwehrmaßnahmen wie etwa Antiviren-Programme sind oft nicht geeignet, aktuelle Angriffsmuster wie etwa Emotet zu erkennen.
Insbesondere die Gefahr von Zero-Day-Attacken erfordert einerseits ein konsequentes Schwachstellen-Management, um die Angriffsfläche wirkungsvoll zu verringern. Andererseits werden Detection&Response-Systeme benötigt, die einen dennoch erfolgreichen Eindringling früh erkennen und unverzüglich Gegenmaßnahmen einleiten können.
Die enge Integration beider Systeme sowie ein hoher Grad an Automatisierung sorgen dafür, dass die Zahl der aufwändig zu bearbeitenden falsch-positiven Alarme minimiert und die Untersuchung von Verdachtsfällen erheblich beschleunigt werden.
Stephen Tsang, General Manager, ICT Infrastructure, NTT Ltd. / Yanchu Zhang, Principal Consultant, Network Services, NTT Ltd.Recorded: Nov 23 202040 mins
During this period when most organizations have accelerated their digital workplace strategy, the surge of multimedia collaboration combining voice and video, heightened access to cloud applications and increased data storage have all placed huge stresses on current enterprise networks.
During this webinar, Stephen and Yanchu will discuss the challenges that remote workplaces have placed on enterprise networks, including:
• Bandwidth scalability and cost
• Cloud application performance
• Visibility and monitoring
They will also share how network and ICT infrastructure should be transformed using software-defined technology to meet the challenges of this new era.
• Stephen Tsang, General Manager, ICT Infrastructure, APAC, NTT Ltd.
• Yanchu Zhang, Principal Consultant, Network Services, NTT Ltd.
Samuel Rhea, Director of Product Management, Cloudflare and Adam Shepherd, Reviews and Community Editor, IT ProRecorded: Nov 23 202024 mins
For many years, the corporate VPN has been regarded as more of a necessary evil than a treasured part of the business’ IT estate; although VPN appliances were vital for allowing employees to access corporate tools and resources while outside the office, they were slow, cumbersome and frustrating to use. They’re also often ill-suited to the high demands placed on them by the modern SaaS applications relied on by many businesses.
Thankfully, organizations no longer have to depend on physical VPN appliances; they can utilise the power of the cloud to authenticate and protect their employees wherever they are in the world, depending the edge of the corporate network, whatever that edge happens to look like.
Join IT Pro reviews and community editor Adam Shepherd and Cloudflare product manager Sam Rhea to find out:
- How Cloudflare for Teams can protect devices, networks, and internal applications without compromising performance
James Falkner, Jason Dobies, Sophie Watson and Phil Simpson; Red HatRecorded: Nov 20 202037 mins
Digital transformation requires not only changing your organization's process and culture, but also transforming the underlying technology to match the requirements of change. Developers, IT and business leaders, and more recently, data scientists, all have a stake in their organization's transformation journey. Red Hat technology helps keep the focus on innovation, so the technology works for you—rather than the other way around.
In this session, a panel of Red Hat experts will discuss common customer challenges faced in transforming technology to match people and process. We'll also share how Red Hat customers across different industries have overcome those challenges during their transformation. In addition, we'll discuss how Red Hat OpenShift and Red Hat Application & Data Services work together as a platform that successfully develops and delivers new and innovative capabilities for their customers.
James Falkner, Product Marketing Director, Red Hat
Jason Dobies, Developer Advocate, Red Hat
Sophie Watson, Principal Data Scientist, Red Hat
Phil Simpson, Senior Principal Product Marketing Manager, Red Hat
Akamai's Steve Winterfeld - Advisory CISO, and Tony Lauro - Director of Security Technology & StrategyRecorded: Nov 20 202037 mins
One of the keys to building an effective defensive perimeter is understanding how the threat is attacking. While you can’t defend against everything, we will cover four of the top issues that you should be prepared for.
This talk will review trends we are seeing in the following threat vectors:
Gary Schoch, GM, Brian Gillespie, Head of Product Management, Martin Tavener, CTO EMEA, Tony Stankoski, HCL Discover SMERecorded: Nov 20 202027 mins
Join us as we share what's coming in our Fall 2020 release in December. New Google capabilities, Unica Discover integration, embedded CMS and DAM capabilities and much more. Don't miss this opportunity to hear from our leaders and get excited about the new capabilities!
Michael Armstrong, Vern Bolinius, Chris PorterRecorded: Nov 20 202074 mins
Organizations are experiencing a number of changes in their business operations. VMware Cloud™ on AWS delivers a scalable and secure cloud service in the AWS Cloud. VMware Cloud™ on AWS can help businesses alleviate potential business disruptions for our customers in 3 ways.
Attend the webinar to discover how!
James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEARecorded: Nov 20 202056 mins
With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud. Organisations have adopted or plan to adopt Cloud Access Security Brokers (CASBs) to help them.
Join Proofpoint experts as they discuss the findings of a newly conducted research among security professionals to determine the needs of enterprises from CASBs, and whether or not their expectations are being met.
In this session, they will explore:
- Where is CASB on the adoption curve?
- How security professionals use CASB for visibility, compliance, data security, threat protection and access control
- Effectiveness and next evolution of CASBs
Tom Green, Senior Solutions Architect, Confluent.Recorded: Nov 20 202062 mins
Traditional systems were designed in an era that predates large-scale distributed systems. These systems often lack the ability to scale to meet the needs of the modern data-driven organisation. Adding to this is the accumulation of technologies and the explosion of data which can result in complex point-to-point integrations where data becomes siloed or separated across the enterprise.
The demand for fast results and decision making, have generated the need for real-time event streaming and processing of data adoption in financial institutions to be on the competitive edge. Apache Kafka and the Confluent Platform are designed to solve the problems associated with traditional systems and provide a modern, distributed architecture and Real-time Data streaming capability. In addition these technologies open up a range of use cases for Financial Services organisations, many of which will be explored in this talk. .
By attending this talk you will develop a new understanding of:
•How Apache Kafka enables a 360 view of the customer
•How to provide a back bone for distribution of trade data
•How Kafka and Confluent Platform enable you to meet regulatory requirements for trade information, payments, liquidity
•How to overcome security concerns with SIEM
•How to integrate mainframe data with event streaming and the cloud
•How to reduce fraud with real-time fraud processing, fraud analytics and fraud notifications.
Shefali Chinni, Senior Product Marketing ManagerRecorded: Nov 20 202049 mins
Advancing your digital transformation means adopting new technologies and deploying infrastructure in new ways. Whether you’re moving to the cloud or deploying on-premises, transforming your network is essential to a successful transformation. In this live webcast, we will update you on our network transformation vision, which, for the 3rd year in the row, has been named a leader in the 2020 Gartner Magic Quadrant for WAN Edge Infrastructure.
Join us to learn about the new Secure Access Service Edge (SASE) platform that delivers intrinsic security and Zero Trust Network Access (ZTNA) for organizations embracing cloud and SaaS. Along with SD-WAN work from home (WFH) subscriptions, you can now provide your remote workforce with the benefits of network optimization -- assured application performance with advanced security at an affordable cost.
Dustin Kehoe, GlobalData | Peter Bocquet, VMware | Richard Thomas, Telstra | Anoop Mohanan, TelstraNov 24 20206:00 amUTC45 mins
The global pandemic has resulted in an overnight shift to remote working and cloud migration for many organisations, putting significant strain on global infrastructure. Networks now need to balance speed, resiliency and security with the end user experience.
This was seen in a recent survey of global IT managers shown that network investments are a high priority in 2020 and 2021(1).
To minimise unplanned network downtime, which is the single biggest cost and inhibitor to innovation and transformation, businesses need a strong network underlay as much as the overlay.
Join us for a fireside chat with GlobalData, VMware and Telstra, to understand the major shifts in corporate networking strategy and how to successfully implement it.
1. Overview of the corporate networking market
2. Current enterprise challenges – enable employees with Work @Home, video conferencing, VOIP calling and benefits of an SD-WAN overlay.
3. Benefits of an SD-WAN underlay with Zero Preventable Downtime risk management
4. Differences between network resiliency and security
5. Modern managed services – what’s changed?
6. What a successful networking strategy looks like
(1) GlobalData Research on ICT Spending: Pre and Post-Covid, 2020. n=4,181
By registering, you give consent to receive marketing and promotional emails from VMware and its partners. Feel free to share this event with your friends and colleagues.
Helen Beal - Chief Ambassador at DevOps Institute | Alan Murphy - F5 | Gemma Allen - Barracuda | Mark Peters - TechnicaNov 24 20208:00 amUTC59 mins
Results from the RightScale 2019 State of the Cloud Report found that “Container use is up, and Kubernetes use is skyrocketing. The use of Docker containers continues to grow, with adoption increasing to 57 percent from 49 percent in 2018. Kubernetes achieving even faster growth, increasing from 27 percent to 48 percent adoption.”
With the increasing move to Kubernetes and beyond, it's essential that DevSecOps best practices are incorporated. Join episode 6 of Day-To-Days DevOps, where host Helen Beal will be chatting to guests from the world of DevSecOps, cloud, containers and Kubernetes about:
- How to shift left to a DevSecOps mindset
- What the best practices are to protect your Kubernetes environment without compromising agility
- Practical tips to overcoming the challenges of implementing DevSecOps in the cloud
Gemma Allen - Cloud Solutions Architect, Barracuda
Alan Murphy - Senior Product Manager, F5
Mark Peters - Lead Information Assurance/Security Engineer, Technical
Guy Rosefelt - Sangfor Product Marketing DirectorNov 24 20208:00 amUTC60 mins
Everyone has NGAV, EDR, anti-malware, etc. installed. Yet, ransomware and APTs still infiltrate and infect organizations with abandon. In this webinar, Sangfor will discuss the most common techniques next-gen malware uses to evade detection and provide recommendations on what your endpoint protection should do to better detect and block the sneaky malware.
Markus Schmid and Christian ElsenhuberNov 24 20209:00 amUTC68 mins
Oftmals wird das Thema der Kosten erst in zweiter Instanz analysiert, da andere Dinge im Vordergrund stehen – genau da setzt dieses Webinar an, erfahren Sie alles zu Kostenoptimierung in AWS.
In vielen AWS Implementierungen stehen die neuen Möglichkeiten und die Innovation im Vordergrund. Das Thema Kosten kommt häufig erst dann zur Sprache, wenn die monatliche Abrechnung eintrifft. Wenn die Kosten das geplante bei weitem übersteigt, werden kurzfristige Aktionen durchgeführt um die Kosten in den Griff zu bekommen: Abschalten von ungenutzten Diensten, Verschieben von geplanten Projekten oder den Entwicklern werden Berechtigungen genommen. In diesem Webinar möchten wir aufzeigen welche Sparmaßnahmen es grundsätzliche gibt, welche Optionen AWS konkret anbietet und wie diese am besten eingesetzt werden können, um damit langfristig die Kosten zu optimieren. Dadurch kann nicht nur Geld eingespart werden, sondern auch Innovation weiter vorangetrieben werden und Budget für Neues eingesetzt werden.
Highlights aus der Agenda:
Möglichkeiten der Kostenoptimierung
Optimierung der Kosten mit AWS
Werkzeuge die bei der Optimierung helfen
Optimierung einer AWS Umgebung am konkreten Kundenbeispiel
Marcus Schmid, Solution Architect, Rackspace Germany GmbH
Christian Elsenhuber, Solution Architect, AWS
Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Competitive Specialist, ProofpointNov 24 20209:30 amUTC37 mins
Economics, social and regulatory pressures have fundamentally changed the demands on archiving solutions. This creates new challenges and opportunities for the enterprise – from need of supervision to help ensure regulatory compliance and provide proof of compliance, to broader application of the technology. For instance, the monitoring of business digital communications for opportunities for training or targeted actions can help improve employee performance, reduce policy violations, and much more.
Welcome to the next wave in Archiving Compliance technologies.
In this Live Webinar, we’ll discuss how archiving has evolved to address today’s information management challenges and unveil how you can improve information governance, compliance and financial position by:
Streamlined e-discovery to increase efficiency and reduce costs.
Refined insights expand visibility for mitigating risks.
Enhanced regulatory compliance supervision to improve review accuracy across email, social, and enterprise collaboration data.
As an added bonus, we’ll wrap up the webinar with a live demo of Proofpoint Enterprise Archive, including key features in E-Discovery Analytics and Intelligent Supervision.
Vladimir Marchenko, Product Manager MDK Core and Middleware, Arm & Bruno Castelucci, Principle FAE, ArmNov 24 20209:30 amUTC60 mins
Arm creates standards, tools and design flows that help developers create reliable and secure products faster. Cortex Microcontroller Software Interface Standard (CMSIS) helps to:
- Improve the software portability and re-usability
- Move quickly through product development from evaluation platform to bespoke production hardware
- Easily manage software components over the product lifecycle
- Optimize the resource use to minimize system cost
Pierrick Martel, Global Product Marketing Manager and Eileen Lee Lavergne, Technology Marketing ConsultantNov 24 202010:00 amUTC38 mins
While you’re working tirelessly to see your organization through the never ending journey to modern IT, you're hitting blind spots in your hybrid infrastructure.
Gartner says most IT teams share your pain. Teams are bogged down by a growing expanse of too many tools and no way to see from the cloud to the edge.
This 45-minute webinar will deliver the strategies and processes that will rally your team around a single, sharable view of the IT system, helping teams to:
• Anticipate downtime
• Cut down on complexity
• Achieve against SLAs
• Improve accountability and clarify lines of responsibility
• Focus on adding value – not just fixing the issues
• Share actionable insights to fix errors before they happen
John Delaney, Associate VP, Mobility IDC & Johan Arts, Senior VP Equinix EMEANov 24 202010:00 amUTC35 mins
The advent of 5G promises an acceleration in the process of digital transformation by providing a pervasive, high-performance connectivity fabric. For the first time, 5G offers enterprise networking that combines the performance and reliability of wireline with the flexibility and scalability of wireless. Everything can become mobile, and everything can become part of the enterprise's diverse, expanding ecosystems.
This webinar, co-hosted by IDC and Equinix, provides an overview of 5G's capabilities, and of the ways in which they can be harnessed to drive operational transformation. You will learn:
• What new capabilities 5G brings to networks, and how those capabilities make 5G the first enterprise-grade mobile infrastructure
• How enterprises are already using 5G to build competitive differentiation, in verticals ranging from manufacturing, through healthcare to the public sector
• How advanced 5G capabilities will underpin the transformation of enterprises into hubs at the centre of digital ecosystems
• What you can do now to get ready for the 5G revolution
Anthony Campanale, Principle Solutions ArchitectNov 24 202010:00 amUTC45 mins
With Cloud environments becoming the default for many organisations, finding a safe place to develop the associated tech skills is key. Pluralsight’s Cloud Labs enable learners to get hands-on practice in a provisioned cloud environment, in the vendor sandbox of their choice.
Join Pluralsight’s Anthony Campanale on Tuesday November 24th at 10am GMT to demonstrate how you can develop practical cloud experience with step-by-step instructions and sandboxed environments for public cloud providers (e.g. AWS, Azure, Google Cloud Platform).
Terry Young, Director Service Provider Product Marketing; Siddhartha Aggarwal, Lead Product Marketing EngineerNov 24 202010:00 amUTC59 mins
While service providers, enterprise transform networks to telco cloud and distributed edge architectures, traffic and subscriber volumes keep climbing. The global pandemic has added to that growth, pushing Internet traffic up 50% in some markets. Service providers, enterprise and educational institutions across the world are scrambling to increase capacity and strengthen security as subscribers work and play more at home, enterprises shift to on-line business models and higher education organizations support remote learning. One area that can quickly get overwhelmed is the CGNAT infrastructure – that capability in service provider and enterprise networks that manages the pool of IPv4 and IPv6 addresses.
During this session we are going to discuss the challenges now faced by service providers, including real world case studies.. We will also review some of the CGNAT features and products that comprise A10 Networks Thunder CGN solution and can help optimize existing CGNAT infrastructure, deploy capabilities in new edge architectures, meet short term capacity requirements, extend the IPv4 lifetime and transition to IPv6.
The session will cover:
•Impact of global pandemic on service provider, enterprise and education institution networks
•Market and Network Technology Trends:
•On-going need for CGNAT and IPv4 – IPV6 Migration
•Security and capacity Challenges in distributed architectures
•Real World Case Studies
•A10 Networks Thunder CGN Solution
Simon Ratcliffe, Ensono | Mike Kiersey, Dell Boomi | Yvonne Stewart, Dell I Sophie Bryan, Ordinarily Different Ltd.Nov 24 202010:00 amUTC60 mins
"Work Reimagined" For A Hybrid Workforce Episode 2
The new world is hybrid, and the working environment will never return to how it once was. With this in mind, how can you lead a return to work in a way that reflects the new normal?
When planning a return to the office, there are a number of key considerations. Leaders must consider how to drive strategy in a way that protects and supports the mental wellbeing of their employees, as well as their physical health. It is important that moving forward, we take the lessons from the pandemic and the hybrid model of work, and apply them to the workplace. Allowing employees to work remotely, supporting their home life, and continuing to push a collaborative effort is key to keeping employees productive and healthy.
As well as prioritising employee mental health, it is important that organisations have the iT infrastructure in place to monitor and log the data needed for HR and facilities to maintain the proper health and safety restrictions. HR titles will now be intrinsically linked in order to collaborate and ensure the most stringent safety standards. However, your infrastructure must support this. With Boomi solutions, those in HR will be able to track data securely and efficiently, with the ability to interpret data and set up a safe and supportive workplace, keep offices and remote employees connected, and ensure that the digital workspace is safe from disruption.
In this session we will explore:
- How to champion the mental wellbeing and wellness of your employees while planning a return to the office
- How to optimise your existing IT infrastructure to support HR as they log and monitor data, keeping those in the workplace safe
- How can we ensure that a return to the workplace helps drive social impact, like reducing our carbon footprint and emissions
Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; John Grimm, VP Strategy & Business Development, nCipher SecurityNov 24 202012:00 pmUTC60 mins
With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.
The 2020 Global Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.
Join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and John Grimm, VP of Strategy and Business Development at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges. You'll take away:
- Data to benchmark your encryption strategy by industry and by country
- Where organizations are using Hardware Security Modules for increased trust and key protection
- Features of encryption solutions that provide the most value
Building a modern app requires the perfect blend of technologies that enable scalability and security for your customers. Some organizations build these solutions themselves, spending a large amount of developer resources on security, authentication, authorization, and user management.
But this approach can mean less time spent on an app’s core functionality. That’s why Okta’s Customer Identity offering is different. It enables developers to stay up-to-date with scalability and security needs out of the box, while still allowing for flexible customizations that directly address your organization’s needs.
Watch this on-demand webinar to learn:
- How to reduce development time for your app’s digital experiences
- The components of a modern customer identity and access management solution
- How Okta can eliminate your app’s security gaps
Steve Carter | Senior Product Marketing Manager, NutanixNov 24 20202:00 pmUTC43 mins
Converged infrastructure is several steps up from legacy infrastructure, it loses out when it comes to the cost-saving, application-securing, VM-moving power of hyperconvergence.
Join us for this webinar where Steve Carter, Senior Product Marketing – Nutanix, will take you through how you can simplify your IT infrastructure.
In this webinar you will learn:
• What are the primary benefits of HCI compared to Converged Infrastructure?
• How WebScale IT infrastructure innovations make HCI possible
• How HCI enables IT to be agile and cost conscious in the face of business uncertainty
Colin West - EMEA SE Director, DruvaNov 24 20202:00 pmUTC20 mins
Join Druva for a 30 minute briefing and learn what to look for when evaluating cloud-based Data Protection solutions. We’ll discuss the best practices for a backup solution that protects your on premise data whilst ensuring the data protection repository is away from your network.
Storage Managers, Data Protection administrators, and anyone responsible for data would be interested in this webinar on Best Practices. Register and learn
- Why data protection works best in a cloud-native environment
- Real-world solutions architecture will be discussed with respect to Data protection
- Modernize your Data Protection by considering what to look for in a cloud-based solution
We expect the session to be well subscribed, so register now!
Nishant Taneja & Olesia Klevchuk, Product Marketing, Barracuda, Bryan Glick, Editor in chief, Computer WeeklyNov 24 20202:00 pmUTC42 mins
Traditional email security solutions aren’t enough to protect businesses anymore. Strategies and processes need to be in place to actively defend your business, people and data against sophisticated email threats.
Join Bryan Glick, Editor in chief at Computer Weekly, Olesia Klevchuk and Nishant Taneja, Product Experts from Barracuda as they explore strategies to improve your email protection and answer questions:
- Why is email still the #1 threat vector?
- What types of attack strategies are cybercriminals using during the pandemic?
- How can IT security professionals make sense of the threat landscape?
- How does remote work change the perspective on security?
- What threats should end users be on the lookout for?
- With email communication and messaging becoming integral to remote work, what can employees do to stay safe?
- Why do traditional defenses fail to detect and stop advanced attacks?
- Should organizations deploy 2FA to prevent account takeover?
- When threats do get through, how should incident response work?
- Beyond technology tools, how can organizations improve their defenses?
Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloudNov 24 20203:00 pmUTC60 mins
Numerous organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.
To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.
In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
- Maintaining continuous visibility into applications usage
- Controlling access from trusted locations and devices
- Maintaining optimized protection wherever data travels
- Enforcing policies to ensure compliance [ex. GDPR]
- Encrypting any protected data with full key control
- Detecting threats including malware and compromises
- Performing context-driven forensic investigation
Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
Sven Skerka, Senior Strategic Account Manager und Athar Anjum, Enterprise Security Specialist, DigiCertNov 24 20203:00 pmUTC45 mins
TLS/SSL-Zertifikate gelten nach wie vor als globaler Standard zum Schutz der Kommunikation zwischen IT-Netzwerken, Geräten und Anwendungen. Trotzdem kommt es immer wieder zu Ausfällen, entweder durch menschliche Fehler oder aufgrund schlecht organisierter TLS-Lebenzyklusprozesse. Nehmen Sie am Webinar von DigiCert zum Thema „Best Practices für die Verwaltung von TLS-Zertifikaten im Unternehmen“ teil. In diesem 30-minütigen Vortrag mit anschließender Live-Beantwortung von Fragen geben unsere Experten Sven Skerka und Athar Anjum Einblicke in Best Practices für das TLS/SSL-Management und stellen ein Sicherheitskonzept mit vier Phasen vor:
• Identifikation und Analyse Ihrer TLS-Umgebung
• Fehlerbehebung und Kontrolle Ihrer Zertifikate
• Sicherung Ihrer Ressourcen mittels Standardisierung und Automatisierung
• Tools und Taktiken zur Überwachung
Verpassen Sie nicht diese Gelegenheit, mehr über eine robuste Strategie zur TLS/SSL-Zertifikatsverwaltung zu erfahren und Ihre Fragen direkt an ausgewiesenen Experten aus diesem Bereich zu stellen.
Dan Juengst, Senior Principal Technology Evangelist, Red Hat and David Duncan, Partner Solution Architect, AWSNov 24 20204:00 pmUTC61 mins
Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud environment, you often end up being overwhelmed and discover that vendors don’t use the same language when talking about them.
Detailed planning with Red Hat and Amazon Web Services (AWS) can help you successfully create, scale, and migrate innovative applications to an agile hybrid cloud environment as big as you need and available whenever and wherever you need it.
In this webinar, we’ll:
•Share a series of questions you might consider when planning your hybrid cloud journey.
•Discuss how the Red Hat and AWS partnership can simplify a potentially complicated journey.
Exciting operating system (OS) announcements came out of Apple's Worldwide Developers Conference. And as promised, macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14 will be coming to an Apple device near you. Are you ready?
In our webinar, What's New in Apple OS Upgrades, we’ll show you what these new operating systems offer for productivity, security and management capabilities.
- A brief overview of macOS Big Sur, iPadOS 14, iOS 14 and tvOS 14
- New management functionality and what it means for IT
- How to seamlessly upgrade your Apple fleet
- How same-day support benefits IT stakeholders
Data centre experts from BT and CiscoNov 24 20204:00 pmUTC21 mins
The new normal has accelerated the pace of change. Digital transformation means that your existing data centre needs to deliver more.
In the next webinar of our 'Shape the future of infrastructure' series, we’ll explore:
•how to implement new technology in private data centres
•how to get cloud-like agility within your data centre
•the features of Cisco ACI and what it delivers.
Our data centre optimisation portfolio expert, Charles Greenaway, will be joined by Louise O’Neil, head of new customer sales and Gareth Furse, an account manager in solutions SP sales from Cisco to offer their views on the options available to you.
Johna Till Johnson, CEO and Founder, Nemertes ResearchNov 24 20204:00 pmUTC60 mins
Some of the top use cases for IoT are Healthcare, Smart Buildings, and IIOT (industrial IoT). How are companies approaching these use case? What security measures are they taking? How well are the teams driving these use cases engaged with one another, and with the IT, cybersecurity, and other technology teams? This webinar drills down into the current state of these critical use cases, and provides technology leaders with insight into how companies are organizing around delivering IoT.
Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product ManagerNov 24 20204:00 pmUTC44 mins
Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.
* Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
* How to set triggers based on thresholds important to your business
* Set feature flags to control specific parts of your environment to reduce stress levels.
See a Honeycomb demo, ask questions and learn more.