Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Grant Duke - NA Commercial Lead | Microsoft and Rob Furrow - Field Marketing Manager | Dell TechnologiesLive40 mins
The way we work and the anticipated experience from our end users is rapidly changing. Dell has solutions in market today to address these challenges, and a plan for what the future hold.
In this webinar we will explore the best in class productivity solutions from Microsoft and Dell. We will review how Dell PC’s work best with Windows 10 Pro and Office 365 to deliver client solutions that IT trusts and end users love.
Robert Furrow | Dell
Robert has over 13 Years with Dell as a Sales Leader, Trainer, Customer & Product Consultant. Currently, Rob is a field marketing manager helping support our Commercial and Medium Business sales teams.
Grant Duke | Microsoft Corporation
Grant has nearly 20 years of experience in mobile computing with Microsoft and other technology leaders. In his current role with Microsoft he leads Commercial Sales with Dell North America by aligning the combined strategies of Dell’s Workforce Transformation and the Microsoft Modern Workplace.
Antonio Cancellara, Sales Engineer, SonicWallRecorded: Jan 24 202060 mins
Venite ad ascoltare l’esperto di sicurezza Antonio Cancellara di SonicWall, che vi farà conoscere il lato umano di un moderno gruppo ransomware, i suoi consigli su come impedire ad esso di infiltrarsi nella vostra organizzazione, crittografare gli endpoint e diffondersi ad altre unità e segmenti della rete.
Björn Schießle, Sales Engineer Nextcloud und Thomas Grätz, Sales Engineer SUSE Software Solutions Germany GmbHRecorded: Jan 24 202053 mins
Digitale Unabhängigkeit und Datensouveränität werden im öffentlichen Sektor und in der freien Wirtschaft immer wichtiger. Daher erfreut sich Nextcloud als komplette Open-Source und On-Premise Lösung immer größerer Beliebtheit. In Deutschland setzen alle Bundesministerien im Rahmen der "Bundescloud" auf Nextcloud. SUSE und ihr Partner, die Nextcloud GmbH stellen Ihnen beide Lösungen vor und zeigen, wie daraus eine leistungsfähige europäische Open-Source On-Premises Lösung entstehen kann. Die Nextcloud Kollaborationsplattform lässt sich nahtlos mit der SUSE Storage Software Lösung kombinieren. SUSE mit 28 Jahren Open-Source Expertise und Nextcloud schreiben digitale Souveränität groß und sprechen mit ihrer Lösung den öffentlichen Sektor und auch Unternehmen in der freien Wirtschaft an. Seien Sie dabei, wenn Thomas Grätz/Robert Grosschopff, Sales Engineer bei SUSE und Björn Schießle, Sales Engineer bei Nextcloud in Deutschland zeigen, wie man einfach mit der SUSE und Nextcloud Lösung starten kann.
•Vorstellung Nextcloud GmbH und ihre vollständige, 100% Open-Source und On-Premise Kollaborationsplattform
•Vorstellung SUSE Enterprise Storage 6.0 - Thomas Grätz
•Kombination SUSE Enterprise Storage 6.0 und Nextcloud – eine sichere Lösung aus der Perspektive von digitaler Autonomie
Wir hoffen, Sie sind dabei! Melden Sie sich am besten noch heute an.
Nancy Wu, Sales and Customer Support, SkyStemRecorded: Jan 23 202058 mins
[Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.
Please note: CPE credit not available for this playback
Harold Byun, VP Products, BaffleRecorded: Jan 23 202054 mins
As concerns over data privacy and data theft continue to mount, companies are searching for solutions to help secure their customers' data and mitigate the risk of data theft, all without breaking business processes. The more recent data privacy regulations will significantly increase the cost of non-compliance and have the potential to stifle business intelligence and big data efforts as well.
The challenge that companies face is implementing the appropriate data level security without adversely impacting the business while still facilitating ways to leverage and monetize information. Historically, achieving this type of balance was impossible and methods to appropriately secure data often broke applications or made data useless for analytics.
Modern approaches to privacy preserving analytics are now available to easily protect your data for compliance, yet still allow for data processing on information without ever violating data privacy. Attend this webinar to learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.
This session will provide a review of various data-centric protection methods (data masking, tokenization, BYOK, field and record level encryption) including privacy preserving analytics and how they can be easily implemented to protect information in the cloud and on-premise.
Join this webinar and learn about the following:
- Key requirements of recent data privacy regulations and compliance strategies
- Common threat models that unknowingly leave data exposed to data theft
- Various data-centric protection methods that can help mitigate data security risks
- Privacy preserving analytics use cases that can
Peter Prose, VP Product Marketing & Ana Ruiz, Technical Marketing Architect, Kevin Binder,Principal Product Marketing ManagerRecorded: Jan 23 202044 mins
With Citrix Workspace with intelligence and microapps you can create a better experience so employees become more productive and engaged.
A great employee experience is everything. It drives higher productivity and engagement, and ultimately, higher revenues and better customer satisfaction. Tune in to this one-hour webinar to learn the best way to get there – with Citrix Workspace with intelligence and microapps. This technology can be added to an existing Citrix infrastructure or newly-deployed. Citrix Workspace makes life easier for employees by enabling them to cut through the clutter and actually get work done. And for IT, managing digital workspaces from a single console is easy and effective.
- the simple process of building and deploying microapp workflows using the Citrix Workspace Microapp service
- the Microapp Builder interface with built-in SaaS integrations
- details that relate to your particular IT environment -- product experts will be on hand who can answer questions during the webinar.
Ganesh Nalawade, Red Hat, and Nathaniel Case, Red HatRecorded: Jan 23 202041 mins
In Ansible 2.6 release we added network_cli/httpapi/netconf as first-class connection plugins within Ansible. Most of the network platforms supported by the community still continue to use the local connection type.
This talk will cover how to identify which connection plugin to use for a given network platform and do a deep dive into how to port existing modules from local connection to either nework_cli or httpapi or netconf for a particular network OS.
Storage Switzerland and PanasasRecorded: Jan 23 202043 mins
Artificial Intelligence (AI) and Machine Learning (ML) workloads are fundamentally different from any other workload. These workloads deal in data sets measured in dozens of petabytes of capacity, and large percentages of it can go from dormant to active at any moment. The high storage requirement and highly active data set make using all-flash arrays or even large flash caches impractical.
IT planners need to rethink their designs to create infrastructures that are highly parallel and leverage high capacity hard disk drives to strike the right balance of performance and capacity. These infrastructures also need metadata efficiency, since AI and ML workloads are metadata heavy.
Join us to learn:
* Why all organizations need to prepare for AI and ML
* The challenges of AI/ML at scale
* Why current storage infrastructures can’t meet the AI/ML at scale challenge
* Requirements of an At-Scale AI/ML Storage Infrastructure
Mike Korembaum, Senior Technical Marketing Engineer Manager at CloudGenixRecorded: Jan 23 202044 mins
A large national retailer headquartered in Georgia USA recently deployed an SD-WAN solution in order to deploy Internet broadband, migrate to AWS and Azure cloud, migrate voice to UCaaS and enable new customer experiences at the retail stores.
Unfortunately, after deploying an SD-WAN solution from their legacy vendor, the customer faced numerous challenges that threatened to erase the multiple benefits of an SD-WAN deployment and negatively affect their overall performance. The team faced issues with VPN scalability challenges, LTE, poor availability of key business applications, visibility and troubleshooting; as well as a very complex integration of cloud-security solutions.
However, all was not lost! Learn the 4 crucial decisions the customer made to overcome their SD-WAN challenges, set their project back on track, and deliver tangible results to their business.
Jonathan Lee, Sr. Product Manager - Menlo SecurityRecorded: Jan 23 202053 mins
99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?
It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.
In this webcast, attendees will learn:
-How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
-Need an additional layer other than a sandbox waiting for patient zero
-The ease of deploying isolation without interfering with user experience in 10 minutes
Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
Viraj Naik, Lead Solutions Architect at Travelers Insurance & Rohit Kelapure, Principal Solution Architect at PivotalRecorded: Jan 23 202064 mins
At Travelers Insurance, a decade old rating engine was still on the mainframe, making it difficult to scale, expensive to run, and reliant on a shrinking pool of skilled engineers. Rating engines are fundamental to the insurance quoting process, and at the very heart of the business. It was time to modernize and take advantage of the scalability, stability, automation and fast iteration cycles made possible by cloud-native architecture.
In this webinar, Viraj Naik of Travelers Insurance and Rohit Kelapure of Pivotal will take us on their journey from mainframe to microservices. Viraj and Rohit will describe how they built a distributed, event-driven rating engine with .NET Core on Pivotal Platform using Steeltoe, running on Linux stem cells. The new rating engine exceeded SLAs and reduced time to production to under 60 minutes.
You’ll learn the keys to a successful mainframe rewrite-based modernization, including:
● A pragmatic, domain-driven approach and phased delivery, including implementing a strangler pattern and anti-corruption layers.
● How to port business objects and business rules from mainframe to .NET.
● New innovations developed and delivered during the migration process.
Viraj Naik, Lead Solutions Architect at Travelers Insurance
Rohit Kelapure, Principal Solution Architect at Pivotal
Craig Connors, Chief Architect at VeloCloud, now part of VMwareRecorded: Jan 23 202059 mins
Craig Connors, Chief Architect for VeloCloud,now part of VMware hosted an “Ask Me Anything” on Reddit about SD-WAN. Craig has been in the SD-WAN space since joining the initial engineering team at Talari Networks in 2007, has spent time in Cisco Advanced Development and have been with VeloCloud and now VMware since 2013 and has accumulated a wealth of knowledge about SD-WAN throughout his career. The questions that came through were so juicy that we can't help but share. Don’t miss this opportunity to learn from an SD-WAN expert, hear what’s top of mind for your peers and ask your own questions.
Join us for this webinar to hear answers to the questions from the AMA including:
• How would you compare your solution to the competition, both ISP/vendor managed solutions, and customer managed solutions?
• From an engineer’s standpoint, what makes you guys stand out versus the others?
• There are some issues with utilizing QoS on MPLS; what are the details of the problem and when will it be fixed?
• Where do you see SD-WAN in five years given that vendor proprietary protocols become obsolete once an open standard is agreed upon?
We'll reserve the last 15 minutes to take live questions from the audience.
Bob Gilbert; Chief Evangelist, NetskopeRecorded: Jan 23 202049 mins
Cloud adoption is exploding with nearly 1,300 cloud apps in use in an average enterprise. From suites like Office 365 to collaboration tools like Slack, the cloud has enabled new levels of productivity resulting in enterprises gaining strategic advantages. Enterprises are not the only
ones benefitting from cloud adoption. Bad actors are using the cloud to bypass legacy defense mechanisms and harvest credentials, deliver malicious payloads, and steal data. Join this informative session to learn about a couple of recent cloud data breaches and dissect how these breaches occurred and best practices to reduce the chance it will happen to your organization. You will learn:
• About new attack scenarios that involve using the cloud to bypass traditional security tools
• How the cloud-enabled kill chain forces a rethinking of how to defend against threats such as Clouphishing and data exfiltration
• 5 steps to protect against cloud threats
Amish Kohli, Cloud Security Solutions ArchitectRecorded: Jan 23 202039 mins
Proofpoint Cloud App Security Broker(CASB) is a cloud security platform that helps accelerate migration to the cloud. Proofpoint keeps improving our CASB and tightening our cross-platform integrations to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.
Join us to see how Proofpoint cloud security adds value to and benefits from existing email security when organizations migrate their email and other core apps to the cloud. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.
- Correlate email threats such as phishing to cloud account compromise
- Detect and investigate threats using more granular policy rules and forensics capabilities
- Find out which apps are being accessed during a risky session via Okta integration
- Drill deeper into Shadow IT and third-party apps forensics
- Prevent risky file activity in the cloud using browser isolation
Jae Lee Director, Product Marketing Splunk Inc.Recorded: Jan 23 202066 mins
Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.
So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.
Join us in this one-hour technical deep dive and demo to learn:
- How to analyze events from three common data sources to look for malicious activity
- How to get more efficient at discovery, triage and the investigation of potential security incidents
- How to leverage automation methods to accelerate investigations and get answers faster
Sean Kaine, Apcela VP of Marketing and Sales, and Kunal Thakkar, Head of EngineeringRecorded: Jan 23 202030 mins
SD-WAN has quickly moved from a nice-to-have to an enterprise roadmap imperative. Join us we explore why and how SD-WAN will play an even more expansive role in the enterprise network security architecture over the next 3 years.
Pradeep Bhanot - Director of Product Marketing at ActianRecorded: Jan 23 202030 mins
Pradeep Bhanot, who has worked with databases for more than three decades, will present a short overview of Actian Avalanche Data Warehouse service. This live webinar will include a demo of setting up the data warehouse and connecting Looker. It will include a live Q&A.
Geert van Teylingen, Microsoft & Kirk Ryan, NetAppRecorded: Jan 23 202052 mins
The 65% of enterprise workloads that continue to be on-premises are looking to adopt cloud methodologies but don’t want to sacrifice performance, reliability, and enterprise data management capabilities. Plus, no one wants to refactor or rearchitect their on-prem systems, applications, or processes!
Watch this joint webinar from Microsoft and NetApp to learn how to easily migrate complex file workloads and applications that are typically hard to run in the cloud–including SAP HANA, Oracle databases, and HPC workloads–to get to the cloud faster today and achieve more tomorrow.
In this webinar, we’ll cover:
• How organizations can make the move from on-prem environments. Hear tips for transitioning enterprise workloads to the cloud easily to reduce risk, resources spent, and time investment
• Microsoft and NetApp’s solution for migrating the unmigratable, Azure NetApp Files. See a demo of the fastest-growing Azure service and hear customer use case examples.
Sean Walker, Enterprise Account ExecutiveRecorded: Jan 23 202038 mins
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.
Join our live demo to learn how to:
- Assess your users’ susceptibility to phishing attacks as well as other cyber threats
- Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Salah Nassar, VP of Marketing at CipherCloud and Mahesh Rachakonda, VP of Product & Solution Engineering at CipherCloudRecorded: Jan 23 202055 mins
ServiceNow is a great tool for increasing workflow efficiency across your business, however, there are risks that are inherited with all cloud apps, specifically around data.
CipherCloud has partnered with ServiceNow to address these risks. While ServiceNow has taken great measures to protect your data within the service, CipherCloud CASB+ provides additional visibility and control over sensitive information being downloaded and shared, and protecting against unwanted access by risky users and devices.
Join us on January, 23 for an informative session on how organizations can secure ServiceNow with a data-centric approach while preserving user features and automated processes. The webcast will cover the following topics:
- Useful insights into CipherCloud’s data-centric approach for ServiceNow.
- Protecting sensitive data as it is being shared outside of ServiceNow.
- Continuous assessment, detection and mitigation of user risks in ServiceNow using Adaptive Access Controls and UEBA.
- Customer success stories review from a variety of regulated industries and more.
Chris Santiago, Solution Engineering Director, Unravel DataRecorded: Jan 23 202059 mins
Make your on-premise Hadoop platform faster, better & cheaper with Unravel by joining Chris Santiago, Solution Engineering Manager to learn how to reduce the time troubleshooting and the costs involved in operating your data platform. During this webinar we will demonstrate how Unravel complements and extends your existing on-premise data platform to:
Instantly understand why technologies such as Spark applications, Kafka jobs, and Impala underperform or even fail!
Define and meet enterprise service levels through proactive reporting and alerting.
Reduce the overall cost of Cloudera/MapR/Apache Hadoop/Spark through better cluster utilisation resulting to an immediate reduction in MTTI and MTTR
Stefan Mollnau | Cisco MerakiRecorded: Jan 23 202063 mins
Das Arbeiten mit digitalen Inhalten, im Internet und mit mobilen Endgeräten ist zum zentralen Thema für modernen, zukunftsorientierten Unterricht und Vorlesungen geworden. Wie schaffen Sie es, trotz knapper Ressourcen, ein verlässliches und sicheres IT-Grundgerüst für digitales Lernen einzurichten? Lernen Sie im Webinar mehr über Herausforderungen, Trends, und Lösungswege für Bildungseinrichtungen der Zukunft.
Erfahren Sie, wie Sie Cloud Managed IT dabei sicher in die Zukunft begleitet und eine Technologie bietet, die einfach funktioniert.
Myles Suer, CIO Chat Facilitator, CIO.com Columnist, Dell Boomi EnterpriseRecorded: Jan 23 202074 mins
According to Jeanne Ross, from MIT-CISR, only 28% of businesses have successfully digitized their business. The remaining 72% are locked in silos or significantly limited by dated, brittle architecture consisting, in the words of CIOs, of duct tape and layered band aids
Oliver Presland Ensono, Mark Anzani IBM, Matthew Roseblade IBM and Bryan Glick ComputerWeeklyRecorded: Jan 23 202026 mins
The tried-and-true mainframe is still alive and kicking in data centres across the world, just as it has been for decades. The difference is that in today’s technology landscape mainframes have new integral functions as key components within hybrid cloud architectures, and even as new foundations for mainframe as-a-service delivery models.
Suffice it to say, mainframes are here for the long term, and they’re continuing to evolve.
Tune into this webcast to hear ComputerWeekly’s editor-in-chief Bryan Glick curate a discussion between leading mainframe experts from Ensono and IBM about the role of mainframes in today’s rapidly evolving IT landscape – and hear their predictions about the evolution of mainframes beyond 2020.
Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) and Kyle Wickert, Worldwide Solution Architect (AlgoSec)Jan 26 20204:00 pmUTC35 mins
Every organization manages security differently and changes at a different pace. But how does your organization compare to others? Are there practices from other organizations that you can adopt?
Join the conversation with Yitzy Tannenbaum, Product Marketing Manager, and Kyle Wickert, Worldwide Strategic Architect, as Kyle shares his insights from visiting hundreds of companies in the field.
•Managing multi-vendors and multi-technologies within large enterprise hybrid networks.
•Accelerating troubleshooting and cumbersome processes, such as rule recertification and application connectivity.
•Ensuring continuous compliance while adopting new regulations.
•Utilizing a network security management to achieve Zero Trust.
•Understanding business applications and the potential related security risks
•How organizations are handing internal struggles between teams and stakeholders in a complex hybrid environment.
Join us for an insightful webcast.
Steve Wilson, VP, Product for Cloud and IoT, Citrix and Robin Manke-Cassidy, Director, Product Marketing, CitrixJan 27 20202:00 pmUTC36 mins
While the cloud does provide businesses greater agility, migrating to the cloud and then managing the cloud is a different story.
Learn how Citrix simplifies your cloud journey by easily migrating workloads, provides choice through partnerships with Microsoft, Amazon and Google and other cloud ecosystems, improves the cloud experience for your users and reduces IT management and security complexity for IT.
Join us and learn how to:
- Seamlessly migrate workloads to the cloud private or public including Azure, AWS, Google
- Enhance cloud reliability, speed up load times, reduce network latency
- Improve cloud worker experience
- Reduce cloud based security threats with user-centric analytics
- Simplify cloud management including apps, data, device and network through a single console
Sujay Sundaram, Senior Director, IT Infrastructure and Cloud Engineering at a Fortune 500 companyJan 27 20204:00 pmUTC60 mins
Is the Public Cloud environment making Data Centers obsolete? Does a cloud experience also involve on-premises infrastructure and Data Centers? Join us on this webinar to explore how one can transform the Data Center practice to provide a Cloud Experience in the modern world where a hybrid-cloud approach is almost mandatory for most enterprises.
Key areas that will be covered:
- What drives the need to modernize Data Centers (DCs)?
- Key areas to modernize in a DC
- Modern Network practices: spine-leaf networks, Software Defined Network, and SD-WAN (Software defined WAN)
- Software Defined Data Center practices (SDDC)
- Enabling better security with SDDC
- Supporting modern application and development practices with the SDDC approach
Given that the Data Center is the foundation for any IT practice, and to drive digital transformation, it is key to use modern DC practices to enable a shorter time-to-market for digital undertakings.
Jesse McHargue and Stowe BoydJan 28 202012:00 amUTC59 mins
Between paper-based processes, manual approvals over emails, and excel sheets being passed around things get lost, missed or bottlenecks are created. Automating these processes eliminates that. It’s time to adopt a modern framework of digital processes and forms.
Join GigaOm Research and expert in digital transformation analyst Stowe Boyd and special guest from Nintex, Jesse McHargue.
Learn a step-by-step approach to transitioning through process mapping and information capture, to process automation, data management and process intelligence.
Watch the webinar to learn:
- The six pitfalls of paper
- Six degrees of digital transformation
- Best practices for digital processes and forms
Dale Zabriskie CISSP, CCSK, Security Awareness Training EvangelistJan 28 202010:00 amUTC57 mins
Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?
Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:
- Proven best practices for increasing the effectiveness of cybersecurity education
- How to build a culture of security within your organization
- Actionable guidance on executing security awareness & training initiatives that deliver measurable results
Anwesa Chatterjee - Sr. Director, Product Marketing, Druva and Max Lindauer Sales Engineer, Cloud Solutions, DruvaJan 28 202010:00 amUTC33 mins
Do you want to be great at legacy data protection or do you want to follow best practices for modern data protection for the cloud era?
Find a more efficient way. Druva offers a 100% SaaS data protection solution that requires 0% infrastructure and offers infinite scalability, complete autonomy, and global accessibility. Plus, Druva data protection solution can deliver up to 50% cost savings while reducing complexity, and eliminate the need for hardware, software or skilled resources.
Join this virtual workshop with our solutions expert to learn how you can:
• Manage and protect your data and enterprise workloads with Druva’s differentiated cloud-first approach
•Reduce TCO for your organization, with a flexible consumption-based pricing
•Eliminate complexity with an automated, single-click disaster recovery across cloud, hybrid and on-premises workloads
• Reduce business impact in case of ransomware attacks
Luc Esprit –- EMEA DPS Sales Vice - President & Mark Stockham - Global Architect - VMware Data Protection Solutions EMEAJan 28 202010:00 amUTC60 mins
We invite you to attend the webcast showcasing the latest enhancements to PowerProtect Software.
Hear from Luc Esprit and Mark Stockham how Dell EMC in collaboration with Project Velero is providing an enterprise grade solution that allows you to place your production workloads in Kubernetes environment.
Learn how PowerProtect for Kubernetes protects them, and focused on app consistent backups and restores that are always available and durable in a Kubernetes workload or DR situation.
Paul Hampton, AlfrescoJan 28 20204:00 pmUTC54 mins
As digital information continues to grow at a staggering pace, a new generation of content services are revolutionizing how businesses approach ECM. Today's organizations are teeming with diverse types of content and different types of users, use cases and requirements. Through automation, integration and AI, content services are building upon the foundation of ECM systems to facilitate better information access, sharing and collaboration. This revolution is not only about new technologies, but new ways of thinking about information management. The traditional approach to EMC is no longer enough.
Join us to learn how you can take your content management to the next level.
Alex Hilton, ClF I Tony Clement, HPE | Justin Day, Cloud Gateway | Ricardo Casanovas, LinkeJan 28 20204:00 pmUTC60 mins
For many, Digital Transformation has become synonymous with the cloud. But can Digital Transformation work outside of the cloud?
In episode 4 of Digital Transformation in Action, we bring together experts to discuss how flexible Digital Transformation is, and explore whether - as cloud computing matures - cloud can be a help or a hindrance.
Join this panel debate to understand cloud’s contributions in the wider context of the business, and see where it fits into your Digital Transformation strategy.
Continue the conversation in our LinkedIn Groups:
Microsoft Azure and Microsoft Cloud Group : https://www.linkedin.com/groups/1120997/
The Virtualization and Cloud Computing Group https://www.linkedin.com/groups/57400/
Cargill’s Sr. Architecting Engineer, Jason Walker and Lead API Engineer, Colin Schaub.Jan 28 20205:00 pmUTC32 mins
Building any good structure requires starting at the foundation, and architecting for engineering success is no different. Cargill’s Sr. Architecting Engineer, Jason Walker and Lead API Engineer, Colin Schaub discuss how to build a model for engineering success from the ground up. This session covers the goals for building a strong engineering culture, incorporating lean concepts into engineering processes, establishing core principles that empower decision making, generating self-service oriented delivery patterns, and more.
Ryan Davis, Senior Manager, Cloud Product Marketing & Vince Stross, Principal Security SE at ExtraHopJan 28 20206:00 pmUTC60 mins
For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes detect-and-respond capabilities.
In this webinar, we’ll dig into how network detection and response (NDR) can power event-driven security in the cloud. Topics will include:
- How virtual taps enable agentless NDR in the public cloud
- How NDR completes Gartner’s SOC Visibility Triad in the cloud
- How NDR can be used for response automation
Ashish Shah, Sr. Director, Product ManagementJan 28 20206:00 pmUTC46 mins
The Microsoft Azure Cloud is the cloud platform of choice for many enterprises in their digital transformation journey. Migrating applications to the public cloud require strategic considerations for application networking services, like load balancing, visibility, and performance monitoring. Register for this webinar to learn how Avi’s Intent-Based Application Services Platform helps Adobe deliver its digital experiences on Azure.
- Confidently migrating applications to the cloud
- Best practices for application networking in the cloud
- How to elastically scale applications
- Ways to optimize deployments across hybrid clouds
Geoff Bock, Principal, Bock & Company and Erin McCart, Director, Product Marketing and Management, ASG TechnologiesJan 28 20206:00 pmUTC60 mins
In today’s digitally driven economy, companies struggle to streamline organizational practices and operational activities. Many are saddled with inefficient business processes and outdated content management capabilities. Savvy firms, however, are relying on innovative ways to unlock the business value of information maintained within legacy silos and repositories.
This webinar examines how content federation empowers digital work while leveraging existing IT investments and information resources across the enterprise. Integrating through the web and the cloud, content federation provides a consistent way to:
• Access and view content stored within disparate repositories
• Enable a unified search experience
• Produce actionable results for business process automation
Noted industry analyst Geoffrey Bock, Principal at Bock & Company, and Erin McCart, Director, Product Management and Marketing at ASG Technologies will discuss why content federation transforms digital work. They will describe how organizations can leverage existing content resources, explain how Mobius Content Services from ASG Technologies enables organizations to cost-effectively federate access to different repositories, and identify three essential steps to harness the business value of enterprise information.
Network traffic encryption is the pillar on which the Internet, as we know it today, rests on. E-commerce, banking transactions, private and sensitive communications…all occur based on the implicit assumption that our communications are secured. However, ubiquity also means targetable, and Transport Layer Security (TLS) has undergone changes in an effort to stay ahead of the security game. Join (ISC)2 and Gigamon on Tuesday, January 28, 2020 at 1:00PM Eastern as we dive into TLS 1.3, the newest version of the TLS encryption protocol. Areas covered include an overview of statistics associated with encrypted traffic, what changes are introduced in TLS 1.3, and the advantages and challenges associated with them, implementation caveats and gotchas and best practice deployment strategies.
Ajay Andrews, Ekata VP of Product Management and Trevor Anderson, Ekata Director of Solutions ArchitectureJan 28 20206:00 pmUTC37 mins
Fighting fraud is a complex business. As new trends emerge across different regions and product lines, it can be a challenge to manage the large amounts of data required to build effective fraud models.
Instead of spending time cleansing and normalizing data from various sources, join our webinar and learn how to optimize your models by:
-Leveraging robust data sets that improve performance
-Avoiding the time suck of endless feature engineering and overfitting
-Consolidating data vendors to focus your horsepower on sophisticated algorithms
Chris Dawson, Threat Intelligence Publications LeadJan 28 20206:00 pmUTC60 mins
Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.
Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.
- Predictions for the 2020 cyber threat landscape
- Key actions you can take to prepare your organization
- Top resources to help support your security efforts
*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Keyfactor's Senior Solution Engineer, Shian Sung and Thales Senior Solutions Architect, Matthew ArmstrongJan 28 20207:00 pmUTC60 mins
Today, DevOps teams are focused on getting new features out faster, yet they need digital certificates for critical tasks in the build and release process - things like signing code, spinning up containers, and using SSL/TLS certificates for load balancers and web servers.
Maintaining an optimized development and release cycle requires frictionless, automatic PKI processes to provide timely, valid certificates while maintaining the visibility and control security teams need to ensure compliance and prevent delays.
How do you unlock DevOps security with PKI Automation?
Join Keyfactor and Thales to discuss how enterprises can automate and securely integrate PKI into continuous integration and continuous deployment (CI/CD) pipeline and the DevOps toolchain – including Jenkins, Kubernetes, and HashiCorp Vault.
Calvin Hsu, VP Product MarketingJan 28 20207:00 pmUTC53 mins
At Synergy 2019, Citrix unveiled new Citrix Workspace intelligent features, including advancements in Citrix Networking and Citrix Analytics to help maximize the employee experience.
Today, work is more complicated than ever. We rely on a plethora of complicated apps, causing us to spend too much time searching for information. What should have been simple tasks, is suddenly time consuming and difficult. Meanwhile, transitioning to the cloud increases the problem by adding network complexity and security challenges. The result? Most employees aren’t engaged in the work they’re doing. That means they aren’t productive.
In this webinar:
•Discover how Citrix Workspace helps organize, guide and automate work
•View a demo of new intelligent workspace capabilities, including personalized notifications and automated workflows
•Understand how Citrix Networking improves the user experience with unified control, performance and security for every user, location and cloud
Learn how Citrix Analytics delivers a single view of actionable insights and offers proactive resolutions for security, performance and productivity issues
Veronica Iles, Consultant, Forrester and Shawn Purtell, Principal Product Marketing Manager, Red HatJan 28 20207:00 pmUTC45 mins
Red Hat® OpenShift® Dedicated helps organizations focus on building and scaling their business with a private Kubernetes cluster fully-managed by Red Hat. Red Hat recently commissioned Forrester to conduct a total economic impact (TEI) study to examine the potential return on investment (ROI) enterprises may realize using Red Hat OpenShift Dedicated.
Join this webinar to hear Red Hat and Veronica Iles, TEI consultant from Forrester Consulting, share the TEI of OpenShift Dedicated and provide you with a framework to evaluate the financial impact—benefits, costs, risk, and flexibility—of the investment.
• Take you through the Forrester TEI methodology and the OpenShift Dedicated customer journey.
• Help your organization understand the potential ROI of an investment in Red Hat.
Steve Moritz, Chief Digital Officer; Ashok Yarlagadda, Chief Information OfficerJan 28 20207:00 pmUTC60 mins
Application development used to be relatively simple. You built one application to solve one problem that users accessed through one type of interface on one type of device. Requirements, data types, and formats were all pretty static. Development was linear and predictable. Skill sets/expertise of developers and user expectations were well-defined, not too diverse, and stable.
Today, organizational innovation as fueled by digital transformation has completely changed this model. A tremendous variety of users (internal and external) demand an experience that delivers flexible functionality accessible across a number of interfaces, using a plethora of access pathways (cloud, mobile devices and apps, wearables, digital assistants, browsers). Their needs/expectations are fluid and the applications built must accommodate a much wider spectrum of requirements.
For organizations to service their customers effectively in this new environment, many are turning outside app dev services to augment their in-house capabilities. These services are turning the traditional model on its head and providing valuable capabilities and capacity to deliver business agility.
Attend this webinar and learn how to use this innovative model to deliver transformative technology and accelerate innovation.
- What is appdev outsourcing and what are the characteristics of organizations that should leverage it?
- What are the typical business benefits of these services?
- How should an organization get started and determine the optimum service solution and provider?
- What’s the future for appdev services?
When: January 28, 2020, 11 am PST
- Steven Moritz, Chief Digital Officer, System Soft Technologies
- Ashok Yarlagadda, CIO, System Soft Technologies
Karthik Mohan, Technical Account Manager, AkamaiJan 28 20207:00 pmUTC60 mins
Most organizations know that they need application security, but not all organizations have the time, money, or experience to maintain the highly sophisticated and customized rules provided by traditional application security tools.
Organizations today need a product that is simple enough to bring application security to them that might otherwise leave their applications exposed. Akamai’s Web Application Protector solves that problem, by providing an intuitive administrator interface, pre-configured rule groupings, automatic rule updates, and self-serve configuration.
In this webinar we are going to cover Akamai’s Web Application Protector by demonstrating how easy it is to configure and tune the firewall by looking into analytics that is captured by the platform. We will go look at the use-cases to help you understand if our WAP is the best fit for your business.
•Akamai’s Threat Landscape - SOTI Report, Industry Specific Data Trends
•Architectural Overview – Akamai’s Platform & WAP
•Use CasesCase Studies
•Overview of the WAP Solution
•Using WAP Interactive Demo
•Setting up a WAP configuration - New UI
•Monitoring WAP Reports - WSA
•Tuning your WAP configuration based on the information in the reports