Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Bob Laliberte, Senior Analyst at ESG Inc.Recorded: Apr 24 201956 mins
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.
Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
Dave Bartoletti, Vice President and Principal Analyst, Forrester ResearchRecorded: Apr 24 201947 mins
Accelerate your innovation journey using containers.
Firms have become more comfortable with containers in the last 3 years and container usage is expected to continue to grow. With growth comes more sophisticated requirements. Containers support configuration management and continuous integration/continuous delivery (CI/CD) processes by offering improved flexibility, performance, and security. Open source software has been key in unlocking container and container platform innovation. Firms have learned to use and contribute to open source to reap the rewards of communities.
In this webinar, Forrester research analyst Dave Bartoletti will share new insights from a March 2018 study into how organizations are using containers, container platforms, and open source to quicken adoption of more enterprise apps. He'll cover:
How container usage has improved in recent years.
What the future of containers and container platforms looks like.
Navigating the performance and security challenges of containers and container platforms.
How containers can improve customer experience and lower costs.
How open source can accelerate innovation in your organization.
Tyson Gern, Director, Pivotal Education & Dylan Ham, Lead, Pivotal EducationRecorded: Apr 24 201932 mins
Pivotal Education enables you to continuously deliver business value in a rapidly evolving market by providing the modern software expertise you need to excel in a cloud-native world.
In this webinar, we will discuss the breadth of training, certification and the Platform Acceleration Lab (PAL) options available for Spring and Cloud Foundry developers, architects, and operators.
We'll also show you how Pivotal Education makes it easy create a custom Spring or Cloud Foundry training plan specific to your learning needs and schedule, using in-person and online content and tools.
Brian McHenry and Graham AldersonRecorded: Apr 24 201935 mins
Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.
Join us for this webinar to learn:
- How bots infect, propagate, and attack applications
- What types of application attacks are commonly performed by bots
- How you can defend against bad bots without disrupting the good ones
Rani Osnat, Aqua Security and Mark Bouchard, CyberEdgeRecorded: Apr 24 201953 mins
A joint presentation by Aqua Security and CyberEdge
Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.
Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.
We will discuss :
•Key findings from the 2019 Cyberthreat Defense Report
•The unique security challenges (and benefits) of containers
•What leading enterprises are doing to automate their container security
•What you should look for in a container security solution
Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.
Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.
Register for the webinar to discover:
• What successful fintech startups have in common
• The differences between being a solopreneur vs. being a co-founder
• Tips for finding and growing your dream team
• How to go from killer idea to disruptive startup
• Evan Schuman, Moderator, VB
• Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
• Pierre Wolff, SVP Business Development, InCountry
• Ken Kruszka, CEO, SnapCheck
• Kathleen Utecht, Managing Partner, Core Innovation Capital
Persistent data management is challenging, especially for companies experiencing fast growth or volatility in data proliferation. Performance telemetry is vital for operating databases like PostgreSQL, Oracle, and SAP HANA. Viewing third-party database telemetry in the context of a full Google Cloud environment allows you to understand impact and relationships. Attendees will learn how to use Stackdriver to monitor third-party databases along with Google Cloud resources at a depth that allows them to tune database performance and solve application problems more quickly.
Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product MarketingRecorded: Apr 24 201944 mins
Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.
In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:
Key enhancements from the latest Cloud, Current and Long Term Service releases
- How to make your journey to the cloud seamless
- Administrative flexibility and security enhancements
- Industry-first user experience innovations around graphics, video and more
- Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
Stephan Fabel, Ubuntu Product Director & James Page, Ubuntu Technical ArchitectRecorded: Apr 24 201935 mins
This webinar presents an introduction to Charmed Openstack whilst discussing the common security issues and scenarios faced with O7k in production, the impact it has on LCM and the importance of full automation.
Learn how Canonical's approach to O7k allows implementation of advanced security features while not impacting the ability to upgrade and LCM the underlying codebase.
Brian Iverson, GartnerRecorded: Apr 24 201961 mins
This informative webcast contains great insights from Gartner analyst Brian Iverson, which begins with a simple and pragmatic definition for “what is governance?”
Brian also discusses challenges, pitfalls and recommendations on:
- How organizations can mitigate the risk of a breach
- How to prepare for hackers
- Ways to ensure the right people have the right access
- Overcoming governance challenges with apps, unstructured data, the cloud and personal devices
- Breaches that bypass the perimeter
- Creating a holistic security approach: What are the risks of doing things and not doing things
It can be a difficult task to achieve governance if you don’t have the right solutions. That’s why the second part of this webcast focuses on solutions to help you enhance your identity governance capabilities.
Asher Benbenisty, Director of Product MarketingRecorded: Apr 24 201920 mins
Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.
However, manual firewall rule recertification is complex, time-consuming and prone to errors.
Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.
In this webinar Asher will cover:
• Why it is important to regularly review and recertify your firewall rules
• How to use application connectivity for firewall rule recertification
• How to automatically manage the rule-recertification process
Kevin Vermaak: Cape Epic Race Founder and Wolf Stinnes: Dimension Data Chief Solutions ArchitectRecorded: Apr 24 201948 mins
Connecting the Cape Epic across all terrains is no small feat. Dimension Data's technology solution delivers a world class digital solution to the public, the riders, the fans and the event organisers, in some of the most remote, rugged and beautiful parts of the world. We’ll be joined by the founder of the Cape Epic, Kevin Vermaak and Dimension Data’s Chief Solutions Architect as we delve into exactly how this incredible race all comes together.
Dave Shackleford, SANS | David Aiken, AWS MarketplaceRecorded: Apr 24 201960 mins
True accountability for the security of cloud-based assets requires visibility into the events and behaviors that move into and through your cloud environment. Security today relies on visibility in several areas: networks, systems, storage and applications.
In this recorded webcast, SANS Analyst and cloud security expert Dave Shackleford explains how visibility in the cloud differs from more traditional security visibility and suggests how organizations can move toward establishing a cloud visibility strategy, using practical examples to illustrate the process.
Attendees will learn about:
- Types of visibility needed today
- Event data and information available in the cloud
- Cloud-native controls offered by services providers
- Third-party options to enhance monitoring and visibility strategies
- How to tie event monitoring, vulnerability scanning and control planes together to enhance visibility
Register for this webcast to be among the first to receive the associated whitepaper written by Dave Shackleford.
Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.
David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA's that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
Seyi Verma, Director of Product Marketing, DruvaRecorded: Apr 24 201956 mins
Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!
Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.
Join this informative webinar with experts from Egan Company and Druva, and learn about:
- The flexibility, security and value of data protection delivered as-a-service in the cloud
- How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
- How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
When you are trying to understand and find key insights from your data, where do you begin?
There are two popular approaches to visual data exploration-data visualisation and visual analytics. Both methods can help you to better understand your data, and this webinar will show you why.
You'll discover how visual analysis makes it easy for you to deconstruct your data, quickly identify trends and correlations, get to the bottom of all sticky questions, and improve your reporting efficiency. By doing ad hoc analysis faster, you can put more energy into driving business impact.
Join us to learn about:
The advantages of visual analysis over traditional analysis
How to take the first step in visual data exploration - answering the 'what' questions
How visual analytics lets you dig deeper into your data - the power of asking 'why'
Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide SecurityRecorded: Apr 23 201959 mins
New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:
•Gain pervasive visibility into your network for better threat hunting
•Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
•Become more effective by delivering optimized traffic to tools
•Overcome skills shortages and retain key staff through efficiency, automation and orchestration
•Accelerate deployment and integration of new security tools
Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
Larry Carvalho, Research Director, PaaS, IDC. Tyler Britten, Technical Marketing Manager, OpenShift, Red Hat.Recorded: Apr 23 201940 mins
As businesses in all types of industries are being disrupted by startups, organizations are being challenged to digitally transform themselves. Technology is playing a central role in this transformation, and the demand for applications is increasing to meet transformation goals. Application platforms, which are undergoing a transformation of their own, are playing a central role in accelerating application development.
Join this webinar to learn about:
-The evolution of application platforms.
-How containers are becoming the destination of choice for workloads.
-How companies are transforming a broad set of existing and new applications.
-Evolving a culture of greater agility.
Larry Carvalho, research director, PaaS, IDC
Larry Carvalho is research director of IDC's worldwide Platform-as-a-Service (PaaS) research practice. He focuses on the Cloud Applications Platform (CAP)-as-a-Service aspect of PaaS and directs research into the component competitive markets of PaaS, including business process management (BPM) PaaS, database PaaS, cloud testing, and integration PaaS. Larry has extensive experience in systems integration and the enterprise software business.
Tyler Britten, technical marketing manager, OpenShift, Red Hat
Tyler Britten is a technical marketing manager for Red Hat® OpenShift® and has spent the last 15 years working with container, cloud, virtualization, and infrastructure technologies. Prior to joining Red Hat, he was a technical advocate for Blue Box, an IBM Company, and principal technical marketing manager and vSpecialist at EMC. Tyler has also been a technical consultant for a small infrastructure reseller, a network engineer for a Fortune 1000 company, and a freelance IT consultant for small businesses.
Todd Bernhard, CloudCheckr Product Marketing ManagerRecorded: Apr 23 201929 mins
Unlike in the Data Center, where an enterprise had complete responsibility for security, the Cloud is different. There is a Shared Responsibility Model. Cloud providers like Amazon Web Services, Microsoft Azure and Google Cloud take responsibility for items under their control, but customers must secure their data and applications. Fortunately, there are hundreds of Best Practice Checks provided by CloudCheckr, that can help automate this. Additionally, those checks are mapped to compliance standards and CloudCheckr's Total Compliance scores an organization according to 35 distinct regulations including CIS, HIPAA, PCI DSS, NIST and more.
Just because an enterprise achieves a level of compliance, that doesn't guarantee it will stay there. CloucCheckr's Change Monitoring, combined with Custom Alerts, can help keep a cloud secure. Attendees will learn how CloudCheckr's 550+ Best Practice Checks can help, including automation via Fix Now, Always Fix and Request Fix.
CloudCheckr is a robust Cloud Management Platform that, in addition to Security & Compliance, delivers Cost Optimization, Automation, and Invoicing capabilities. Look for our other tutorials on those topics.
Scott Sinclair, ESG; Michelle Tidwell, IBM, Mike Jochimsen, Kaminario; Eric Lakin, Univ. of Michigan; Alex McDonald, NetAppRecorded: Apr 23 201961 mins
Has hybrid cloud reached a tipping point? According to research from the Enterprise Strategy Group (ESG), IT organizations today are struggling to strike the right balance between public cloud and their on-premises infrastructure. In this SNIA webcast, ESG senior analyst, Scott Sinclair, will share research on current cloud trends, covering:
•Key drivers behind IT complexity
•IT spending priorities
•Multi-cloud & hybrid cloud adoption drivers
•When businesses are moving workloads from the cloud back on-premises
•Top security and cost challenges
•Future cloud projections
The research will be followed by a panel discussion with Scott Sinclair and SNIA cloud experts Alex McDonald, Michelle Tidwell, Mike Jochimsen and Eric Lakin.
Pavan Kaushik and Lei YangRecorded: Apr 23 201952 mins
Microsoft Azure provides the option of a fully-managed Kubernetes orchestration service - Azure Kubernetes Service (AKS) in addition to user-managed Kubernetes running on Azure instances. Avi integrates natively and deeply into both of these deployments in Azure to help autoscale your applications to meet growing demands.
David Morris and Brian MarkusRecorded: Apr 23 201962 mins
Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.
Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan LockwoodRecorded: Apr 23 201961 mins
Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...
- Learn tips to maximize your experience
- Uncover the questions our clients ask us the most
- Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
- Get a preview of two of Acorio's Presentations at K19
Jörg Bunse, SUSE Linux GmbHApr 25 20198:00 amUTC60 mins
Unter dem Motto „My kind of open" fand die SUSECON vom 1. bis 5. April 2019 statt. Sie hatten nicht die Möglichkeit, zur SUSECON nach Nashville zu reisen und möchten Ihr Wissen auf den neuesten Stand bringen?
In unserem Webinar präsentieren wir Ihnen alle wichtigen Produktankündigungen und Neuigkeiten von der SUSECON.
Ashwath Nagaraj (Founder & CTO, Aryaka)Apr 25 20199:00 amUTC47 mins
As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?
In this webinar you will join industry experts to learn:
- Fundamental building blocks of a managed SD-WAN architecture
- Pros and cons for each of the different management and operational models
- Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
Steve Drew and Sriram RajanApr 25 20199:00 amUTC60 mins
Kubernetes Containers can help modernise applications which is especially important for businesses. Using them means you can deploy code in small batches allowing your development teams to release software quickly increasing agility. But running large and stable clusters of Containers presents its own challenges.
Join Rackspace Principal Architect, Sriram Rajan and AWS Specialist Architect, Steve Drew on 25th April at 10am as they explain:
• How to adopt a microservices architecture using Containers
• The benefits and architectural recommendations for using Kubernetes on AWS
• An end to end approach to adopting Kubernetes from architecture to operations
A well-thought out strategy leads to success and we’ll explain exactly what a Kubernetes Containers strategy looks like.
A $100 credit voucher allowing you to test the AWS platform for a few hours will be available for all attendees that fill in our email survey. Please be aware that promo codes will be distributed only to verified company email addresses in EMEA, after completing the survey. The survey will be shared to all verified attendees following the webinar.
We’re an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner and have all the expertise you’ll ever need.
Dan Pitman, Principal Security ArchitectApr 25 201910:00 amUTC60 mins
Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.
Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.
Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.
• The state of cybersecurity at financial institutions
• Integrating security and compliance within Financial Services
• Understand how today’s vulnerabilities are being exploited
• Find out how to achieve the right level of leverage for the optimal level of investment
Jenni Lee, Product Marketing Manager, AcquiaApr 25 201910:00 amUTC28 mins
In this webinar, we will cover the following topics:
- How to transform your IT digital team from a “bottleneck” to a trusted service provider
- How to implement a site-governance strategy across your organization
- Best practices for expediting website development and delivery
Vincent Lieffroy, Senior Lead EngineerApr 25 201912:30 pmUTC60 mins
Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:
- Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
- Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
- Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
- Des cycles de développement d'applications accélérés avec Box Elements
John Jolliffe, Strategic Engagement, Adobe Document Cloud.Apr 25 20191:00 pmUTC45 mins
When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?
Join our webinar, to learn:
• Why e-signatures are essential to your company's success now and in the future.
• Which three signature types are legal under eIDAS.
• How to select the right approach for your business.
• Next-gen e-Signatures and The Cloud Signature Consortium.
Tom McNash, Senior Solutions Engineer, CyrenApr 25 20192:00 pmUTC60 mins
In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEAApr 25 20193:00 pmUTC60 mins
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Moderator: Daniel Blander, Virtual Clarity
Joseph Feiman, Chief Strategy Officer, WhiteHat Security
Paul Farrington, CTO, Veracode EMEA
Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, MicrosoftApr 25 20193:00 pmUTC60 mins
Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
IBC365 | Jellyfish Pictures | More speakers announced soon...Apr 25 20193:00 pmUTC75 mins
Join IBC365 on Thursday 25 April at 4pm BST to explore why creators are turning to cloud to transform the way they make great content and how virtualised workflows are unlocking the ability to work in new ways: faster, more collaborative, more efficient and more creative.
This webinar goes inside some of the world's leading content creators, production and post-production operations to hear how they are embracing cloud technology to transform the creative processes used to make, produce and deliver video.
We'll get hands-on with practical lessons on how cloud is enabling more collaboration, access to more talent, round-the-clock working, more content security, and slicker workflows. There's also a dose of reality, as we understand the human and technology challenges and the potential pitfalls of virtualising creative workflows.
Case studies focus on using cloud for:
•Streamlining content creation in the field
•Transforming production and post-production processes
•Efficient content delivery and backhaul
Jimmy Lin, Sr. Product Manager, SymantecApr 25 20193:00 pmUTC60 mins
On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.
In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:
Indicators of Compromise Blacklisting
Service Configuration Health
Symantec Email Security.cloud App for QRadar
Traditional API Testing offers well-known benefits like speed, robustness, and ease of automation as compared to testing via the UI. While testing an API as exhaustively as possible is often the most effective way to know if each component is behaving the way it should, this is still dependent on the extent of test coverage provided.
Shackled by slow incomplete manual test designs, API Testing is missing key metrics to help optimize test plans. Testers have difficulty prioritizing what needs to be tested, while developers are unable to shorten test runs and fail fast for more immediate feedback. So how do we compliment API Testing with the power of Model-based Testing (MBT) for maximum testing coverage and efficiency by optimizing our test design?
Join MBT expert Ben Johnson Ward as he dives into a fully integrated end-to-end API testing framework/pipeline to rapidly test a live webservice. Using a powerful MBT test generation solution, he will show how to generate executable REST-assured API tests with enriched reporting, as well as manage requirements changes in the application and their impact on testing.
- Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
- Creating REST-assured API tests utilizing ARD and executing with Java
- How to quickly generate tests for any scenario or coverage goal
- How to react efficiently to changing requirements to keep our automated testing in-sprint
- How to generate enriched test result reports
The presentation will be followed by a Q&A session
Dale Levesque, Director – Product Management | TierPointApr 25 20194:00 pmUTC60 mins
More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.
Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.
From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.
Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
Colette Balaam, CEO, Hive / Karl Hampson, Director of AI, Solstice / Steve Prewitt, Chief Analytics Officer, HealthfirstApr 25 20194:00 pmUTC45 mins
Join Colette Balaam, CEO at Hive, Karl Hampson, Director of AI at Solstice, and Steve Prewitt, Chief Analytics Officer at Healthfirst, as they explore how enterprises should leverage advanced analytics and data platforms to improve health outcomes for their patients and members.
Tom DiRusso, ASG & Steve Studer, Zia ConsultingApr 25 20195:00 pmUTC45 mins
Are you one of the many organizations with content in a variety of silos? You probably are – and you’re not alone - most organizations today are also siloed. It’s clear that this siloed approach creates a huge challenge for companies in meeting stringent compliance regulations. Sound familiar? Now, imagine if your Teams had the ability to search and action content as though it resided in one location – with easy access and usability. Get the picture?
Join ASG & Zia to discover how you can gather and understand your content across various silos to ensure you are on the ‘Offensive’ with compliance regulations.
During this session, we’ll discuss:
- Why some of the largest financial institutions have taken an ‘Offensive Approach’ to managing static and streaming content to comply with laws and regulations
- How you can federate, migrate and manage records in one place
- New ways to identify, classify and dispose of records
- Why it’s critical to have a records management solution that has a repository of records that is auditable and defendable
Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoftApr 25 20195:00 pmUTC35 mins
Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.
This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention
In this webinar, you will learn how to:
- Streamline product lifecycle management processes with your eCommerce systems.
- Leverage Master Data Management to gain visibility across inventory and customer data.
- Deliver personalized customer experiences based on past behaviors and purchases.
Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba)Apr 25 20195:00 pmUTC35 mins
Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience.
Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.
Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
Rohit Kelapure, Consulting Practice Lead, PivotalApr 25 20195:00 pmUTC60 mins
Ah, the mainframe. Peel back many transactional business applications at any enterprise and you’ll find a mainframe application under there. It’s often where the crown jewels of the business’ data and core transactions are processed. The tooling for these applications is dated and new code is infrequent, but moving off is seen as risky. No one. Wants. To. Touch. Mainframes.
But mainframe applications don’t have to be the electric third rail. Modernizing, even pieces of those mainframe workloads into modern frameworks on modern platforms, has huge payoffs. Developers can gain all the productivity benefits of modern tooling. Not to mention the scaling, security, and cost benefits.
So, how do you get started modernizing applications off a mainframe? Join Rohit Kelapure, Consulting Practice Lead at Pivotal, as he shares lessons from projects with enterprises to move workloads off of mainframes. You’ll learn:
● How to decide what to modernize first by looking at business requirements AND the existing codebase
● How to take a test-driven approach to minimize risks in decomposing the mainframe application
● What to use as a replacement or evolution of mainframe schedulers
● How to include COBOL and other mainframe developers in the process to retain institutional knowledge and defuse project detractors
● How to replatform mainframe applications to the cloud leveraging a spectrum of techniques
Neil Thacker, CISO, NetskopeApr 25 20195:00 pmUTC60 mins
In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.
In this webcast we will look at some of the challenges associated with privacy including:
- Understanding contractual obligations
- Managing the geolocation of data
- Applying data transfers mechanisms and controls
Roger Maddron, 2nd Watch Senior Cloud ConsultantApr 25 20195:00 pmUTC60 mins
Learn how to harness Azure Log Analytics to enable management, patching, and reporting on all types of workloads. In this session we will discuss what Azure Log Analytics and Azure Automation are and how they are related, how and when to use them, and what these solutions enable for an organization from an operations perspective once they are implemented.