Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Cloud Security for Financial Institutions
    Cloud Security for Financial Institutions
    SecureAuth Recorded: Feb 21 2019 40 mins
    The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.

    In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:

    – Customer case studies for addressing PCI & SWIFT requirements in the cloud

    – Gaining visibility into applications data flow before moving to, and after deploying in, the cloud

    – Adopting the Zero Trust security model that requires authentication and authorization for all communication
  • 1-Minute introduction to Closed Loop Automation from Anuta Networks
    1-Minute introduction to Closed Loop Automation from Anuta Networks
    Anuta Networks Recorded: Feb 21 2019 1 min
    Closed-Loop Automation by Anuta ATOM combines Orchestration, Analytics, and Assurance to ensure the network matches the business intent. Closed-Loop Automation eliminates human errors, generates new business insights and avoids network downtime. For more information, visit https://www.anutanetworks.com/technologies/closed-loop-automation/
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    Sebastian Straub - Systems Engineer at N2WS; Jessica Eisenberg - Customer Success Manager at N2WS Recorded: Feb 21 2019 54 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.

    Join our LIVE session to find out more about:

    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Feb 21 2019 39 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

  • Ask the Experts—Securing Data and Email in Office 365
    Ask the Experts—Securing Data and Email in Office 365
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec Recorded: Feb 21 2019 62 mins
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Recorded: Feb 21 2019 59 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • Developing Serverless Applications on Kubernetes with Knative
    Developing Serverless Applications on Kubernetes with Knative
    Bryan Friedman, Director of Product Marketing, Pivotal and Brian McClain, Principal Product Marketing Manager, Pivotal Recorded: Feb 21 2019 56 mins
    Serverless computing has become a hot topic in developer communities. The use of ephemeral containers eliminates the need for always-on infrastructure. But the real payoff for serverless is greater code simplicity and developer efficiency. Sounds great! Except the open-source serverless framework space is crowded and complex. Each unique offering approaches functions differently, with varying methods for triggering, scaling, and event formatting. How is that efficient?

    One thing that most everybody can agree on is to build on top of Kubernetes. With that as the only common ground though, there is still too much fragmentation for developers to wade through when deciding on the right open source serverless solution.

    That's where Knative comes in. An open-source project from Google, Pivotal, and other industry leaders, Knative provides a set of common tooling on top of Kubernetes to help developers build serverless applications. It extends Kubernetes by combining Istio with Custom Resource Definitions to enable a higher-level of abstraction for developers. This brings support for source-to-container builds, autoscaling, routing, and event sourcing. Join this session with Brian McClain and Bryan Friedman to see a complete working demo of Knative and learn:

    ● What are the components of Knative and how do they work together
    ● What are the different ways to deploy serverless applications and functions on Knative
    ● How and when to use Knative’s build features, such as Buildpacks
    ● What is Knative’s eventing model and how are event sources used to trigger functions
    ● How Project riff compliments development on top of Knative
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Recorded: Feb 21 2019 44 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Recorded: Feb 21 2019 63 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Recorded: Feb 21 2019 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business

    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Modernizing VMware with Kubernetes
    Modernizing VMware with Kubernetes
    Kamesh Pemmaraju, Head of Product Marketing at Platform9 Recorded: Feb 21 2019 48 mins
    Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.

    Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.

    Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:

    1.Get up and running with Kubernetes in an hour
    2.Eliminate the management overhead
    3.Enable self-service for your developers to deploy Kubernetes applications with a single click
    4.Improve collaboration between your developers and VMware admins
    5.And much more!

    Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
  • Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Feb 21 2019 63 mins
    Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
  • How Leading Organizations Classify and Protect Cloud Data
    How Leading Organizations Classify and Protect Cloud Data
    Jason Price, Solutions Engineer at Spirion & Jacob Serpa: Product Marketing Manager at Bitglass Recorded: Feb 21 2019 47 mins
    Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classification, and cloud access security brokers, the enterprise can rest assured that its data is secure. In this webinar, you will:

    - Understand the benefits of data discovery and classification
    - Learn about cloud access security brokers (CASBs)
    - Discover how the two work together to protect the cloud-first enterprise from data leakage
  • Is multi-cloud a cost-cutter or complexity adder?
    Is multi-cloud a cost-cutter or complexity adder?
    Petri Kallberg, CTO at Nordcloud Finland & Markku Rossi CTO at SSH.COM Recorded: Feb 21 2019 52 mins
    The cloud promises to bring savings, agility and scalability. All of this is attainable provided that you know which services to choose for which purpose and how to set up your environment properly. Join multi-cloud experts from Nordcloud and SSH.COM for this exclusive webinar hosted by Cloud Security Alliance where we will discuss the following topics:

    •Why vendor-lock might not be your best option in the cloud
    •Why ensuring the best possible privileged access experience for developers and administrators is vital for your business
    •How to make daily access routines operationally efficient with automation
    •How to choose best-of-breed services for the cloud based on your business needs
    •Why existing cloud vendor or legacy solutions might sometimes add increase costs
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Recorded: Feb 21 2019 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Enterprise Software-Defined Storage on HPE Gen10 Servers
    Enterprise Software-Defined Storage on HPE Gen10 Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Recorded: Feb 21 2019 53 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Migrating VMs through Red Hat CloudForms
    Migrating VMs through Red Hat CloudForms
    Red Hat Consulting Recorded: Feb 21 2019 3 mins
    Red Hat® CloudForms® 4.6 provides a new way to migrate virtual machines (VMs) to Kernel-based Virtual Machine (KVM) environments like Red Hat Virtualization and Red Hat OpenStack® Platform in a simple, optimized, and efficient way. Watch this Red Hat Consulting whiteboarding video to see how this powerful tool works.
  • Transforming production and broadcast with 5G
    Transforming production and broadcast with 5G
    IBC365 | IRT Germany | BT Sport Recorded: Feb 21 2019 62 mins
    Join this webinar on Thursday 21 February to learn how 5G will transform the way content is created, produced and distributed.

    More than just a faster mobile data connection, 5G reinvents connectivity. The technology enables new types of remote productions, and coverage of more live events, news and sports in higher 4K/HDR quality, and will revolutionise the way consumers receive content, combining broadcast, OTT and data to create a seamless experience regardless of network or device.

    That's the theory - but how is 5G being deployed in practice? What are the early adopters doing, and what results are they achieving?

    This webinar will explore a series of exciting use cases for 5G with hands-on case studies, including:
    - Enriching production and storytelling
    - Revitalising newsgathering and live event coverage
    - Blending broadcast and live data for mobile audiences in the European 5G-Xcast project

    - Dr Jordi Gimenez, 5G research engineer & project manager, IRT Germany
    - Matt Stagg, Director of mobile strategy, BT Sport
    - Marios Nicolaou, 5G and digital transformation senior strategy advisor
  • How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    How to drive digital agility & efficiency in the Pharma & Life Sciences industry
    Sean Donnelly (Econsultancy), Toby Donnison (Pharma Lead - Adobe), and Rupert Wills (Solutions Consultant - Adobe) Recorded: Feb 21 2019 54 mins
    The 2018 Digital Trends report released by Adobe & Econsultancy found that only 5% of healthcare and pharma organizations reported being digital-first. Yet in today’s digital world, there has never been a better time for the Pharma industry to innovate and improve health outcomes whilst driving business performance. Technology has sparked a revolution across all functions, from research and development to sales and operations. However, meeting these demands is not without its challenges. The unique nature of the pharma and life sciences industry means that it faces issues that other businesses do not have to grapple with. There are complex supplier networks, growing regulatory requirements and increasing pressure to reduce costs – so what can digital leaders do to effect change quickly?

    Join Econsultancy & Adobe in this webinar to learn:
    • The reality of the digital first challenge and the trends causing complexity.
    • How technology is shaping the future and the opportunities for digital agility & efficiency.
    • How Merck transformed time consuming business processes though digital workflows – accelerating business, and improving the employee & customer experience.
    • How electronic signatures can digitally transform your documents and workflows, accelerating an organisations digital transformation journey.
    • How to ensure you stay compliant with regulations including a live demonstration the BioPharma module (covering Title 21 CFR Part 11)
  • Prioritizing security operations in the AWS cloud
    Prioritizing security operations in the AWS cloud
    John Pescatore, SANS Director of Emerging Technologies Recorded: Feb 21 2019 60 mins
    Amazon Web Services (AWS) and the SANS Institute* help security practitioners understand their options across key cybersecurity domains using a familiar operational language: The NIST Cybersecurity Framework (CSF).

    SANS Director of Emerging Technologies John Pescatore will show how to use the NIST CSF to make the leap to securing infrastructure-as-a-service (IAAS) and hybrid cloud implementations by selecting and integrating the most effective and efficient security services, including both native cloud security services and third-party controls.

    Attendees will learn:
    - What is different about security for cloud workloads
    - Why using a framework to organize efforts is effective
    - How to implement controls at the perimeter, host and data boundaries
    - What best practices organizations should implement
    - How to deploy secure IAAS and hybrid cloud implementations

    About the presenter:
    John Pescatore joined SANS as director of emerging technologies in January 2013 after more than 13 years as lead security analyst for Gartner, running consulting groups at Trusted Information Systems and Entrust, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and voice systems “and the occasional ballistic armor installation.” John has testified before Congress about cybersecurity, was named one of the 15 most-influential people in security in 2008 and is an NSA-certified cryptologic engineer.

    About the SANS Institute:
    The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world.

    *The views and opinions of the SANS Institute and their presenter, John Pescatore, are their own, and do not necessarily reflect the positions of AWS.
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Recorded: Feb 21 2019 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • The future of big data: ethics, data management and governance
    The future of big data: ethics, data management and governance
    Kyle Gupton - Director, Product Management, Tableau | Vaidy Krishnan - Product Manager, Tableau Recorded: Feb 21 2019 60 mins
    As data privacy has risen in prominence, consumers are more cautious than ever about sharing data. This, in turn, affects how businesses approach data monetisation, collection, and sharing. And with new regulations like GDPR, organisations are faced with crucial questions around data ethics and privacy in the context of their day-to-day business practices.

    Attend this webinar where we’ll delve into these 3 key areas:

    *Data ethics
    *Data privacy
    *Data management and processes around data
  • Digital Transformation Challenge
    Digital Transformation Challenge
    Metin Algir, Senior Director Global Consulting - Sungard AS Recorded: Feb 21 2019 26 mins
    Digital transformation is the buzzword of the moment and yet many organisations still don't fully understand what it means. In this webinar Metin Algir will explore how digital transformation underpins future strategy for most organisations and how Sungard Availability Services helps our customers face up to the digital
  • Operating with Agility Across Your Enterprise
    Operating with Agility Across Your Enterprise
    Jeremy Brown, Senior Solutions Architect, Lynne Mullis, Senior Solutions Architect Recorded: Feb 21 2019 31 mins
    Your IT operation is in a constant state of change. Deployment models are multiplying. Application architectures are evolving. Pressures to innovate are rising. And you’re expected to manage it all with a shrinking budget.

    It is a constant challenge, but it doesn’t need to be.

    In this webinar, you’ll discover how Micro Focus solutions help you master hybrid IT with new enterprise-wide agility. More specifically, you’ll learn how you can:

    •Accelerate delivery of IT resources by bridging traditional and
    transformational IT.
    •Increase IT efficiency by automating routine tasks and processes.
    •Support innovation by employing flexible technologies that evolve
    with your needs.
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 22 2019 6:00 am UTC 60 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.


    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.


    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • [#2]Cloud im Fokus: Hybride Architekturen mit Informatica
    [#2]Cloud im Fokus: Hybride Architekturen mit Informatica
    Thomas Bodenmüller-Dodek, Informatica Product Expert|Carrie Ellard, Informatica Cloud Consultant Feb 22 2019 9:00 am UTC 60 mins
    Gibt es bei Ihnen eine Cloud-First-Strategie, planen Sie ein Cloud Datawarehouse, schon mal über APIs nachgedacht oder müssen Sie Daten von Cloud-Applikationen in Ihr Unternehmen transportieren? Wie man sieht haben Projekte rund um die „Cloud“ viele Gesichter und erfordern deshalb auch eine sehr umfangreiche und leistungsfähige iPaaS-Lösung, wie die Informatica Intelligent Cloud Services – kurz IICS. In diesem Webinar möchten wir Ihnen einen Einblick über das Konzept, die Leistungsfähigkeit und den Umgang mit sog. hybriden Integrationsmöglichkeiten – also die Vorteile einer On-Premise und Cloud Architektur vorstellen. Dabei werden wir auch Best Practices von bestehenden Kundenprojekten einfließen lassen.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Feb 22 2019 10:00 am UTC 62 mins
    Three major trends define the Cloud Generation chaos that organizations face today:
    1) Use of cloud applications
    2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
    3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now!
  • Streamline Software Procurement Processes with PyraCloud
    Streamline Software Procurement Processes with PyraCloud
    Rhys Williams Feb 22 2019 11:00 am UTC 45 mins
    Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.

    This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.

    Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.

    This is why we developed the new Procurement Workbench in PyraCloud.

    We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.

    Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:

    • Simplifying the management of quotes, orders and invoices
    • Improving product search capabilities across multiple products and services in global catalogues
    • Tracking software previously purchased, product favourites and subscriptions
    • Consolidating multiple aspects of the procurement process in one place

    PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
  • Navigating Access Security in Cloud & Hybrid Enterprise Environments
    Navigating Access Security in Cloud & Hybrid Enterprise Environments
    Asaf Lerner, Director IAM Solutions at Gemalto Feb 22 2019 3:00 pm UTC 45 mins
    As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Feb 22 2019 5:00 pm UTC 45 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Utilizing a Digital Risk Management Framework for Securing the Cloud
    Utilizing a Digital Risk Management Framework for Securing the Cloud
    Bob Liscouski, Juanita Koilpillai and David Morris Feb 22 2019 6:00 pm UTC 90 mins
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • 15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Feb 22 2019 6:00 pm UTC 15 mins
    If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.

    Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:

    - What level of protection do cloud services provide?
    - Is the provided level of protection enough for the enterprise?
    - What does the enterprise need to add to achieve complete protection?

    Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Feb 22 2019 7:00 pm UTC 60 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Répondre aux enjeux de sécurité de la génération cloud
    Répondre aux enjeux de sécurité de la génération cloud
    Hervé Doreau, Directeur Technique, Symantec France Feb 25 2019 1:00 pm UTC 42 mins
    À l'ère de la génération cloud, les collaborateurs exigent une flexibilité à toute épreuve et un accès où qu'ils se trouvent, ce qui peut mettre vos données les plus sensibles en danger.
    Les environnements distribués, comme ceux mis en place pour les télétravailleurs et les employés mobiles, créent de nouvelles surfaces d’attaque qu’il est impératif de protéger. De même, le recours aux applications cloud SaaS rend encore plus nécessaires les contrôles de conformité et de sécurité.

    Résultat, les équipes IT et sécurité sont obligées de repenser la conception de leur réseau pour mieux répondre aux interrogations suivantes :
    - Comment encadrer efficacement l’accès aux données, aux applications et aux systèmes ?
    - Comment lutter contre les menaces avancées qui ciblent notre entreprise via le Web, le cloud et l’e-mail ?
    - Comment sécuriser les informations qui circulent entre notre réseau, les terminaux et le cloud ?
    Retrouvez nos experts pour ce webcast sur les grands défis de sécurité que les grands comptes clients de Symantec doivent relever avec la génération cloud. Vous découvrirez comment les solutions Cloud de sécurité de Symantec peuvent protéger les utilisateurs, les terminaux et les données d’entreprise, où qu’elles se trouvent.
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 26 2019 6:00 am UTC 60 mins
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

  • SAP 与 云原生架构 -- 如何提升SAP 开发测试、预生产的环境效率?SAP中如何使用容器云、私有云?
    SAP 与 云原生架构 -- 如何提升SAP 开发测试、预生产的环境效率?SAP中如何使用容器云、私有云?
    徐亮 Feb 26 2019 6:30 am UTC 45 mins
    从最终用户、用户服务商角度,如何实现业务的逐步迁移? 迁移后,发现开发测试环境、预生产环境,都有很大的效率要求。如何采用迅捷的方式满足在X86架构下的sap 开发测试、预生产的业务需求?
    这次线上的分享会,在关注以上内容的同时,会给大家聊一些OpenStack for SAP、K8S for SAP的内容,希望能更多的帮助SUSE/SAP的用户、SUSE/SAP的合作伙伴。
  • Symantec Web Isolation – Ihre Vorteile durch unsere Fireglass-Übernahme
    Symantec Web Isolation – Ihre Vorteile durch unsere Fireglass-Übernahme
    Alexander Peters, Symantec (Deutschland) GmbH Feb 26 2019 9:00 am UTC 50 mins
    URL-Filter sind ein hervorragendes Tool, um Ihre Systeme vor webbasierte Threats zu schützen. Achtung! Sie stoßen aber an ihre Grenzen, wenn Mitarbeiter unkategorisierte Webseiten ansteuern.

    In den meisten Unternehmen werden Zugriffe auf diese Grauzone durch die Policy unterbunden – auch wenn man gelegentliche False Positives in Kauf nehmen muss. In anderen lässt man die Zugriffe zu, und riskiert lieber eine Infektion, als Mitarbeiter von potenziell wichtigen Informationen abzuschneiden.

    Beides ist nicht ideal – und ab sofort gibt es endlich eine bessere Alternative: Die Übernahme des amerikanischen Security-Anbieters Fireglass ermöglicht es uns, unser marktführendes Web-Security-Portfolio jetzt auch um eine leistungsstarke Web-Isolation-Lösung zu erweitern.

    Im Webinar erfahren Sie:

    >>Wie Sie mit Symantec Web Isolation allzu streng eingestellte URL-Filter vermeiden und Ihren Mitarbeitern Zugang zu mehr Webinhalten gewähren, ohne zusätzliche Risiken einzugehen

    >>Wie Sie die Lösung nutzen können, um Ihre Privilegierten Accounts und Anwender künftig noch besser vor webbasierten Attacken zu schützen

    >>Wie sich durch das Isolieren potenziell gefährlicher eingebetteter Links viele gängige Phishing-Attacken und Account-Übernehmen zuverlässig unterbinden lassen

    >>Wie Sie Symantec Web Isolation mit Ihren ProxySGs, Content Analysis Systemen und Malware Analysis Appliances kombinieren und zu einer nahtlos integrierten Komplettlösung bündeln lassen

    Darüber hinaus verraten wir Ihnen Sie, wie die weitere Roadmap zur Integration der Fireglass-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Wir freuen uns auf Sie!
  • AWS WEBINAR: Modernise your infrastructure and migrate to AWS.
    AWS WEBINAR: Modernise your infrastructure and migrate to AWS.
    Chris Williams, Head of Public Cloud Strategy, and Steve Drew, AWS Solution Architect Feb 26 2019 10:00 am UTC 60 mins
    Do you want to drive business growth by optimising your IT infrastructure? Do you need guidance to overcome the challenges of adopting AWS and to apply best practices in the design and delivery of a secure AWS migration?

    Then sign up for our webinar on Tuesday 26 February at 10am (UK), and learn how adopting AWS helps modernise your IT infrastructure. With a specific emphasis on creating the right business model and designing the right technical foundations, our AWS-certified experts will cover:

    • key drivers for moving to the cloud

    • common challenges faced along the way

    • building a secure Landing Zone on AWS to start your modernisation journey

    So, complete the registration form and book your webinar place now. Join us to make the most out of your cloud migration journey.

    Rackspace is an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Ask a Cloud Access Software Expert…
    Ask a Cloud Access Software Expert…
    Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- Teradici Feb 26 2019 2:15 pm UTC 30 mins
    Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.

    1.What graphics adapters does Cloud Access Software support?
    2.What Windows versions does Cloud Access Software support?
    3.Can USB devices be used with Cloud Access Software?
    4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
    5.Can I connect to my Cloud Access Software workstation on a tablet device?

    Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
    Register today.
  • Scaling DevOps Success Before Cynicism Takes Over
    Scaling DevOps Success Before Cynicism Takes Over
    Michael Stahnke, Director of Engineering, Puppet Feb 26 2019 4:00 pm UTC 27 mins
    You’re winning with DevOps, now what? For the last decade we’ve seen case studies on high-performing teams who’ve implemented DevOps practices. How does this scale beyond the team? How do we influence skeptics? Let’s look at scaling out success when the point of reference is larger than the team. Success using DevOps practices has been unevenly distributed. Some teams claim success while their colleagues and peers struggle with basic technology delivery. For the organization as a whole, continuing to improve optimized areas results only in local gains. The true promise of DevOps was to globally optimize technology delivery. How do you scale? How do you influence others teams, or a whole department? How do you overcome blockers that were originally seen as beyond your scope of control?

    This discussion will walk through scaling DevOps practices beyond the team or small number of teams by upleveling the discussion to focus on department or org-level patterns. This scaling will cover grass-roots expansion of success, the trade-offs of a top-down mandate, and forcing functions to steer multiple groups of people on their aligned goals. There are still metrics to use when looking at DevOps from a larger perspective, and those are covered as well.
  • What’s New in Data Protector: Introducing v2018.11 (10.2) and v2019.02 (10.30)
    What’s New in Data Protector: Introducing v2018.11 (10.2) and v2019.02 (10.30)
    Ken Lamb, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Feb 26 2019 4:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest releases of Data Protector.

    Data Protector 2018.11 (10.20) and 2019.02 (10.30) continue to deliver on advanced reporting with enhancements and new capabilities. The releases also offer scheduler, security and industry-leading platform integration enhancements. In the webcast you will hear about these, and see a live demo of all the new features including:

    Integrated reporting enhancements including:
    • Manager-of-Manager consolidation
    • Configuration, Session timeframes, Chargeback, Custom reports and more
    • Scheduler and Security enhancements
    • Improved installation and upgrade process

    Platforms and Integration:
    • Modernized NetApp ZDB
    • Support for Data Domain with VM Power-On and Live Migration
    • MySQL 8, PostgreSQL 10 and Oracle 18c
    • H3C CAS
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Feb 26 2019 4:00 pm UTC 62 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • PCI DSS Compliance – Are You Making the Grade?
    PCI DSS Compliance – Are You Making the Grade?
    Tony Bailey - Director, Product Marketing; Malcolm Palmer - Senior Product Manager Feb 26 2019 4:00 pm UTC 60 mins
    Learn About Required Capabilities to Meet PCI Compliance Controls

    How confident are you when it comes to your PCI compliance? Recent surveys show that only 55% of companies are PCI compliant. And 100% of breached PCI certified companies failed their PCI compliance audit.

    With PCI, it's not enough to achieve compliance. You need to maintain that compliance over time. Experts estimate that 80% of businesses fail their interim PCI compliance assessment and less than 1/3 manage to maintain complete compliance year over year.

    Join us to learn:

    • Top reasons companies fail a PCI audit
    • Challenges of running a fully-compliant PCI program
    • What to do if you fail a PCI audit
    • Ways to leverage security frameworks to meet your compliance goals

    Join our experts as they discuss the challenges around PCI compliance and share how Alert Logic’s platform plus intelligence and experts can help with PCI compliance and complexity.
  • Postmodern Puppet: Puppet Enterprise 2019 and Puppet 6
    Postmodern Puppet: Puppet Enterprise 2019 and Puppet 6
    Eric Sorenson, Director of Product Management, Puppet Feb 26 2019 4:30 pm UTC 29 mins
    Learn about the brand new version of Puppet Enterprise, PE2019. It's built on the latest open source Puppet 6 Platform and includes a host of new features, usability improvements, performance enhancements, and bug fixes.
  • The End is Near! Preparing for SQL Server 2008 & Windows Server 2008 End of Life
    The End is Near! Preparing for SQL Server 2008 & Windows Server 2008 End of Life
    Jacob Wilkins, Database Administrator - TierPoint; Allen Rogerson, Windows Engineer - TierPoint Feb 26 2019 5:00 pm UTC 60 mins
    Don't let the end of support for Windows Server and SQL Server 2008 sneak up on you—the impacts to security and costs are too important. Avoid business disruptions and use this as an opportunity to adopt the most current security and innovation technologies. Join us as we discuss how to prepare for Windows Server and SQL Server 2008 and 2008 R2 End of Support. In this session you will learn:

    -when mainstream and extended support ends for Windows Server and SQL Server 2008 and what the impact is on your organization
    -what are some key features of Windows Server 2016 and SQL Server 2017
    -how to make the move to upgrade
    -what tools and expertise are available from a managed services partner like TierPoint to help you make the transition
  • Collaborative Defense—Bringing Business & Security Together for Resiliency
    Collaborative Defense—Bringing Business & Security Together for Resiliency
    Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRIC Feb 26 2019 5:00 pm UTC 37 mins
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration are topical, consistent themes, reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • 4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    Sean Leach, Fastly and Sophia Vargas, Forrester Feb 26 2019 5:00 pm UTC 18 mins
    Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.

    Join this webinar with experts from Fastly and Forrester to learn how to:

    - Maximize availability by ensuring sufficient redundancy and failover options
    - Maintain visibility and control to guarantee app performance
    - Optimize performance across a diverse set of resources, locations and workload types
    - Address interoperability and leverage hybrid app components as one dynamic system

    Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.