Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business
    Confronting the Ransomware Crisis: Best Practices for Securing Your Business Dan Maier, VP Marketing Recorded: Sep 24 2018 44 mins
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Email Security: Why It Probably Isn’t Working, and What To Do
    Email Security: Why It Probably Isn’t Working, and What To Do Michael Osterman of Osterman Research Recorded: Sep 24 2018 48 mins
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • How do Rackspace work with AWS
    How do Rackspace work with AWS Dan Cox Recorded: Sep 24 2018 7 mins
    Watch now to see Dan Cox, General Manager, AWS EMEA at Rackspace, talk about what Rackspace do as a company and what we specifically provide around the AWS Cloud Platform and customer challenges.
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage
    How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Sameer Vasanthapuram, Kevin Stultz and Paul Hortop Recorded: Sep 21 2018 43 mins
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • Learn How to Close the Gap in Your DNS security
    Learn How to Close the Gap in Your DNS security Troy Hager Recorded: Sep 21 2018 48 mins
    There’s Something Missing from Your Defensive Lineup
    Cybersecurity is a team sport. No one player can win the game solo. Unfortunately, existing “players” often leave gaps in your defenses. One of the most serious of these is DNS. It's used by more than 90% of malware to communicate with C&C servers, steal data, or hold it hostage through ransomware—malicious activities that go undetected by traditional technology players.

    Learn How to Close the Gap in Your DNS security
    Infoblox ActiveTrust® Cloud turns DNS from a security gap into your MVP of defense. The live demo from product management will focus on production use of actionable threat intelligence within your DNS security policies and configuration and demonstrate performing threat research and hunting using Dossier to optimize your security team and boost ROI and productivity.

    This webinar will highlight how to:

    -Automatically detect and block DNS-based data exfiltration and malware proliferation
    -Leverage actionable threat intelligence within your DNS security policies
    -Perform daily SOC and threat intelligence research and threat hunting, on DNS and other threats in your environment using Dossier
  • Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas
    Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas 151 Advisors | Marty Jefferson | Ken Briodagh Recorded: Sep 21 2018 50 mins
    On this week’s episode of the Real World IoT Podcast, host Ken Briodagh discusses why satellite connectivity is crucial to the productivity of the Oil & Gas Industry with Data Services Manager at Globalstar, Marty Jefferson.
  • Successful SuccessFactors® Data Migrations
    Successful SuccessFactors® Data Migrations Jan Wade & Nikkia Conley, American Airlines and Nate LaFerle BackOffice Associates Recorded: Sep 21 2018 44 mins
    Preparing your employee data for SuccessFactors® is more complex than you think. American Airlines tackled highly challenging transformations from multiple legacy systems and pre-merger organizations to bring a unified HR platform to life with SuccessFactors®.

    Join Jan Wade, Director, HR Information Systems and Nikkia Conley, Sr. Manager, HR Shared Services, of American Airlines; and Nate LaFerle, Client Partner at BackOffice Associates, as they discuss how they addressed key challenges along the way.
  • [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente
    [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente Ricardo de Melo, System Engineer Brazil, A10 Networks Recorded: Sep 21 2018 44 mins
    Adotar uma estratégia híbrida e em várias nuvens para a entrega de suas aplicações tambiém pode levar a perda da percepção de rendimento de suas aplicações. Compartiremos e demostraremos as últimas funções de análises centralizadas nas aplicações com o Harmony Controller 4.1. Nosso mais novo controlador ajuda as organizações a obter informação útil sobre o rendimento das aplicações, a experiência do usuário final e os problemas de segurança, além de permitir uma resolução de problemas de forma muito mais rápida e fácil.

    O Harmony Controller de múltiplas nuvens nos entrega inteligência conectada através de uma série de serviços de aplicações seguras da A10: ADC / balanceamento de carga, inspeção SSL, Gi-Firewall e Carrier Grade NAT.

    Ao se conectar a este webinar, você aprenderá como:
    * Simplificar e agilizar suas operações de TI
    * Assegurar a disponibilidade da aplicação
    * Separar facilmente os dados contextuais e rapidamente identificar as áreas problemáticas
    * Acessar aplicações centralizadas, redes e análises de segurança a partir de um único painel
    * Habilitar a análise de auto-serviço para vários proprietários de aplicações
  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • How to Give Your Patient Experience Scores a Boost
    How to Give Your Patient Experience Scores a Boost Adam Mahmud, Healthcare Manager, Jamf; Nick Thompson, Jamf Recorded: Sep 20 2018 38 mins
    Improving the patient experience is a critical priority in today’s healthcare landscape. But how can you engage patients in new ways and positively impact HCAHPS scores at the same time? One option is to invest in a mobile technology initiative that delivers faster, more personalized care to patients, while also improving care team communication and clinical workflow efficiency.

    In our webinar, How to Give Your Patient Experience Scores a Boost, we will discuss mobility trends in healthcare, explain security and automation implications to consider, and provide a methodology to ensure a successful technology deployment that positively impacts patients and clinical staff.

    You’ll learn how:

    - iPad and Apple TV can be deployed to patient rooms to empower patients in new ways
    - iPhone and iPad can be used to streamline the delivery of care
    - Healthcare specific solutions can automate IT processes
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs
    Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs Greg Schulz, Microsoft MVP, VMware vExpert, and founder of Server StorageIO & Kamal Anand, Vice President, Cloud A10 Networks Recorded: Sep 20 2018 58 mins
    Businesses today are migrating their application workloads to hybrid infrastructures, spanning from on-premises to public clouds. They expect to get better ease of use, rapid deployment, elastic scaling, automation, and increased operational efficiency. They don’t expect hidden costs or a loss of control—but that is exactly what many organizations experience.

    Learn to manage cost, complexity, and control of your application workloads in this interactive fireside chat. Greg Schulz, MVP, StorageIO, and Kamal Anand, Vice President of Cloud, A10 Networks, will be looking at the trends, tools, and best practices you can apply right now to make your cloud-based application delivery a success.

    In this 30-minute webinar, you will learn to:
    * Boost your productivity and application performance
    * Avoid getting locked into a single public cloud platform
    * Gain visibility and deep insights into your applications
    * Eliminate unexpected monthly expenses
    * Steps you can take today, during, or right after the fireside chat
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • Part 3 of 3: Secrets of Mature DLP Programs -  Getting from "How" to "Wow"!
    Part 3 of 3: Secrets of Mature DLP Programs - Getting from "How" to "Wow"! Carmine Clementelli, Tim Merriam, Daphne Zhao from Symantec Recorded: Sep 20 2018 49 mins
    In the third and final session of the three-part webcast series:

    Part 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud

    As hybrid cloud infrastructures become the new normal, DLP programs must adapt and expand to ensure that data – where ever it’s located – stays protected. New challenges include uncovering shadow data in unauthorized apps, eliminating multiple islands of DLP overhead, and maintaining performance across on-prem hardware and the cloud.

    Join Symantec on September 20 and Learn how to:

    -Reuse existing DLP policies and workflows for cloud apps

    -Incorporate authentication and encryption with Symantec ICE & VIP

    -Discover sensitive data within cloud apps with Symantec CloudSOC

    Register Today

    About the three-part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure. The need to maintain visibility protection and control over the data is extremely difficult. This is especially true with increasing and more strict compliance laws such as the new California data protection law, GDPR. While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    Part 1: First Things First - Understanding "Normal" Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)

    Part 2: Talking it Out - Cross-Functional Communication Key to Mature DLP Programs (View Now: http://bit.ly/0830DLPwebcast)
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Recorded: Sep 20 2018 63 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • Lightboard Lessons: Explaining the GitHub DDoS Attack
    Lightboard Lessons: Explaining the GitHub DDoS Attack John Wagnon - Senior Solution Developer, DevCentral Sep 25 2018 8:30 am UTC 15 mins
    On Feb 28, 2018 the popular website GitHub was the victim of the largest Distributed Denial of Service (DDoS) attack in recorded history. The attackers used open memcached servers to launch an amplification attack that pushed traffic at the rate of 1.35 Tbps. Fortunately, GitHub was prepared with a DDoS scrubbing service and was able to mitigate the attack, and the attackers stopped after about 20 minutes. The unfortunate part, though, is that many thousands of open memcached servers are still out there on the Internet and could be used for a similar attack at any time. Watch the video below to learn about the details of the attack and the mitigation steps.
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 25 2018 9:00 am UTC 60 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.

    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • Predicting Failures Before They Happen With Machine Learning
    Predicting Failures Before They Happen With Machine Learning Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner Sep 25 2018 9:00 am UTC 45 mins
    Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.

    The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!

    Join our webinar to learn how to:

    ● Predict a service health score
    ● Proactively take action based on those predictions
    ● Employ novel tactics for better incident management using advanced search commands
  • Share your data everywhere: Different databases? No problem!
    Share your data everywhere: Different databases? No problem! Max Gieparda, Manager, Sales Engineering, Syncsort Sep 25 2018 9:00 am UTC 60 mins
    How do you keep all your databases in sync and provide access to information across the business, when and where it’s needed in real-time? In this short webinar and demo, we’ll be looking at the easy way to automate data sharing for queries, reports, business intelligence, data warehousing and data lakes using Syncsort’s MIMIX Share solution. MIMIX Share captures data changes in real-time, replicates them between different databases and ensures data integrity. As an example, we’ll be demonstrating how data can be replicated between Microsoft SQL, Oracle and Kafka.

    Learn about:
    - Connecting different databases in your organization with just a couple of mouse clicks.
    - Migrating your databases without a downtime
    - Sharing, distributing, consolidating and transforming your databases
  • Why Run Microsoft Workloads on AWS?
    Why Run Microsoft Workloads on AWS? Malcom North & Harjeet Kumar Sep 25 2018 9:00 am UTC 60 mins
    Rackspace and AWS have partnered for this webinar on how to successfully migrate and run Microsoft Workloads on AWS. The webinar will describe how AWS supports critical Microsoft workloads including legacy SQL Server and lessons learned from AWS Premier Partner Rackspace.


    • Why AWS for Microsoft Workloads?

    • Microsoft Technologies on AWS – SQL Server, .Net, Active Directory, Exchange, Dynamics.

    • Planning and optimising your Microsoft licensing on AWS

    • Migrating Microsoft workloads

    • SQL Server 2008 End of Support – What to do?

    • How to plan a successful POC from customer case studies

    Who should attend?

    • IT Managers – learn how to modernise and optimise your Microsoft workloads

    • Architects – understand how to architect Microsoft technologies on AWS

    • Technical C level Executives – improve operational efficiency and drive digital transformation with Rackspace and AWS.

    As an AWS-audited Managed Service Partner with 1,000+ certifications, Rackspace are one of a select few Premier Consulting Partners holding both the APN Competency for Microsoft Workloads Competency for Productivity and Database workloads.

    Presented by Malcolm North, AWS Specialist Architect at Rackspace and Harjeet Kumar AWS EMEA Microsoft Partner Lead, LIVE online on Tuesday 25th September at 10:00am.

    So, book your place now. Complete the registration form opposite and avoid missing out on valuable insights.

    If you’d like to speak to us beforehand, feel free to get in touch on +44 203 811 4179 or learn more about AWS.
  • VDI / Client virtualisatie / Moonshot Update
    VDI / Client virtualisatie / Moonshot Update Johan Benning, Solutions Architect, HPE Sep 25 2018 9:00 am UTC 60 mins
    Op het gebied van Client Virtualisatie gebeurt er nog steeds veel. In deze presentatie krijgt u de laatste update vanuit een data center / hardware-perspectief.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Sep 25 2018 10:00 am UTC 60 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • HPE ProLiant voor Microsoft Azure Stack
    HPE ProLiant voor Microsoft Azure Stack Martin van Seventer, Solutions Architect, HPE Sep 25 2018 10:30 am UTC 60 mins
    In deze sessie hoort u wat HPE ProLiant voor Microsoft Azure Stack (hét hybride cloudplatform waarmee u Azure-services kunt leveren vanuit uw datacenter die als geïntegreerd systeem wordt geleverd) voor u kan betekenen. Wat is Azure Stack, wat kun je ermee en wat is de rol van HPE hierin? U hoort in deze technisch-georiënteerde sessie alles te weten over HPE Microsoft voor Azure Stack.
  • Infosight – Artificial Intelligence in het datacenter
    Infosight – Artificial Intelligence in het datacenter Jeroen Venema, Solutions Architect, HPE Sep 25 2018 12:00 pm UTC 60 mins
    Hoe krijg je met AI inzicht in je datacenter en kun je problemen oplossen voordat ze storingen veroorzaken met als doel het “Autonomous Datacenter?
  • Uncovering the Power of Box Governance
    Uncovering the Power of Box Governance Eleonore Hebrard - Box Implementation Consultant & Frederico Costa - Box Customer Success Manager  Sep 25 2018 1:00 pm UTC 45 mins
    Get your Box Governance package set up and deployed with the Customer Success Team. 

    It has now been 6 months since GDPR has been adopted in the EU and as a Box Governance customer, we want to ensure you deploy and get value out of our legal and compliance solution. 

    Companies and institutions like Metropolitan Police, General Electrics and AstraZeneca have already entrusted their content to Box Governance. 
    We want to show you how you can be on top of your Industry Legal and Compliance standards by providing you a hands-on webinar "Uncovering the power of Box Governance", hosted by a member of our Box Consulting Team. 

    Use cases for Legal hold, Security Classification, Retention Management.
    Checklist for successful deployment at scale
    Questions and Next Steps
  • Synergy versus c-Class versus DL
    Synergy versus c-Class versus DL Remco Pomp, Solution Architect, HPE Sep 25 2018 1:30 pm UTC 60 mins
    Wat zijn de kosten per workload? Hoe verhoudt zicht Hybride It zich ten opzichten cloud-only voor wat betreft de kosten? Hoe is verhouding TCO en Capex? Met welke aanpak hou je de kosten zo laag mogelijk? Kies je voor veel cores met weinig MHz of weinig cores met veel MHz? En wat doet dit met softwarelicentiekosten?
  • How to Leverage Tools that Support Innovation and Differentiation
    How to Leverage Tools that Support Innovation and Differentiation Gary Middleton: Group Networking Senior Practice Director DCN,Networking &Chris Wolf: CTO, Global Field & Industry,VMWare Sep 25 2018 2:00 pm UTC 45 mins
    Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
    Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:

    • Use containerisation to transform your cloud capabilities.
    • Empower IT to embrace the solutions and services needed to evolve.
    • Build applications that streamline and transform business success.
    • Move with speed and agility while maintaining a strong infrastructure.
    • Exploit the software as a service (SaaS) revolution.
  • NVMe™ over Fabrics: Updates for 2018
    NVMe™ over Fabrics: Updates for 2018 Brandon Hoff, Distinguished Software Architect at Broadcom, NVM Express,Inc. Marketing Workgroup Member Sep 25 2018 4:00 pm UTC 60 mins
    NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.

    Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
  • Pacific Dental Cloud Migration Strategy on AWS
    Pacific Dental Cloud Migration Strategy on AWS Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Sep 25 2018 5:00 pm UTC 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • Infrastructure as Code & Changing Organizational Design: 2019 & Beyond
    Infrastructure as Code & Changing Organizational Design: 2019 & Beyond Mark Thiele, Erik Ottem, Jeanne Morain and Karthik Krishnaswamy Sep 25 2018 5:00 pm UTC 45 mins
    This webinar is part of BrightTALK's I&O Tech Talk Series.

    Data center hardware and configuration are on the outs as technologies such as Infrastructure as Code (IaC) take shape. The world of manual processes and provisioning is disappearing before our eyes, and it's changing the way organizations are designed and modernized.

    Tune into this roundtable panel discussion led by Mark Thiele, Chief Strategy Officer, Apcera as they discuss the phenomenon of Infrastructure as Code and other emerging technologies, and how they are disrupting IT infrastructure and the traditional data center.

    Moderator: Mark Thiele, Chief Strategy Officer, Apcera
    Panelists: Erik Ottem, Director of Product Marketing, Western Digital and Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud, Karthik Krishnaswamy, Sr Product Marketing Manager, NGINX
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Sep 25 2018 6:00 pm UTC 45 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Sep 25 2018 6:00 pm UTC 45 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
  • API Gateways: Why You Should Use Them in Microservices Development
    API Gateways: Why You Should Use Them in Microservices Development Charles Pretzer, Technical Architect, NGINX Sep 25 2018 6:00 pm UTC 60 mins
    The use of an API gateway and the move to microservices are two of the most important trends in application development. But are they similar, or different; complementary, or contradictory? In this webinar we discuss the advantages of an API gateway, the advantages of microservices development, and how and when they can work together.

    Join this webinar to learn:
    - More about the advantages of an API gateway
    - More about the advantages of microservices
    - Whether an API gateway approach works with different microservices network architectures, including service mesh
    - How to reduce rework if your application needs to move from one network architecture to another
  • Get Ready for OS Upgrades and Apple Business Manager
    Get Ready for OS Upgrades and Apple Business Manager Nick Thompson, Product Manager, Jamf Sep 25 2018 6:30 pm UTC 60 mins
    With Apple’s Worldwide Developers Conference (WWDC) behind us, it’s time to review the exciting announcements and discuss how you can prepare now for your future iOS 12, tvOS 12 and macOS Mojave updates.

    In our webinar, Get Ready for OS Upgrades and Apple Business Manager, we’ll explain the new management features and services coming your way.

    We will cover:

    •What new mobile device management (MDM) features will be available with Apple’s upcoming OS releases
    •How to prepare for OS upgrades this fall
    •An introduction to Apple Business Manager
  • Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager
    Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager Eric Popiel and Luis M Burgos, Micro Focus Sep 25 2018 6:30 pm UTC 60 mins
    Organizations that use Oracle e-Business Suite often find that they have waited too long to implement archiving and data management strategies for their application databases. This reactive approach can be much more costly and difficult to implement when your business begins to experience issues. With the right data management strategy in your Oracle environment, you gain benefits in a range of areas, including application performance, long-term compliance, manageability, and infrastructure costs.

    Micro Focus Structured Data Manager software, with its ‘ready-to-run’ modules, for Oracle e-Business Suite, manages production and related non-production databases that support the Oracle e-Business Suite environment. This allows you to gain the right data management strategy to make sure that your business can remain responsive, while keeping costs under control and meeting data retention and compliance requirements.

    Structured Data Manager helps you:
    ● Archive and manage your Oracle e-Business Suite database and reduce its size
    ● Discover and mask/encrypt sensitive data for GDPR & CCPA compliance and test data management
    ● Manage the lifecycle of your data and comply to privacy laws

    Join this live webcast to understand how your organization can enhance your Oracle e-Busi­ness Suite environment with Micro Focus Structured Data Manager.
  • [Live Panel] Tech Stack Secrets from Top IT Teams
    [Live Panel] Tech Stack Secrets from Top IT Teams Dave R Taylor, CMO, Impartner, Lief Koepsel, Fortinet, Armin Moaddel, Marketo, Margaret Back, McAfee & Kevin Sequeira, Splunk Sep 25 2018 8:00 pm UTC 60 mins
    How do you support your business units?

    How do you decide to make or buy?

    How do you decide whether to use functionality from an existing vendor or bring in a totally new technology provider?

    These are the questions top IT teams are and should be asking. In this webinar you’ll hear from top IT leaders – and one business unit buyer – from today’s most progressive tech companies for insights on how they’ve navigated these questions for their organizations and helped them construct a world-class tech stack that outpaces the competition.

    Join Dave R Taylor, Chief Marketing Officer at Impartner for this live streamed panel during Dreamforce 2018 in San Francisco.

    Lief Koepsel, Senior Director, Channel - North America, Fortinet
    Armin Moaddel, Senior Partner Operations Manager, Marketo
    Margaret Back, Business Process Architect, McAfee
    Kevin Sequeira, Senior Director, Sales Technologies, Splunk
  • [Live Interview] Ask the Expert: How to be the IT Champion of a PRM Installation
    [Live Interview] Ask the Expert: How to be the IT Champion of a PRM Installation Gary Sabin, Senior Director, Product & UX and Dan Lang, Senior Salesforce Developer, Impartner Sep 25 2018 9:15 pm UTC 30 mins
    Sales tech stack: ✓ Martech stack: ✓  This year’s hot tech stack is for the channel -- which typically represents 75% or more of a company’s revenue. 2018’s breakthrough technology is PRM – Partner Relationship Management. This foundational system of record sits at the core of a chantech stack and everyone from Splunk, to Zendesk to Xerox have made PRM this year’s must have technology. IT leadership is uniquely positioned to ensure the quick, on-budget implementation success.

    Join this intense “Ask the Expert” session with one of Impartner Channel Innovation Labs top installation experts to learn best practices on how to streamline deployment of this highly-visible, revenue-generating solution.
  • Achieving Full Stack DevOps at Colonial Life
    Achieving Full Stack DevOps at Colonial Life Colette Casey - Techical Architect at Colonial Life Sep 26 2018 3:00 am UTC 61 mins
    This on-demand webinar highlights the transformation Colonial Life made in bringing DevOps to the entire software stack. In addition, the presentation focuses on the critical role that data and the database play in modern software delivery and the tools Colonial Life used to create their Database DevOps process.