Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Unstructured Data Management: A New Way of Fighting Data
    Unstructured Data Management: A New Way of Fighting Data
    Enrico Signoretti, Krishna Subramanian Recorded: Jun 18 2019 62 mins
    The fight against data growth and consolidation was lost a long time ago. Several factors contribute to the increasing amount of data we store in storage systems such as users desire to keep everything they create, organizational policies, new types of rich documents, new applications, and demanding regulations are just some of the culprits.

    Many organizations try to eliminate storage silos and consolidate them in large repositories while applying conservative policies to save capacity. It’s time to take a different approach and think about managing data correctly to get the most out of it. Unstructured data, if not correctly managed, could become a huge pain point from both finance and technical perspectives. It is time to think differently and transform this challenge into an opportunity. Let us show you how to get more efficiency and value out of your data!

    Join this free 1-hour webinar from GigaOm Research that is bringing together experts in data storage and cloud computing, featuring GigaOm Enrico Signoretti and special guest from Komprise, Krishna Subramanian.

    In this 1-hour webinar, you will discover:

    • The reality beyond data growth and what to expect from the future
    • Why data storage consolidation failed
    • Why cloud isn’t a solution if not managed correctly
    • How to preserve and improve the user experience while changing how your infrastructure works
    • How to understand the value of stored data to take advantage of it
    • How data management is evolving and what you should expect in 12-to-18 months.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Recorded: Jun 18 2019 57 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Hyper-Converged Infrastructure: Maximizing TCO and ROI
    Hyper-Converged Infrastructure: Maximizing TCO and ROI
    Dave Demlow, Dusty Koenkenberg, Enrico Signoretti, Jody Harper Storage Capacity, HCI Recorded: Jun 18 2019 58 mins
    This free 1-hour webinar from GigaOm Research brings together IT infrastructure experts, featuring GigaOm Enrico Signoretti and special guests from Scale Computing, Dave Demlow, and the Detroit Symphony Orchestra, Jody Harper. The presentation and discussion will focus on the benefits of hyper-converged infrastructure (HCI) from the point of view of end users (those that have already adopted it) and an analysis of different approaches to HCI.

    End users struggle to keep their infrastructure simple, flexible, and scalable while keeping costs at bay. Hyperconvergence is a solution that promises it all, but there are also trade-offs and different approaches to solving the same problem. What is the best solution for your organization?

    Identifying the right solution is not easy, and it depends on several factors including system architecture, simplicity, usability, support, ease of use, and more.

    In this 1-hour webinar, you will discover:

    • Different types of HCI
    • What you can really do with HCI
    • The benefits of end-to-end solutions
    • HCI for centralized and distributed organizations
    • Key criteria to evaluate an HCI infrastructure
    • Data protection and Disaster Recovery options
    • Edge-Core-Cloud
    • The role of Cloud to improve infrastructure TCO

    This webinar is designed to inform and educate end users who are considering innovative solutions for their infrastructure strategy, giving both technical and business perspectives on the covered topics.
  • APT Groups: How They Think, What They Want, and How to Fight Them
    APT Groups: How They Think, What They Want, and How to Fight Them
    David Grout, CTO, EMEA, FireEye Recorded: Jun 18 2019 59 mins
    Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.

    Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:

    •A high-level overview of the nation-state interests driving APT activity
    •Insight into the most recent APT attacks investigated by FireEye
    •A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Recorded: Jun 18 2019 48 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Jun 18 2019 29 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on June 18th, 2019 at 01:00 pm ACT to uncover all the tricks of the trade! Register Now!
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Recorded: Jun 18 2019 55 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • An Introduction to Symantec Email Fraud Protection
    An Introduction to Symantec Email Fraud Protection
    Adrian Covich, Director Systems Engineering Symantec | Brian Westnedge, Sr. Director, Global Channels, Valimail Recorded: Jun 18 2019 61 mins
    Are attackers leveraging your domains to impersonate and send emails to your clients and business partners?

    Symantec has launched Email Fraud Protection, an add on cloud service solution that provides organisations with a fully automated approach to the implementation of DMARC, SPF and DKIM to prevent attackers from spoofing their domain names and provide protection from Business Email Compromise (BEC).

    During this webinar, you will discover how Symantec Email Fraud Protection can safeguard your organisation from these impersonation and phishing attacks and how it can help organisations overcome the complexity of achieving sender authentication. We will be diving deep into DMARC Enforcement, and taking a look at Symantec’s newly hosted innovative approach to DMARC, a simpler and more streamlined method to prevent phishing attacks.

    Join us as we discuss:

    - DMARC Enforcement and why you should be at quarantine or reject
    Domain configuration
    - Achieving enforcement without processing PII
    - Increasing brand reputation and sender trust through authentication
  • Performance, Capacity and Lower TCO. Can a single storage solution offer it all?
    Performance, Capacity and Lower TCO. Can a single storage solution offer it all?
    Enrico Signoretti, Greg Klieinman, Jason Oblinger, Scott Hudson Recorded: Jun 14 2019 58 mins
    The storage industry is facing challenging times. Today’s CxOs, IT Specialists, and Project Managers adopting a two-tier solution have much to consider. On one side sits exponential data growth, longer retentions, and capacity-driven applications. On the other side we face applications requiring rapid data access with minimal latency being key to business growth. This trend is quickly accelerating as new applications enable IoT and leverage artificial intelligence demanding seamless integration with the cloud.

    The traditional classification of primary and secondary storage no longer applies. Associating structured data to the first and unstructured data to the latter is limiting with modern applications and computing paradigms. Primary and secondary storage as we knew them, impose too many constraints leading to a rise in infrastructure complexity and costs, rendering the strategy unsustainable. IT leaders today require solutions that automate regular tasks to simplify infrastructure and reduce expenses.

    During this one-hour webinar, GigaOm analyst Enrico Signoretti and special guests Greg Kleiman from Datrium, as well as Jason Oblinger, Sr. Systems Administrator from Next Generation Films, Inc. and Scott Hudson, System Administrator for ScienceLogic, will analyze several aspects of two-tier storage strategies including encryption, introduce Datrium’s innovative solution, and provide testimonies from end users that have adopted it.

    During this webinar, attendees will learn:

    •Why a two tier-storage strategy
    •Different types of tier integration
    •The benefits of an integrated two-tier storage infrastructure
    •Introduction to Datrium DVX platform and cloud services
    •How Datrium solution ecosystem fits in a two-tier storage strategy
    •The benefits of Datrium for the people in your organization
    •A successful two-tier storage strategy implementation with Datrium
  • Using Value Stream Management to Optimize DevOps Workflow
    Using Value Stream Management to Optimize DevOps Workflow
    Jon Collins, Karan Malhi, Michael Baldani Recorded: Jun 14 2019 61 mins
    While DevOps is acknowledged as delivering on an organization’s innovation goals, it is not prescriptive in terms of workflows or activities, nor indeed toolsets. And, as many organizations are discovering, simply ‘doing’ DevOps, or employing continuous integration and delivery tools and frameworks, does not always lead to innovation nirvana. As development, testing, and deployment processes are automated, attention turns to ensuring that the end-to-end process delivers effective results, with maximum efficiency.

    Value Stream Management is a discipline that focuses on the value delivered at each step. It defines the optimum stream for a given scenario, with best results and at a reduced cost. Delivering on this theory can depend on where organizations are on the DevOps journey. Less mature organizations may prefer more prescriptive solutions with the right kinds of guardrails in place, offering the best way to solve a particular kind of problem, such as developing a mobile app or deploying a cloud-based scalable solution. Other, more sophisticated enterprises, may look at how to connect teams, tools, and applications for a single view across the software delivery process.

    This free one-hour webinar from GigaOm Research brings together leading experts in DevOps, featuring GigaOm Principal Analyst, Jon Collins and Karan Malhi, Director of Product from CloudBees. In this webinar, we look at how Value Stream Management offers a roadmap towards better, faster software delivery and operational excellence.

    We consider:
    •The importance of visibility and insight across all value streams to effectively measure and manage DevOps performance.
    •How to access key benchmark metrics and track performance as a basis to learn, improve, and deliver better results at reduced costs.
    •Practical examples and real-world case studies to show how Value Stream Management can be part of an organization's innovation journey.
  • Boosting Data Science Project Success: Development is Not Enough
    Boosting Data Science Project Success: Development is Not Enough
    Andrew Brust, Michael Nixon Recorded: Jun 14 2019 59 mins
    For enterprise data science environments, development platforms aren’t enough. The data itself, and the infrastructure that serves it, are foundational to data science work. Implementing them well is a strategic necessity.

    Fast, governed access to the right data is critical to data science project success. The data must be cleansed and of high quality, with proper role-based access enforced. The infrastructure must manage workloads well, letting data scientists explore, query and shape the data they need, to build the best predictive models.

    Join us for this free one-hour webinar with GigaOm Research and Snowflake, focused on data warehousing built for the cloud, to review infrastructure strategies that boost data science production.

    You will learn:
    •How to support demanding data science projects without hampering other data teams
    •Strategies to secure data easily and effectively, while keeping authorized access agile and available
    •How to accelerate query performance cost-effectively for data access technologies such as Python, Spark SQL, and others
  • Using the DNS to Block Phishing Attempts
    Using the DNS to Block Phishing Attempts
    Nominet Cyber Security Recorded: Jun 14 2019 3 mins
    Although phishing has been around for decades, it’s still one of the most popular tactics used by cyber criminals.

    Education helps but is rarely 100% effective. Millions of spoof emails are sent every day and they get ever more convincing.

    Nominet’s NTX platform uses original research, data science and machine learning to weed out the signs of phishing. It analyses DNS traffic that’s usually whitelisted by firewalls and other cyber security measures to prevent phishing campaigns from being effective.

    This short video explains how phishing works and how NTX prevents harm, should your staff click through to the wrong place.
  • Using the DNS to Defend Against Malware
    Using the DNS to Defend Against Malware
    Nominet Cyber Security Recorded: Jun 14 2019 3 mins
    Nearly all malware - ransomware, viruses, trojans, worms, adware, spyware, fileless malware and all the hybrid forms - use DNS at some point. It might be to steal data, communicate with a command and control server or misdirect you.

    The point is that DNS is so ubiquitous that most cyber security defences disregard it.

    NTX doesn’t. NTX uses the tell-tale signs of malware in DNS packets against the cyber criminals, to predict, detect and block malware.

    This short video explains more - feel free to share it with colleagues, manager and the board.
  • AI Operations: It Can’t Be Just an Afterthought
    AI Operations: It Can’t Be Just an Afterthought
    Andrew Brust, Adnan Khaleel, Dr. Sambit Bhattacharya Recorded: Jun 13 2019 63 mins
    In the worlds of machine learning (ML) and deep learning (DL), operations and deployment is a subject that often falls by the wayside. And the split reality between everyday on-premises Artificial Intelligence (AI) work and the industry’s fascination with more aspirational cloud-based AI work only makes matters worse.

    For adoption of AI/ML/DL to be actionable for Enterprise customers, the full spectrum of on-premises and cloud-based work needs to be accommodated. Deployment and operations across environments needs to be consistent. On-premises provisioning and deployment should feel cloud-like in ease-of-use, and hybrid scenarios need to be handled robustly. Installation and management of frameworks and models needs to be handled too.

    Join us for this free 1-hour webinar, from GigaOm Research, to explore these matters. The Webinar features GigaOm analyst Andrew Brust and special guests, Adnan Khaleel from Dell EMC, and Professor Sambit Bhattacharya of Fayetteville State University, a customer of Bright Computing. This webinar is sponsored by Dell EMC, NVIDIA, and Bright Computing.

    In this 1-hour webinar, attendees discover:

    ●How cross-premises AI deployment is both necessary and achievable
    ●What “AI Ops” looks like today, and where it’s going
    ●The sweet spot of ML/DL training workloads between data center and cloud
  • Using the DNS to Prevent Data Loss
    Using the DNS to Prevent Data Loss
    Nominet Cyber Security Recorded: Jun 13 2019 3 mins
    A very hard-to-detect technique for getting your confidential data out of your company is to hide it among DNS packets. It’s not fast, but criminals use it because it is so hard to detect. DNS traffic is so abundant and ordinary that very few cyber security solutions look at it.

    This quick video explains how it happens, how it can be disastrous for your organisation and what you can do to prevent it.
  • Building a Solid Foundation for Advanced Analytics Maturity
    Building a Solid Foundation for Advanced Analytics Maturity
    Andrew Brust, Steve Mahoney Recorded: Jun 13 2019 60 mins
    As the best of big data analytics and business intelligence coalesce, organizations now have their sights set on AI for predictive and prescriptive analytics. But how can they get there?

    Effective predictive and prescriptive analytics will put an organization in an advanced analytics maturity level, but a solid foundation at the more basic levels has to come first. Earlier analytics maturity phases, including descriptive and diagnostic/root cause analytics, and intermediate levels, such as operational analytics, must be addressed robustly before further phases can be approached successfully.

    Understanding the capacity your organization has to leverage analytics, and designing your analytics to match that, may be the best way forward, and this requires introspection and planning. Join us for this free 1-hour webinar from GigaOm Research to discuss how to assess, shore up, and advance your company’s analytics maturity. The webinar features GigaOm analyst Andrew Brust and special guest Steve Mahoney, Product Director from Looker, a leading provider of modern analytics platform software.

    In this webinar, you will learn:
    - What a rational analytics maturity model looks like and where your organization lies within it
    - How to strengthen the integrity of your current analytics maturity level
    - How to map out your path to advanced analytics maturity and approach practical adoption of AI and machine learning
  • Modernizing Manufacturing with Mobile and IoT
    Modernizing Manufacturing with Mobile and IoT
    Bob Egan, John Gibson, Luis Llamas Recorded: Jun 13 2019 59 mins
    Digital Transformation is both a business and IT mandate across many business sectors. Nowhere is this more evident than in the modernization of the manufacturing sector. At the core of this transformation are mobile and IoT systems, driving innovation to achieve velocity through visibility by instrumenting the warehouse, the assembly line and throughout finished good supply chain. In fact, without architecting with IoT and mobile as core tenants in this modernization, AI and robotic initiatives may well miss their mark.

    In this webinar, we will discuss three key issues:

    •What does velocity through visibility look like, how is it evolving and what is the impact?
    •What are critical issues to increase efficiency, improve quality and granularity control?
    •How are leading entities modernizing manufacturing with mobile and IoT?
  • Discovering IT Solutions With Data
    Discovering IT Solutions With Data
    Jason Judge | Director of Enterprise Analytics at Tableau Recorded: Jun 13 2019 38 mins
    Arguably, more than any other department, IT knows the value of data and the value of being data-driven. IT systems collect and store data for the organization, but you also use data every day to manage, monitor, and maintain a multitude of platforms to support business needs, which creates the perfect opportunity to analyze this data with Tableau.

    In this webinar, you'll see how Tableau connects disparate IT sources of data to provide you with a complete picture of your business.
  • How We Do Finance Analytics
    How We Do Finance Analytics
    Eugene Hillery | Senior Director, Int. Operation at Tableau Recorded: Jun 13 2019 50 mins
    Learn how Tableau's entire finance department use Tableau to understand all of our data.

    Here at Tableau, we rely on data and visual analytics to unlock new financial insights and oversee the fiscal health of the entire company.

    Watch this webinar with Eugene Hillery and Marcel Bickert, Tableau's Finance & Operations leaders, to discover how they use Tableau to quickly and easily report financial information, enabling them to better advise the c-suite and board on risks, strategy, and business ventures.

    We'll even share and discuss our favourite financial dashboards including:

    *Purchasing. Dig deeper into your purchasing data
    *Cost Control. See how visual analytics can reduce costs
    *Accounts Receivable. Analyse your data regionally or by account
    *Executive Dashboard. Your groups financial health in one dashboard
    *Financial Planning. Provide previously unknown insights to business leaders
  • How We Do Sales Analytics
    How We Do Sales Analytics
    Toni Farrell | UKI Sales Manager at Tableau Recorded: Jun 13 2019 28 mins
    Learn how Tableau's entire sales organisation use Tableau to understand all of our data.

    Here at Tableau, we rely on analytics to empower every salesperson to better understand their accounts, identify promising prospects, forecast accurately and ultimately close more deals.

    Watch this webinar with Tableau's UK Sales Manager, Toni Farrell, to discover how we put actionable sales data in the hands of our analysts, sellers and sales leaders. We’ll show you dashboards on quota attainment, territory creation, forecasting, account strategy, call-down lists and much more.

    You'll learn about:

    *The value data brings to the entire sales organisation
    *How to solve common sales challenges with analytics
    *Our most popular and effective dashboards for sales teams
  • How We Do Marketing Analytics
    How We Do Marketing Analytics
    John-Paul Rantac | EMEA Marketing Campaigns at Tableau Recorded: Jun 13 2019 43 mins
    Learn how Tableau's entire marketing organisation use Tableau to understand all of our data.

    Here at Tableau, we rely on data and analytics to empower every marketer to better understand campaign performance, web analytics, lead activity, social media influence and ROI.

    Watch this webinar to discover exactly how we use marketing data to drive more traffic, leads and likes. We’ll show you dashboards on website goal conversion, Google Ads and digital marketing performance, lead activity, Eloqua email insights, marketing activity calendar and much more.

    Learn how visually analysing you marketing data can help you in these five key areas.

    *Marketing Leadership KPI's. Get a 360 view of performance
    *Campaign Performance. Improve your ROI
    *Digital Marketing. Enhanced Google Analytics and Social Media analysis
    *Lead Generation. Easily see which leads are 'hot'
    *Marketing Ops & Analytics. Combine all of your data sources
  • Re-crossing the DevOps Wall of Confusion: How Operational Data Can Enhance and A
    Re-crossing the DevOps Wall of Confusion: How Operational Data Can Enhance and A
    Jon Collins, Mark Herring Recorded: Jun 12 2019 60 mins
    Data, data everywhere, but not a drop to drink? The amount of information we now have on operational aspects of IT is astounding, creating the potential for data analytics, fault identification, and diagnosis. However, many organizations struggle to link information and insights back into the fast-moving development lifecycle.

    In this webinar, GigaOm analyst Jon Collins speaks to Time Series Platform vendor InfluxData about how organizations can not only monitor and control infrastructure assets across the private and public cloud, but also start to derive the benefits of data analytics across workflows, feeding infrastructure information to developers and decision makers alike.

    This webinar is aimed at anyone looking to make better use of operational data to feed decisions, from those working at the front line of software delivery and deployment, to senior executives and strategists. We won’t only be looking at the theory, but we’ll also be drilling into practices learned across a number of verticals and specific clients, taking examples from business-as-usual to disaster recovery.

    If you are looking to accelerate and automate your DevOps and continuous delivery practices through better use of data, or simply want to know how to deliver operational information to the development point of need, register today.
  • Speed and Scale: Advanced Analytics with Machine Learning
    Speed and Scale: Advanced Analytics with Machine Learning
    Andrew Brust, Ryan Adams, Deepsha Menghani, Mark Balkenende Recorded: Jun 12 2019 61 mins
    Artificial Intelligence and Machine Learning (ML) can turn massive amounts of data into deep insights that drive revenue and decrease costs. But ML’s not an island – in fact, it’s carried out most successfully when paired with advanced analytics. To facilitate the best analytics work, enterprises need the right platforms and tools to load data, prepare it, ensure high-quality and integrate with corporate data governance processes.

    How can you get all that working harmoniously, especially in the cloud? It takes the right tools, strategy and workflow, but it can be done. Join us for this free 1-hour webinar, from GigaOm Research, to find out how. The webinar features GigaOm analyst Andrew Brust, Deepsha Menghani, Product Marketing Manager at Microsoft, and a special guests from Talend.

    In this 1-hour webinar, you will learn how:
    •Data analytics, data quality and data governance can be tightly intertwined with data science
    •Technologies like Apache Spark can serve both your data engineering and machine learning needs
    •Cloud services can be combined with open source software and analytics ecosystem tools for maximum benefit
  • Strategies for Moving from Application to Enterprise Customer Master Data Manage
    Strategies for Moving from Application to Enterprise Customer Master Data Manage
    William McKnight, Leticia Barcia Recorded: Jun 12 2019 63 mins
    Many organizations start their Master Data Management (MDM) journey in support of a specific sponsor business need. Often hard-fought concessions are made to allow MDM techniques to support data needs of a particular function. Now, since almost every application needs your customer master, it’s time to expand the scope of MDM, to replace substandard methods of accessing customer data in the enterprise and to establish the MDM hub for use by new applications across all customer business processes.

    Crossing the chasm to the enterprise customer 360 can be daunting. During this 1-Hour Webinar, GigaOm analyst William McKnight will share some strategies for moving from application to enterprise customer MDM and will discuss the ruggedization that must exist in MDM to be ready.

    During this 1-Hour Webinar we will examine:

    •How MDM is established with TCO
    •The MDM Maturity Model (single application MDM is low)
    •Elements in MDM necessary for takeoff:
    •A data quality program (prove data quality according to beloved peers)
    •DaaS SLAs – how do they work with the hub?
    •Operational integration (including data lake) AND value-added customer analytical elements (perhaps gleaned from transactional data)
    •Syndicated data take-on
    •Graph capabilities
  • Real World Applications of AI in FinServ Customer Data Strategy
    Real World Applications of AI in FinServ Customer Data Strategy
    Peter Ku, VP Informatica, Chris Cingrani, Informatica, Glenn Riedel, Informatica, Bryan Weinman, Informatica Recorded: Jun 11 2019 36 mins
    There are hidden insights in your data that can help you improve experiences and reduce risk. During this webinar, Informatica experts will share several examples of how Financial Services organizations are improving experiences and reducing risk by leveraging a Customer 360 view to get a better understanding of the individuals they interact with. We will also share how those insights can be confidently linked to individuals and key relationships identified so that timely action can be taken.
  • Keynote Address: Symantec Outlook & Vision
    Keynote Address: Symantec Outlook & Vision
    Kevin Reardon, Vice President, Worldwide Strategy and Consulting, Symantec Jun 19 2019 1:00 am UTC 33 mins
    Even as technological advances make it easier for organisations to undertake a digital transformation, the challenges of cloud migration, privacy legislation and advanced adversaries still remain.

    Join Kevin Reardon, Vice President of Worldwide Strategy and Consulting at Symantec, in this webinar as he discusses Symantec’s outlook and vision for 2020 and beyond, including:

    - Challenges securing the digital transformation
    - Symantec’s Integrated Cyber Defense approach
    - How an integrated platform can help simplify and resolve digital transformation challenges
    - What your next steps should be

    Register now to watch the webinar.
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Zero Trust: Integrated Cyber Defense & ISTR Observations
    Zero Trust: Integrated Cyber Defense & ISTR Observations
    Nick Savvides, Chief Technology Officer, Asia Pacific, Symantec Jun 19 2019 2:00 am UTC 43 mins
    With the internet and the cloud being a critical part of most organisations today, the walled network is soon becoming a thing of the past. When your network is essentially the internet, the only secure mindset is Zero Trust.

    Join us in this webinar as Nick Savvides, Symantec’s Chief Technology Officer for Asia Pacific and Japan, discusses:

    - The evolution from Open Security to Zero Trust
    - Key learnings from the Internet Security Threat Report (ISTR) Vol. 24
    - The guiding principles and practical applications of Zero Trust
    - Symantec’s vision of Zero Trust

    Register now to watch the webinar.
  • Symantec Emerging Technologies: We Invest So You Don't Have To
    Symantec Emerging Technologies: We Invest So You Don't Have To
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec Jun 19 2019 3:00 am UTC 24 mins
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • Symantec Web Isolation
    Symantec Web Isolation
    Dan Amiga, Vice President, Web Isolation, Symantec Jun 19 2019 4:00 am UTC 39 mins
    With 90% of cyber attacks coming through web and email, the need for Web Isolation has never been greater. But is it possible to have an air gap on all fronts without negatively affecting the user experience?

    Join us in this webinar as Don Amiga, Vice President of Web Isolation at Symantec, reveals the ins and outs of Web Isolation, including:

    - Why organisations today need military grade air gaps
    - The architecture behind Web Isolation
    - Live demo and use cases and how to implement Web Isolation for each
    - How Symantec Web Isolation offers superior integration and protection

    Register now to watch the webinar.
  • Top Security Considerations in Moving to the Cloud
    Top Security Considerations in Moving to the Cloud
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec Jun 19 2019 5:00 am UTC 30 mins
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Next Generation Security Operations: Symantec Threat Intelligence
    Next Generation Security Operations: Symantec Threat Intelligence
    Peter Sparkes, Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Jun 19 2019 6:00 am UTC 37 mins
    Preparing for the threats of tomorrow will require faster, deeper integration of technology, process, intelligence and warriors. However, making so many moving components work seamlessly together can be a challenge.

    Join Peter Sparkes, Symantec’s Senior Director of Cyber Security Services for Asia Pacific and Japan, in this webinar as he discusses the OODA Loop Strategy:

    - Observe: Expanding detection and extending coverage across the ecosystem
    - Orientate: Utilising threat intelligence with planning, process and playbooks
    - Decide: Empowering the analyst and the impact on business
    - Act: Proactive defense through managed endpoints detection and response and orchestration

    Register now to watch the webinar.
  • How To Train Your Email Security Dragon
    How To Train Your Email Security Dragon
    Gareth Fraser-King, Director, Product Marketing EMEA Jun 19 2019 1:00 pm UTC 45 mins
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Creating A Winning Digital Transformation Strategy
    Creating A Winning Digital Transformation Strategy
    Art Langer, David Linthicum, EJ Bodner AI, Artificial Intelligence, Internet of Things, Mobile, 5G, IoT Jun 19 2019 2:00 pm UTC 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm David Linthicum and special guest from Nutanix, Dr. Arthur Langer. The discussion will focus on the stepwise process of understanding where you are in employing digital, where you need to go, and the specifics to drive success the first time.

    “Digital transformation” is certainly the buzzword of 2019, but most don’t know what it is, why it is important and how to do it right. By investing in digital experience transformation enterprises can discover valuable customer behavior insights and execute personalized experiences to engage, delight and retain customers.

    In this Webinar, we’ll take the mystery out of what it takes to create and execute on a digital transformation strategy, including what’s important, and what needs to be avoided. This will be a candid discussion with industry experts. We’ll explore what technology to leverage, best practices, and approaches.

    In this 1-hour webinar, you will discover:

    • Reference technical architecture of digital transformation, from 5G to IoT.
    • Social architecture, or how people are important to this transformation strategy.
    • How to sell digital initiatives to the board of directors, and other stakeholders.
    • Core metrics and continuous integration that keep priorities straight.
  • The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    Stowe Boyd, Kevin O'Donnell Jun 19 2019 4:00 pm UTC 53 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm Stowe Boyd and a special guest from Nitro, Kevin O’Donnell, Director of Product. The discussion will focus on the “Frontline-First” approach to improving workflow management.

    Too often, enterprise change initiatives focus on technology, infrastructure, and process without considering the people and workflows that are the foundation of a company’s productivity.

    Those working on the frontline — in close contact with customers and a changing competitive marketplace — are best positioned and most likely to push for new ways to save time and increase efficiency so long as management lowers barriers to making improvements.

    In this 1-hour webinar, you will discover:

    • Benefits of empowering both frontline and back office workers with the tools to improve their paper-based workflows
    • Power of user analytics when attempting to drive measurable and lasting change
    • Success stories powering this new ‘Frontline-First’ approach to workflow improvement
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer Jun 19 2019 4:00 pm UTC 60 mins
    In this quarterly update webinar, Uptime Institute Intelligence and technology executives discuss developments in the field of mission-critical digital infrastructure. Among the topics are recent outages; cloud expenditure; fuel cells and datacenters; the technology “cold war”; and climate change and infrastructure.
  • Tradeshift Pay Deminar
    Tradeshift Pay Deminar
    Jeff Green and Patrick Massar from Tradeshift Jun 19 2019 5:00 pm UTC 60 mins
    Join us for a live demo of the Tradeshift Pay platform. During this demo, you will learn how to:

    - Connect to your suppliers in days
    - Eliminate manual processes through digitization
    - Speed up processing time through increased collaboration
    - Take advantage of a network of banks and suppliers that want to do business with you
    - Manage and increase working capital

    Save your seat!
  • How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    David Linthicum, Radhesh Menon Jun 19 2019 5:00 pm UTC 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in cloud computing, storage, containers, and hybrid cloud to discuss how Google’s recent hybrid-cloud strategy Anthos announcement at Google Next ’19 changes production outlook for your IT and DevOps teams.

    Featuring GigaOm Analyst, David Linthicum and a special guest from Robin.io, Radhesh Menon, this webinar will explore Google's Hybrid-Cloud strategy Cloud’s Anthos announced at Google Next, and how that technology can change your outlook on both development and ability to modernize Stateful applications.

    Storage for stateful containerized applications is a fundamental building block of applications on hybrid clouds, leveraging containers, container orchestration, and other parts of that emerging ecosystem. While the focus for container-based applications has been stateless, the ability to maintain state both within and between containerized applications has been a core requirement that DevOps and IT. Attend this webinar to take the mystery out of running stateful applications in containers and managing using Kubernetes with Google Cloud can enable hybrid- and multi-cloud strategy through its new solution, Anthos.

    In this 1-hour webinar, attendees will:

    • Better understand the state of the technology, and what container native storage solutions bring to modern IT.
    • Understand Google Hybrid and multi-cloud strategy and explore new solutions that have just been announced, that may change the game in how you build, deploy, and operate containers.
    • Learn how to hide complexity, while providing and maintaining richness of capability.
  • The Cyber Skills Gap: A Practitioner’s Perspective
    The Cyber Skills Gap: A Practitioner’s Perspective
    Stanley Parret, Principal Consultant, FireEye Managed Defense Jun 19 2019 6:00 pm UTC 60 mins
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • A Review of Cyber Resilience -- Past, Present, and Future
    A Review of Cyber Resilience -- Past, Present, and Future
    Rob van der Ende, VP APJ, FireEye Mandiant & Naureen Rasul, Head of Cyber Practice Asia, Marsh Pacific Jun 20 2019 6:00 am UTC 60 mins
    Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions

    Join us as we discuss three strategic imperatives to strengthen cyber resilience:
    • Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
    • Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
    • Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.

    While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
  • Help, my users have been hacked! What happened and how do I respond?
    Help, my users have been hacked! What happened and how do I respond?
    Vinoo Thomas, Product Line Manager, FireEye Jun 20 2019 10:00 am UTC 45 mins
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
  • Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Rick van der Lans, Independent Analyst, R20/Consultancy & Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Jun 20 2019 10:00 am UTC 60 mins
    Digital transformation, the data economy, and becoming more data-driven are the current themes of boardroom discussions. Data is very valuable to organizations and their business users as long as it’s accessible, timely, consistent, trusted, adaptable and actionable, among a list of other things.

    However, most organizations are dealing with data silos. Data is hidden inside databases, data warehouses, excel spreadsheets, and files; and, it’s stored on‐premises and in private and public clouds, often times across the globe. Therefore, it is not only time-consuming but also very costly to locate the required data, extract it from the system, integrate it, and turn it into meaningful, consistent and trusted information.

    -How can you improve data delivery and extract value from your data?
    -How can you make your data available and actionable in real-time?
    -How are other organizations dealing with this data challenge?

    In this webinar, we will explore data virtualization as the solution that fulfills all modern requirements for data delivery by looking at various customer case studies. Our speakers will discuss the challenges that hold organizations back from accessing their data and becoming data-driven. By taking you through real use cases, they will demonstrate how data virtualization has helped multiple organizations address their data challenges and create significant business benefits.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, Cloud CTO, FireEye Jun 20 2019 1:00 pm UTC 55 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Deploying Hyper-Converged Infrastructure (HCI) to Modernize IT
    Deploying Hyper-Converged Infrastructure (HCI) to Modernize IT
    Myank Gupta, Phil Sellers, Ray Lucchesi, Steve Ginsberg Jun 20 2019 2:00 pm UTC 60 mins
    This free 1-hour webinar from GigaOm Research brings together experts in hyper-converged architecture (HCI) and data center infrastructure and administration to explore how enterprise leaders are using HCI to modernize data center infrastructure and prepare it for public cloud co-existence.

    Featuring, Mayank Gupta, Product Marketing Lead, Core HCI, at Nutanix, the discussion will be moderated by GigaOm Analyst Ray Lucchesi and includes GigaOm analysts, Phil Sellers and Steve Ginsberg. Many data center managers are struggling with infrastructure sprawl, adding servers and storage to address never-ending, application requirements. But for many, this is a symptom rather than a solution. Resource utilization is typically abysmal in most non-virtualized data centers. Modernizing a data center with HCI has the potential to drastically improve utilization, reduce complexity and provide a platform that can better co-exist with public cloud.

    In this 1-hour webinar, the team examines:

    • How employing HCI software-defined infrastructure can modernize the data center
    • How the use of HCI can increase resource utilization and reduce complexity across the data center.
    • How to build HCI in the data center and public cloud to co-exist with and support IT application needs.

    Participants will come away with a better appreciation of how HCI can help modernize the data center while at the same time improving utilization, reducing complexity and bringing about a data center better able to co-exist with public cloud.
  • How FireEye Protects FireEye
    How FireEye Protects FireEye
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye Jun 20 2019 4:00 pm UTC 60 mins
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Strategies for the Data Warehouse in the Enterprise Today
    Strategies for the Data Warehouse in the Enterprise Today
    William McKnight, Paige Roberts Jun 20 2019 5:00 pm UTC 61 mins
    This free 1-hour webinar from GigaOm Research brings together experts in modern uses of data warehousing. Featuring GigaOm Analyst William McKnight and a special guest from Vertica, Paige Roberts, the presentation will focus on strategies enterprises should be undertaking today for evolving data warehouse ecosystems.

    Despite the allure and utility of other analytic data constructs, enterprises continue to invest the most in, and get tremendous benefit from, great data warehouses. The data warehouse is still the key component of the actionable analytic future. However, the data warehouse of today is used differently, can accomplish new things, and requires different technical and business strategies to get the most out of it, than before.

    In this webinar, McKnight dives into the current state of data warehouse initiatives. He discusses how implementation realities of the last two decades have demonstrated the importance of the data warehouse, and why enterprise leaders must think differently about data warehousing as a whole.

    In this 1-hour webinar, attendees will discover:

    • The state of the data warehouse today and strategies to maximize the return on data warehouse investments of 2019 and beyond.
    • The flavors of the data warehouse and the criteria for ensuring your data warehouse(s) is up to standard
    • Key considerations when building a new data warehouse, evolving an existing data warehouse, or contemplating a re-platforming.
    •The continued relevance of data warehousing today
    •How to know when to put your data warehouse in contain mode
    •Ideas for data platform selection for a data warehouse
  • Perfect Partners: DevOps and Hybrid Cloud
    Perfect Partners: DevOps and Hybrid Cloud
    jon Collins, Chris Merz, Ingo Fuchs Jun 20 2019 6:00 pm UTC 62 mins
    This free 1-hour webinar from GigaOm Research brings together experts in DevOps and Hybrid Cloud, featuring GigaOm Jon Collins and special guests from NetApp, Ingo Fuchs, Chief Technologist, Cloud and DevOps, and Chris Merz, Principal Technologist, DevOps. The discussion will focus on delivering DevOps and the challenges faced when adopting this culture.

    Not only do organizations find it challenging to scale DevOps practices across the business, it’s also hard to keep pace with the fast, real-time needs of application development. As companies face the reality of the pace required for software development, they’re simultaneously challenged to balance quality and security, governance and management, complexity and collaboration, and they require an agile storage strategy to allow them to pivot as needs change.

    Should such organizations just go back to waterfall models and single-server, three-layer architectures? Of course not. The right approach allows them to pick and choose the right infrastructure, whether it be in the cloud, or on-premises, to deliver the right solutions for their business needs - all without affecting their developer experience. In this webinar, we talk to NetApp, itself a large enterprise using both DevOps and hybrid multi-cloud strategy, about lessons learned from helping customers towards this goal.

    In this 1-hour webinar, attendees will discover:

    • The challenges faced by organizations looking to adopt DevOps
    • What this means in terms of symptoms, costs, efficiency and effectiveness impacts
    • Best practices for supporting software development
    •What tools, technologies, and processes enable DevOps to exist, no matter your storage strategy
    •How to choose the right infrastructure for your strategy
  • On-Ramps to Cloud Roadways: Cloud Data Migration at Scale
    On-Ramps to Cloud Roadways: Cloud Data Migration at Scale
    Andrew Brust, Jagane Sundar Jun 20 2019 8:00 pm UTC 62 mins
    Cloud adoption is in full swing, no longer dominated by hype and just a few early adopters. In the world of data analytics, migrating data from on-premises distributed storage systems to cloud object storage is the mission. Once the data has landed there, multiple data services can query and analyze it. The payoff can be huge, but the devil’s in the details.

    While the problem of migrating applications to the cloud has largely been solved, migrating data is much less straightforward. Today’s enterprise data volumes can be quite large, resulting in long-running data migration processes. Enterprises can’t just hit pause on their businesses, though. So how can they maintain operational continuity while conducting lengthy migrations?

    To learn more about cloud data migration challenges and solutions, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guest Jagane Sundar from WANdisco, a leader in cloud data movement and hybrid data lake solutions.

    In this 1-hour webinar, you will discover:

    How to migrate Hadoop clusters at scale
    The realities of cloud data migration management
    The multi-data-engine benefits of cloud data lakes
    Register now to join GigaOm and WANdisco for this free expert webinar.

    Who Should Attend:

    CTOs
    Chief Data Officers
    Cloud Architects
    Data Engineers
    Database Administrators (DBAs)
  • Five Secrets to On-Prem Kubernetes for Real World Enterprise IT Needs
    Five Secrets to On-Prem Kubernetes for Real World Enterprise IT Needs
    David Linthicum, John Mao Jun 21 2019 2:00 pm UTC 56 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Kubernetes on-prem ops success, featuring GigaOm Analyst David Linthicum and special guest John Mao, VP Business Development from Stratoscale.

    You don’t have to read all of the analyst surveys to understand that Kubernetes usage is accelerating in 2019. Indeed, while the growth in the cloud is exceptional, the growth in leveraging Kubernetes on premises is just as impressive.

    However, many enterprises with a need to deploy Kubernetes in their data center are left out in the cold. Tools that focus on Kubernetes on-prem don’t provide the value IT is expecting, and thus their Kubernetes on-prem ops are at risk of failing.

    Enter new tools and approaches that can ensure success. Moreover, enter in new guidance that allows leaders to approach the problem armed with the right knowledge.

    Indeed, five core secrets exist to approach on-prem ops, including, deployment, monitoring, security, upgrading, and of course scaling.

    In this 1-hour webinar, we will explore:

    • Why approaches to Kubernetes success are changing.
    • Emerging best practices and technology.
    • Five secrets of Kubernetes enabling containers orchestration that most enterprises and cloud providers need for success
    •Must-know keys to enabling successful technology