The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.
In this case study we will cover:
• How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
• How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
• Best practices for investigating and responding to similar attacks.
85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
This webinar will discuss some of the latest deployments, trends, pricing and advances in the CDN market for commercial CDNs and telco/carrier CDN buildouts.
Why you should Attend:
- Learn the latest data on the size of the content delivery market for video.
- Find out growth forecasts for both revenue and traffic volumes.
- Hear about the market drivers and trends that will determine the future of the CDN market.
Extend the reach of your Service Desk to your Mobile Support Teams.
Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.
We know that service desk technicians can’t always be tied to a desk.
As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.
Register today to hear how HEAT Mobile Field Service can:
•Empower your technicians
•Lower service costs
•Improve response times
Missed our LIVE webcast?
Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.
In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.
Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.
Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
How many logs files do you have?
• Ever use them?
• Wonder what they might contain?
• Are they lying around unexploited, cropped or deleted to save space?
• Do you ever try to exploit all the log data your systems produce?
• Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?
HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.
In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.
The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.
Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.
•Office-optimized dimensions, acoustics, and security
•Scalable, integrated shared storage to harness data explosion
•Simplified systems management
•Simplified networking to fit small business budgets
•Highly available and easy to service
•Flexible installation with both rack and standalone options.
Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
• Consortia network infrastructure
• Wired and wireless network capabilities
• Robust network security
• Network support readiness
• Juniper Networks network infrastructure readiness resources
Dell et le Centre de Calcul IN2P3/CNRS, centre majeur de l’infrastructure de calcul de la recherche française, s’associent afin d’anticiper les futures évolutions technologiques. Collaboration bidirectionnelle, le CC-IN2P3/CNRS et Dell prolongent ainsi les échanges initiés en 2005 et leur offrent un cadre favorable à un rapprochement des compétences dont le résultat pourra bénéficier à l’ensemble de la communauté du calcul scientifique.
Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
In this session we'll cover:
What you need to know about the Heartbleed vulvnerability
How to detect it using AlienVault USM
How to investigate successful Heartbleed exploits
Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.
This webinar will cover:
- The latest features and trends from OpenStack Icehouse
- Updated growth metrics from the OpenStack community
- Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?
In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."
This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.
Register today and gain insight into:
- Building OpenStack-powered private clouds
- Private and public cloud interoperability
- Managing your hybrid cloud with an eye to the future
- Lessons from the field; what works and what doesn't
The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.
This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
Scientists at CERN deployed PowerEdge C class servers to increase computing power and process data from the CMS experiment at the world-famous Large Hadron Collider (LHC) as they searched for the Higgs boson.
"Technology underpins everything at the Glasgow 2014 Commonwealth Games, and Dell plays an integral part, providing an end-to-end solution comprising all of the laptops, desktops, servers, storage and services we need"
Brian Nourse, Chief Information Officer, Glasgow 2014 Commonwealth Games, United Kingdom
As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.
Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.
Attend this webinar to learn about:
• The various types of POS malware threats and the implications of experiencing an attack
• The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks
• Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
Today, data drives discovery. And discoveries create are key to creating sustained advantages. The better your critical workflows are able to create and access data – the better you’ll be able to discover new, innovative solutions to important problems, or to create entirely new products. More than ever before, data intensive applications need the sustained performance and virtually unlimited scalability that only parallel storage software delivers.
Designed for maximum performance and scale, storage solutions powered by Lustre software deliver the performance at scale to meet today’s storage requirements. As the most widely used parallel storage system for HPC, Lustre-powered storage is the ideal storage foundation.
But scalable performance storage by itself only solves half the problem. Today’s users expect storage solutions that deliver sustained performance, scale upward to near limitless capacities, and are simple to install and manage. Intel(r) Enterprise Edition for Lustre* software combines the straight line speed and scale of Lustre with the bottom line need for lowered management complexity and cost.
As the recognized leaders in the development and support of the Lustre file system, Intel has the expertise to make storage solutions for data intensive applications faster, smarter and easier.
Businesses in the Financial Services sector are some of the most obvious targets for cyber-attacks. After all, “that’s where the money is.”
And recent technological advances have brought about the dark side of innovation – the ability of criminals to stealthily attack users and businesses in new ways. Hence, financial institutions around the world are even more at risk to breaches and cyber-attacks than ever before. Are financial institutions in Asia Pacific ready for these threats? What are the areas that financial services should look into for continuous threat protection?
Bryce Boland will touch on these issues in this webcast; bringing insights from his experience as a former Security CTO in the financial sector.
Topics that will be covered are:
1.The Dark Side of Innovation
2.Recent FSI breaches
3.Enterprise Threat Report on FSI
4.FSI Supply Chain Risks
5.Managing Advanced Threats
6.Questions & Answers
This webinar is for both business and IT professionals, interested to have a better understanding of the current state of cyber risks in the financial sector, and how to manage these risks.
Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware presents a hatful of challenges that your infrastructure team might not have thought about.
In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:
(a) Introduction to scalability techniques: clouds from a hardware perspective.
Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.
(b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.
Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.
You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware.
This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).
Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.
Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
- Big data and its implications for network monitoring and forensics
- Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
- How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
- How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
• How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
The performance of databases often slows as data and business grows, users find new and demanding ways to leverage applications, and those applications mature and expand in functionality. Whenever a key database slows down, SQL or NoSQL, the business damage can be widespread and it usually becomes a high priority effort to remediate.
At Taneja Group we’ve noted 5 major ways that IT operations can improve database performance, including a couple of quick and ready ideas that impose little risk or cost. In this 30 minute webcast, we'll look at why IT operations often gets the responsibility for database performance, and the IT-centric options they can pursue.
Mike Matchett brings to Taneja Group over 20 years experience in managing and marketing IT datacenter solutions particularly at the nexus of performance, capacity and virtualization. Currently he is focused on IT optimization for virtualization and convergence across servers, storage and networks, especially to handle the requirements of mission-critical applications, Big Data analysis, and the next generation data center. Mike has a deep understanding of systems management, IT operations, and solutions marketing to help drive architecture, messaging, and positioning initiatives.
Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.
Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.
HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
See the big picture in Big Data. A customer service call can transform an internal process. Understanding Tweets and Likes can lead to improved product design. Previously unconnected data can reveal patterns and relationships so you can jump on more opportunities. The moment to tap the full potential of Big Data is now.
HP HAVEn is a Big Data platform that analyzes 100% of the data relevant to your organization. HAVEn delivers the analytics services & engines to exploit data from any source, and the services and solutions to reshape your IT infrastructure to realize the value of your data.
Attend this webinar to learn about HP’s Big Data platform and hear how HAVEn users are now able to know their customers better, to design better products, and to run their operations more efficiently.
When you have 100% of your data informing every decision, anything else is just an educated guess.
Save time, money and trouble in your fiber optic networks
In today’s competitive marketplace, where customer loyalty and retention is at risk, service providers need to maintain a high level of service and network reliability on a tighter budget.
In addition to negotiating the best prices on fiber/cable, infrastructure, transmission and test equipment on a day-to-day basis, solving network weaknesses is yet another way to reduce operation costs.
Join EXFO for a 40-minute webinar exploring the differences between a poor-quality network as compared to a solid and efficient network―and most importantly, how to optimize your own network efficiency.
Check out the list below for a sampling of the topics that will be discussed during this webinar.
• Fiber-optic Achilles’ heel: poor connections
• A stressed network is not a good network: learn how to detect macrobends before they kill services
• No plug and pray: qualify your fiber for high-speed upgradability
• Fiber break—it happens, but how quickly can you react?
• The quest for margin: optimize your OSNR for a few extra dBs that will make a difference
Today in order to remain competitive, there is a tremendous demand on lines of business to be able to analyze more aspects of business data and do this very quickly. There is a control shift to the business analyst so they can analyze what they need to, NOW!
Big Data requirements are also emerging, even as everyone is being asked to accomplish more with less. Join us to learn how the combination of DB2 10.5 with BLU Acceleration and Cognos BI 10.2 can help bring sanity to satisfying these ever increasing demands.
We will provide an overview and technical deep dive of DB2 10.5 with BLU Acceleration, Cognos BI 10.2 and Dynamic Cubes. Join experts from the DB2 and the Cognos BI teams who will also explain how these two offerings fit together and the benefits they have provided to clients already. See the value that DB2 with BLU Acceleration can bring to Cognos BI, and ask these experts your questions, so you can understand how this solution helps solve business challenges.
Join us for a 30 minute webcast on May 1st, 2014 and learn how EMC Isilon provides an efficient and scalable storage solution to help manage unstructured data growth. Isilon’s scale-out NAS platform, in conjunction with the OneFS OS, provides a highly reliable and efficient infrastructure that easily scales in both capacity and performance.
In this free webinar, we'll show you how you can:
- Provide access to data anytime, anywhere, and from any device
- Use data analytics to gain new insight that can accelerate your business
- Maximize cloud-based capabilities for greater efficiency and flexibility
- Scale capacity and performance easily and as needed – with no change in an administrator's time or efforts as storage grows
Don't miss out on this opportunity, we look forward to having you attend!
Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.
1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
2)Leverage McAfee ePO to automate DLP policies based on situational awareness
3)See how McAfee DLP and ESM work together to provide real-time data protection
You may have heard that Dell has launched a new member of its disk based backup family, the DR6000 as well as a new version of the DR OS firmware v3.0.
Join us on this webinar to learn more about this ground-breaking new solution that delivers a stunning 22TB per hour ingest performance, more than twice that of competitor solutions in this space.
The DR6000 is a new high-performance, high-capacity deduplication appliance that enables source and target based inline deduplication and compression as well as WAN-optimized replication for fast disaster recovery.
The DR OS 3.0 includes new functionality for Global Management and support for Bridgehead and Acronis backup software applications as well as adding support for AppAssure 5.x as an archive target.
In addition, those of you with an eye on NetVault 10 or vRanger 7 (both due soon) will be please to hear that the DR6000 will enjoy tight integration with both. At 22Tb per hour and up to 512 RDA connections the combined solution of NetVault 10 and DR6000 will provide greater scale than ever before.
What would the DR6000 deliver for your business?
22TB/hour with source dedupe over NFS or CIFS
The DR6000 provides up to 180TB of usable storage capacity (240TB raw capacity). Utilising Dell’s industry leading deduplication and compression technologies, you will be reducing backup storage capacity by 15X on average providing a logical capacity in excess of 3PB.
With all inclusive licensing, there are no hidden costs for premium features. The DR6000 includes a new set of plug-ins including Rapid NFS and Rapid CIFS – the industry’s first source side deduplication for NFS/CIFS backups. As the majority of businesses use CIFS or NFS for backup and recovery operations and currently none of our competitors have this feature, if you’d like to learn more, please join us!
This analyst briefing will give an industry outlook on TV-Everywhere in the Middle East.
Why you should attend:
·Discover why the Middle East is optimal for growth of multi-screen video distribution
·Learn how consumers will turn to video-capable, Internet-connected devices by 2020
·Find out how content creators are seeking ways to distribute the content to multiple platforms
This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).
Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.
Gordon Beith, Director of Product Management at VSS Monitoring, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
• Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
• Metadata versus flow statistics versus full packet capture – considerations and use cases for each
• Open versus proprietary formats for storage
• Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
• Addressing retrieval in an “open” forensics model
• Leveraging a distributed computing framework for processing large-scale data stores
We are constantly reminded by the media of the real and potential threats of attacks. Any organization can be the target of an Advanced Persistent Threat (APT). Even those that may not consider themselves a target need to take into account the fact that information such as customer data, partner data, employee data, merger and acquisition activity, and resources shared with others may be targeted in an attack. Additionally, organizations must recognize that security weaknesses in their environment could be used as a base of attack against customers or business partners who may have information that is valuable to APT attackers.
The NTT Global Threat Intelligence Report analyzed three billion attacks over the course of 2013 and has revealed valuable information, trends and insights surrounding APTs. The report emphasizes advanced techniques to detect, investigate and respond to the threats we face.
Join this webinar where you will learn more about the practical steps organizations are taking to create a rational, proportional approach to tackle attacks. In this fast-paced, informative webinar, we will highlight report findings including:
- Incident response case studies and their financial impact on the victim organizations
- Information organizations can use to improve their operational security
- Proper implementation, management and adjustment of proven control
Don’t miss this opportunity to learn how to help reduce risk by avoiding threats and compress the mitigation timeline, significantly reducing loss exposure.
How to map the Ideal Authentication Solution to your IT Environment
Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.
Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.
Then we will discuss:
•Current market trends around collaboration, cloud and security
•Vulnerabilities associated with unsecured file sharing tools
•The role of strong authentication in securing collaboration and file sharing tools
•Authentication Case study
Choosing the best network security solution for your organization can be complicated. Many organizations turn to third party analysts, each offering their unique perspective and insight, to help narrow the choices. However, their different viewpoints and methodology can make it difficult to understand.
Nat Smith, Director of Network Security at McAfee, will discuss NSS Labs' 2014 Security Value Map for Data Center Intrusion Prevention Systems (IPS) and also touch on other third party analysts reports on IPS, each with a keen value when understood in context.
McAfee and Norse present: Combating Advanced Cyber Threats with McAfee Global Threat Intelligence (GTI) and Norse Dark Threat Intelligence
Threat intelligence is a critical tool in the never-ending struggle to protect the world’s networks, but many threat intelligence solutions lack visibility into the parts of the Internet where bad actors operate—the darknets. As the effectiveness of these solutions declines, organizations are exposed to increased risk of security breaches, data ex-filtration, and loss of reputation and revenue from today’s advanced cyber threats.
McAfee and Norse have developed an integrated threat intelligence approach leveraging the strengths of McAfee GTI along with Norse’s unique ability to provide visibility into the darknet and dark web. This integration of McAfee Network Threat Response Cloud Analysis and Deconstruction Services with Norse IPViking provides the strongest web-based reputation protection available against botnets, distributed denial-of-service (DDoS), and advanced persistent threats. When combined in an automated fashion with machine-to-machine interface, users now have a single-pane-of-glass with rich context to track new organizational threats not detected through traditional means.
Join McAfee and Norse to learn about:
•The value of Dark Threat Intelligence and its role in preventing compromise and data breaches
•Threat intelligence-based strategies for advanced threat prevention and detection
•Using threat intelligence to streamline and improve the incident response process
As enterprises increasingly deploy cloud-based solutions, cloud interoperability has become a critical business issue, one that end users are requiring from cloud storage vendors. The SNIA Cloud Data Management Interface (CDMI) is an ISO/IEC standard that offers end users simplicity and data storage interoperability across a wide range of cloud solutions. The newly launched CDMI Conformance Test Program (CTP) tests for conformance against the specification and provides purchasers of certified cloud storage solutions the assurance that these solutions meet CDMI interoperability standards. This live Webcast details the benefits of the CDMI CTP program and explains how any cloud storage vendor can begin the CTP process.
Data centers are being transformed with server virtualization, cloud computing, and software-defined networks. As your business consolidates servers and data centers, and extends workloads into hybrid and public clouds, how can you ensure data is properly isolated in multi-tenant environments? How do you provide broader access for mobile devices and BYOD while avoiding unauthorized exposure of corporate resources?
Warren Wu, Senior Director of Product Marketing for Data Center at Fortinet will discuss:
- Network visibility challenges in private and public clouds
- North-south vs east-west topologies for virtual switch traffic
- Physical vs virtual firewalls and security appliances
- Managing security in the cloud and from the cloud
- Four key considerations for architecting network security for the cloud
This session will cover the integration between Cisco Prime Service Catalog and Red Hat OpenShift. The result of this partnership is a new innovative tool that enables end users to order and take delivery of fully configured application stacks from a unified self-service portal. In this session you will learn:
•What is an application blueprint and how it enables automated deployment of application stacks in a consistent manner
•How Cisco Prime Service Catalog delivers a single pane-of-glass for all users to provision, configure and manage complete application stacks
•How configure complete application stacks including the underlying components such as network services
•Auto-scaling and load balancing capabilities of this solution relieve developers of the need to recreate platform services for each application