Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Breaking through I/O Bottlenecks for Faster Financial Outcomes
    Breaking through I/O Bottlenecks for Faster Financial Outcomes Matt Meinel and Rick Walsworth Recorded: Oct 18 2018 51 mins
    In order to deliver immediate value back to the business, it’s critical to ensure that an organization’s financial systems are running at full strength, but in most cases, I/O bottlenecks throttle performance and delay analytic outcomes. Vexata and Levyx have collaborated on a joint solution that achieves increased performance with less infrastructure, resulting in a 300% improvement in the price/performance ratio over the industry's next best alternative solution. In this webinar, you’ll learn:
    •How to utilize the Levyx low-latency software and Vexata’s NVMe-based storage systems
    •Best practices to eliminate bottlenecks for tick-analytics, strategic back-testing, algorithmic modeling, etc.
    •Real-world results from customer trials and the recent STAC A3 test benchmarks


    Presenters:
    •Matt Meinel, Senior Vice President of Solutions Architecture, Levyx Inc.
    •Rick Walsworth, VP of Product & Solution Marketing at Vexata
  • Let's talk about Cyber-security Standards of Practice with Fred Cohen
    Let's talk about Cyber-security Standards of Practice with Fred Cohen Fred Cohen, PhD. CEO of Management Analytics, Recorded: Oct 18 2018 79 mins
    This webinar, hosted by ITPG Secure Compliance and Certification Training, will be a practitioner oriented conversation about the latest Cyber-Security Standards of Practice and adoption models for CEOs and Information Security professionals . We will be joined by our guest contributor, Fred Cohen.

    Fred Cohen, in the mid 80s, created a Protection Posture Assessments methodology. It is available as open source in all.net and presents the Options and Basic components of standards of practice for enterprise information protection. The model provides overarching and specifics surrounding what we currently view as a reasonable and prudent approaches to addressing information protection for enterprises.

    ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Fred Cohen, to answer key questions for CTOs, CISOs, CIOs, Security Engineers, Analysts, and all other stakeholders interested in the topic of Cyber-security best practices.


    Fred Cohen has a long history of being ahead of the curve. He first defined the term "computer virus" and the invented most of the widely used computer virus defense techniques, led the team that defined the information assurance problem as it relates to critical infrastructure protection, did seminal researcher in the use of deception for information protection, is a leader in advancing the science of digital forensic evidence examination, and has been a top flight information protection consultant and industry analyst for many years. Along the way, he has started, grown, exited, and assisted in scores of companies, including Advanced Systems Protection, Mangement Analytics, Fred Cohen & Associates, Security Posture, The Radon Project, Fearless Security, TechVision Research, the Monterey Incubator, Can Do Funds, Angel to Exit, and many others.
  • Search and destroy hard to detect security risks
    Search and destroy hard to detect security risks Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Oct 18 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Using Cloud Content Management to Improve Your Content Workflow
    Using Cloud Content Management to Improve Your Content Workflow Rand Wacker, VP of Product Marketing, Box Recorded: Oct 18 2018 43 mins
    Digital transformation is driving organizations to rethink the way they work. Businesses are under intense pressure to quickly swap old processes for new ones and do more with all the content that's the lifeblood of the business.

    Watch this webinar to learn how to effectively and securely manage your content flow with Cloud Content Management. We'll show you how easy Box makes it to collaborate from anywhere, simplify and streamlines processes, and securely integrate with existing applications — all from a platform that provides native security, governance and compliance.
  • How to Detect Cryptomining in your Environment with AlienVault
    How to Detect Cryptomining in your Environment with AlienVault Danielle Russell, Group Product Marketing Manager & Amy Pace, Principal Product Marketing Manager | AlienVault Recorded: Oct 18 2018 60 mins
    Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals.

    Join this webcast to learn:

    - The what, why and how of cryptomining
    - How cryptomining can evade traditional antivirus and other security controls
    - Best practices and essential tools for detecting cryptomining quickly
    - How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity

    Speakers: Danielle Russell, Group Product Marketing Manager
    Amy Pace, Principal Product Marketing Manager
  • Supermicro® Resource-Saving Architecture Overview
    Supermicro® Resource-Saving Architecture Overview Michael McNerney, VP, Software, Solutions and Networking Security, Supermicro Recorded: Oct 18 2018 40 mins
    IT managers are increasingly seeking out suppliers of high performance, cost-effective and energy-efficient Green IT products to primarily reduce skyrocketing data center operational costs, a large proportion of which are energy related costs. Supermicro’s Resource Saving Architecture continues our tradition of leading the market with Green IT innovation that provides TCO savings for our customers and helps reduce TCE – the Total Cost to the Environment. We have introduced an overall architecture that optimizes datacenter power, cooling, shared resources and refresh cycles by enabling the modular refresh of subsystems and using optimized extended life subsystems.

    In this webinar we will provide an intro to the key elements of this architecture and the benefits it provides including:

    • Disaggregated Server Architecture
    • Multi-node Power & Cooling
    • Resource Pooling
    • Rack Scale Management

    Join us to learn how Resource-Saving Architecture can benefit your datacenter deployment today.
  • Integrated Data Protection for Converged Infrastructure: Maximizing Value
    Integrated Data Protection for Converged Infrastructure: Maximizing Value Jeff Kato, Taneja Group; Shad Stark, Palmer College of Chiropractic; Jason Kahn, Dell EMC Recorded: Oct 18 2018 56 mins
    Dell EMC VxBlock 1000 incorporates all-in-one, high-performance, highly reliable data protection that is pre-tested, pre-validated and supported by Dell EMC. In this webinar, learn about the business value that Dell EMC Integrated Data Protection for CI customers have reported through interviews with Taneja Group. Jeff Kato (Senior Analyst and Consultant, Taneja Group) is joined by Shad Stark (Systems Architect, IT, Palmer College of Chiropractic) and Jason Kahn (Product Manager, Dell EMC Integrated Data Protection for CI).
  • Lenovo ThinkAgile SX for Microsoft Azure Stack – What’s new ?
    Lenovo ThinkAgile SX for Microsoft Azure Stack – What’s new ? Greg Kettmann, Product Manager, Software Defined Infrastructure, Lenovo Recorded: Oct 18 2018 50 mins
    Please join us as we discuss Lenovo ThinkAgile SX for Microsoft Azure Stack product enhancements.  Since it was introduced there have been many enhancements made available by leveraging Intel technologies.  In this session we’ll discuss all product enhancements with a focus on where Intel technologies have been critical and those solutions which are Intel Select certified. 
      
  • 人工智能在網絡領域的影響
    人工智能在網絡領域的影響 蕭松瀛, Nicholas Hsiao, FireEye 技術顧問 Recorded: Oct 18 2018 48 mins
    人工智能(AI)為企業提供了更好的方法來保護他們的系統,但它也為黑客提供了更好的方法來破壞這些系統。 企業需要了解AI在依賴網絡防御之前如何影響網絡安全。
    Nicholas Hsiao 北亞技術顧問將會討論有關人工智能系列的第二單元:
    •人工智能技術如何加強企業的防禦能力
    •網絡威脅如何利用人工智能提高攻擊的複雜性和範圍
    •FireEye如何使用機器學習來增強其內部防禦和工具
  • Data Virtualization: Key Foundation of a Cloud-First Strategy
    Data Virtualization: Key Foundation of a Cloud-First Strategy Kevin Moos, Eric Greenfeder, Jay Livens Recorded: Oct 17 2018 58 mins
    As more organizations adopt a cloud-first strategy, the task of migrating high-volume transactional workloads presents a unique set of challenges, particularly in handling the large amounts of data involved. Join Primitive Logic and Actifio as we discuss the most pressing challenges around transactional data migrations … and the solutions that can help address them.

    You will learn:
    The unique challenges in migrating transactional data to the cloud
    How to handle data for applications with both on-prem and cloud components
    How to approach transactional data as part of a multi-cloud strategy
    How data virtualization helps resolve issues of security, governance, multi-cloud coordination, and more
  • Namara powers your business with data access, management and integration
    Namara powers your business with data access, management and integration Brendan Stennett, Co-Founder & CTO, ThinkData Works Recorded: Oct 17 2018 38 mins
    Join the latest webcast in our Data Disruptors Series to see how Namara - a data management platform - uses collaboration and role management as fundamental pillars to give businesses greater visibility over structured data across multiple data silos, as well as access to the wider world of public open data.

    On this webcast you’ll hear from Brendan Stennett, Co-Founder & CTO of Toronto-based ThinkData Works on how the Namara platform:
    • Provides fine-grained access control to the right people in an organization so they can access the data they need to fuel the products and applications that are driving their business forward
    • Uses a proprietary data ingestion pipeline to make on-boarding data in a variety of formats a fast and painless experience
    • Leverages a unique data query engine to make integrating data into apps easy and flexible
    • Delivers world class query performance, powered by Vertica
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 17 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Have Your Search and BI Too: Big Data Analytics as Easy as Google Search
    Have Your Search and BI Too: Big Data Analytics as Easy as Google Search Matt Aslett, 451 Research & John Thuma, Arcadia Data Recorded: Oct 17 2018 58 mins
    For decades people have been talking about self-service BI and analytics to enable business users to make better decisions in organizations. Yet, the big data era (Hadoop, Spark, data lakes, and more) has seemingly pushed us in the direction of automation, machine learning, and AI. Are your business users left out? Do they still ask for more control over reporting and analysis? What if you could provide the simplicity of Internet search for ALL users on ALL of your data in the organization? What if you could do all of this and provide security and privacy with the full power of visual analytics?

    Join industry thought leaders from 451 Research and Arcadia Data on October 17th at 12 p.m. BST, 1 p.m. EET to learn about recent trends in big data analytics around natural language search, self-service, and AI-driven insights. In this webinar, you will learn:
    •Why modern analytical environments need to focus more on business users.
    •Why traditional BI approaches are falling short.
    •How new innovations like search-based BI are redefining self-service BI.
  • Why bringing communications (and not just your computing) into the cloud matters
    Why bringing communications (and not just your computing) into the cloud matters Global Cloud Solutions Specialist at Mitel Recorded: Oct 17 2018 49 mins
    The conversation about the transition to a Cloud-first world is often dominated by Cloud computing but business communications is one of the most affected areas of this transformation.

    The analyst firm MZA predicts that the value of the hosted cloud market will more than triple by 2022 to $7.2 billion worldwide with 2.5x growth in the number of Cloud users.

    IT leaders are increasingly having to do more with less while simultaneously turning their IT and communications infrastructure into something that drives growth. This is happening against a background of changing models of work and the need to continuously improve the customer experience.

    As part of a quest to make life easier for the IT leader of today we will explore why it’s important to also consider your business communications.

    - Why bringing your communications and not just your computing into the cloud matters
    - The relevance of cloud to improving the customer experience
    - How collaboration is boosted in a unified communications environment
    - What paths exist on your journey to the cloud including on-premises, hybrid and cloud

    Andy has a 25 year track record in business communications with a background in senior management roles in Marketing, Sales, and Pre-Sales consultancy. Today Andy leads Mitel Sales and Sales Engineering training initiatives throughout the EMEA and APAC regions.

    This broad experience has given Andy valuable perspectives (both technical and customer use based) for today’s IT and communications leaders and technicians.

    Andy has taken part in some major industry milestones including deploying the first high speed network for the Government and being the design authority on one of the world’s largest switch networks.
  • Five Trends in Real Time Applications
    Five Trends in Real Time Applications David Menninger, SVP and Research Director, Ventana Research + Joanna Schloss, Subject Matter Expert, Confluent Recorded: Oct 17 2018 60 mins
    Can your organization react to customer events as they occur?
    Can your organization detect anomalies before they cause problems?
    Can your organization process streaming data in real time?

    Real time and event-driven architectures are emerging as key components in developing streaming applications. Nearly half of organizations consider it essential to process event data within seconds of its occurrence. Yet less than one third are satisfied with their ability to do so today. In this webinar featuring Dave Menninger of Ventana Research, learn from the firm’s benchmark research about what streaming data is and why it is important. Joanna Schloss also joins to discuss how event-streaming platforms deliver real time actionability on data as it arrives into the business. Join us to hear how other organizations are managing streaming data and how you can adopt and deploy real time processing capabilities.

    In this webinar you will:
    -Get valuable market research data about how other organizations are managing streaming data
    -Learn how real time processing is a key component of a digital transformation strategy
    -Hear real world use cases of streaming data in action
    -Review architectural approaches for adding real time, streaming data capabilities to your applications
  • Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime
    Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime Daniela Fusaro, Senior Solutions Architect Recorded: Oct 17 2018 18 mins
    Ihr IT Netzwerk ist von entscheidender Bedeutung für den Betrieb, und das macht es zu einem beliebten Ziel für Cyber-Bedrohungen wie Ransomware und Verstöße gegen den Datenschutz. Was können Sie dagegen tun? Inline-Sicherheitstools können eine effektive Lösung sein, stellen aber mehrere mögliche Fehlerpunkte dar, zumal die Netzwerkgeschwindigkeiten steigen, und viele Tools sich diesen nicht anpassen können. Wenn diese Tools ausfallen, dann ist auch Ihr Netzwerk betroffen.

    Um eine umfassende Transparenz über die übertragenen Daten zu erhalten und die Compliance in Hochgeschwindigkeitsnetzen aufrechtzuerhalten, haben sich viele Firmen für die Next Generation Network Packet Broker (NGNPB) entschieden, die einen flexiblen Inline-Bypass-Schutz bieten. Diese Funktion automatisiert den Zugriff auf den Datenverkehr, skaliert und optimiert die bestehende Überwachungsinfrastruktur und vereinfacht die Einführung neuer Technologien. NGNPB bieten zudem Folgendes:

    • Vollständige netzwerkweite Transparenz in physikalischen, virtuellen und Cloud-Umgebungen,
    • Skalierbare Metadatenextraktion für verbesserte Forensik,
    • Isolierung von Anwendungen zur gezielten Untersuchung,
    • Sichtbarkeit für verschlüsselten Datenverkehr zur Erkennung von Bedrohungen.

    Erfahren Sie, wie Sie die Sicherheit erhöhen und gleichzeitig die Netzwerk-Uptime sicherstellen und so Kosten senken können. Erfahren Sie, wie eine vereinfachte, belastbare und skalierbare Architektur Folgendes leistet:

    Maximierung der Tool-Effizienz durch Bereitstellung der relevanten Daten für die relevanten Tools und durch das Auslagern prozessorintensiver Aufgaben wie der SSL-Entschlüsselung.
    Und mehr.

    Finden Sie heraus, wie sowohl Netzwerk- als auch Sicherheitsteams in einer sich schnell entwickelnden Cybersicherheitslandschaft schneller und sicherer arbeiten können.

    Network-Packet-Broker der nächsten Generation (NGNPB)
  • Intent Based Networking - What SDN Was Meant To Be
    Intent Based Networking - What SDN Was Meant To Be Mansour Karam Recorded: Oct 16 2018 60 mins
    Bloomberg Intelligence hosted Mansour Karam, CEO of Apstra to discuss next-generation networking technologies, with a focus on Intent-Based Networking. Watch this on-demand webinar featuring Woo Jin Ho, Bloomberg Intelligence Analyst, Networking, Semiconductors.
  • Secure and Successful Deployments of NSX: Extend Your Visibility with NETSCOUT
    Secure and Successful Deployments of NSX: Extend Your Visibility with NETSCOUT Ray Krug, Enterprise Solutions Architect NETSCOUT Recorded: Oct 16 2018 60 mins
    Making the decision to evolve to the agile NSX SDDC environment as part of your Digital Transformation initiative brings its own challenges of security design and application deployment; and is not without risk. This means that maintaining visibility to assure your business service into this new virtual, secure world is critical to migration success.

    Join Ray Krug, Enterprise Solutions Architect as he discusses how you can leverage NETSCOUT, a VMware Ready Certified Partner in Networking and Security for SDDC space, and your existing nGenusONE Service Assurance platform to extend continuous visibility of your micro-segmented environment, to assure the successful deployment and ongoing security and performance of services in your NSX environment.

    Key takeaways from this session:

    •The challenges faced by IT, DevOPs and Security in the NSX SDDC

    •How NETSCOUT can extend the visibility you already depend on with deployment in an NSX environment.

    •An example use case of application deployed in NSX being monitored by NETSCOUT

    •Demonstrate how NETSCOUT provides visibility for SDDC in NSX and beyond into the public cloud.
  • Why Accudata Relies on Citrix Cloud
    Why Accudata Relies on Citrix Cloud Vid Sista, Director of Technology Solutions Recorded: Oct 16 2018 24 mins
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.
  • Fly True: Aim for Cyber Readiness with Aviation-Specific Threat Insights
    Fly True: Aim for Cyber Readiness with Aviation-Specific Threat Insights Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Oct 16 2018 56 mins
    In a recent congressional hearing on “Understanding Cybersecurity Threats to America’s Aviation Sector,” Representative John Ratcliffe, stated “Cybersecurity is National Security.”

    As threat actors continuously seek to do malicious harm, cybersecurity must increasingly play a larger role in national aviation security to mitigate risks and solve for resilience. Join Christopher Porter, the chief intelligence strategist at FireEye, as he shares the topics he covered from his expert congressional testimony. This webinar will highlight:

    • Case studies focused on threats specific to the aviation industry, including insight on global disruptions FireEye analysts have observed
    • A unique perspective on program gaps that exist between federal, state and local government, and the private sector
    • Hidden dependencies in aviation, such as threats to critical infrastructure that can cascade into disruptions of aviation operations
    • Ways in which FireEye Threat Intelligence can help inform program strategy and investment prioritization

    Register Now
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 16 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Capital One Delivers Risk Insights in Real Time with Stream Processing
    Capital One Delivers Risk Insights in Real Time with Stream Processing Ravi Dubey, Senior Manager, Software Engineering, Capital One + Jeff Sharpe, Software Engineer, Capital One Recorded: Oct 16 2018 64 mins
    Speakers: Ravi Dubey, Senior Manager, Software Engineering, Capital One + Jeff Sharpe, Software Engineer, Capital One

    Capital One supports interactions with real-time streaming transactional data using Apache Kafka®. Kafka helps deliver information to internal operation teams and bank tellers to assist with assessing risk and protect customers in a myriad of ways.

    Inside the bank, Kafka allows Capital One to build a real-time system that takes advantage of modern data and cloud technologies without exposing customers to unnecessary data breaches, or violating privacy regulations. These examples demonstrate how a streaming platform enables Capital One to act on their visions faster and in a more scalable way through the Kafka solution, helping establish Capital One as an innovator in the banking space.

    Join us for this online talk on lessons learned, best practices and technical patterns of Capital One’s deployment of Apache Kafka.

    -Find out how Kafka delivers on a 5-second service-level agreement (SLA) for inside branch tellers.
    -Learn how to combine and host data in-memory and prevent personally identifiable information (PII) violations of in-flight transactions.
    -Understand how Capital One manages Kafka Docker containers using Kubernetes.
  • Renforcez la sécurité tout en garantissant la disponibilité du réseau
    Renforcez la sécurité tout en garantissant la disponibilité du réseau Yann Samama, Consultant Solutions de Sécurité Recorded: Oct 16 2018 53 mins
    Votre réseau est indispensable pour vos opérations et pour cette raison, il constitue une cible de choix pour les cybermenaces, telles que les ransomwares et les violations d’accès à vos données. Que pouvez-vous faire ? Les outils de sécurité inline peuvent constituer une solution efficace, mais présentent de nombreux points de défaillance, notamment lorsque les débits réseau s’accroissent, pour la simple raison que ces outils n’arrivent pas à soutenir le rythme de cette accélération. Mais s’ils deviennent inopérants, votre réseau peut le devenir aussi.

    Afin de fournir une visibilité complète des données en mouvement et de maintenir la conformité des réseaux haut-débit, de nombreuses entreprises du secteur des services financiers se sont tournées vers des collecteurs de paquets nouvelle génération (NGNPB) offrant une protection bypass en ligne flexible. Cette fonctionnalité automatise l’accès au trafic, adapte et optimise l’infrastructure existante, et simplifie le déploiement de nouvelles technologies. Les NGNPB permettent également de :

    • Fournir une visibilité complète à travers les environnements physiques, virtuels et cloud.
    • Extraire des méta-données de façon évolutive pour une informatique réglementaire améliorée.
    • Isoler des applications pour une inspection ciblée.
    • Donner une visibilité du trafic chiffré pour la détection des menaces.

    Découvrez comment vous pouvez renforcer la sécurité tout en garantissant la disponibilité du réseau et en réduisant les coûts. Apprenez comment une architecture évolutive, résiliente et simplifiée peut :

    • Maximiser l’efficacité des outils en acheminant uniquement les bonnes données vers les bons outils et en épargnant à ces derniers, les tâches gourmandes en ressources processeur, telles que le déchiffrement SSL.
    • S’adapter au débit croissant du réseau sans avoir à extraire et remplacer l’outil rendu obsolète grâce à l’équilibrage de la charge entre plusieurs groupes d’outils.
    Et plus.
    Inscrivez-vous dès aujourd’hui!
  • Cloud Capacity Management
    Cloud Capacity Management Jamie Baker, Senior Product Manager, Syncsort & Rich Fronheiser, Syncsort Recorded: Oct 14 2018 31 mins
    Many professionals within IT organizations think that since the advent of Cloud, capacity management is no longer needed and that it’s provided by the Cloud provider. Although it’s true that Cloud providers will provide you with all the capacity you desire, it’s not the same as managing that capacity – or the resulting bill! View the webcast to find out more about:
    - Planning a migration to the Cloud
    - Managing applications and services in the Cloud
    - Moving capacity management to the Cloud
  • How is IBN Different than SDN
    How is IBN Different than SDN Carly Stoughton, Sean Hafeez Recorded: Oct 11 2018 4 mins
    There is a lot of buzz around Intent-based networking (IBN), but there is still a lot of confusion about the difference between IBN and software-defined networking (SDN). Carly Stroughton and Sean Hafeez of Apstra discuss some of the issues with SDN and how IBN resolves them.
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Oct 22 2018 2:00 am UTC 75 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Oct 22 2018 6:00 am UTC 60 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • Your breach readiness master plan: take the sting out of a cyber attack
    Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Oct 22 2018 10:00 am UTC 60 mins
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019
    Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft) Oct 22 2018 5:00 pm UTC 60 mins
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Director of Product, Algosec
  • Evolving to an Intel-led Security Organization
    Evolving to an Intel-led Security Organization Nigel Gardner, MGM Resorts Intl., Joseph O’Laughlin, FireEye; Jason Tuininga, FireEye Oct 22 2018 6:00 pm UTC 60 mins
    Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter? Come hear from our experts about what threat intelligence can do for you, and hear from a FireEye customer who has made this journey, transforming its security operations to be intelligence-led.
  • Are you Ready to Handle a Cyber Crisis?
    Are you Ready to Handle a Cyber Crisis? Rob van der Ende, VP APJ, Mandiant, a FireEye company & Mimi Yang, Senior Foreign Legal Consultant Ropes & Gray Oct 23 2018 3:00 am UTC 60 mins
    How prepared are you and your organization to respond to a data breach?
    Executives and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise.

    Ropes & Gray and Mandiant have joined forces to help you evaluate your organization’s ability to respond effectively to a cyber incident before it occurs. The Tabletop Exercise uses gameplay techniques to assess your cyber crisis processes, tools and proficiency from legal, governance and technical perspectives. During the exercise, multiple scenarios based on real-world experience are simulated in a roundtable environment, allowing Ropes & Gray to provide concrete legal advice to your organization based on the results, including advice on potential enhancements to your organization’s cyber breach and incident response preparedness that Mandiant and Ropes & Gray identify through the exercise.

    About Ropes & Gray
    Ropes & Gray privacy & cybersecurity attorneys have advised and assisted clients in responding to cyberincidents of multiple shapes and sizes, including many of the largest incidents in history, and apply that extensive background to counsel clients on cybersecurity incident preparedness.

    About Mandiant
    Mandiant, a FireEye company, has over 14 years of near-daily interaction with organized, persistent attackers and threat groups around the world. Mandiant consultants spend hundreds of thousands of hours annually working with organizations of all sizes to remediate security breaches, identify vulnerabilities and provide guidance on closing security gaps.
  • From Inhibitor to Facilitator: Aligning Security to Cloud Processes
    From Inhibitor to Facilitator: Aligning Security to Cloud Processes Ronen Shpirer, Security Solutions Architect, Fortinet Oct 23 2018 9:00 am UTC 45 mins
    In a fast growing decentralised and heterogeneous cloud environment, security is often considered an inhibitor to the adoption of public cloud services. In order to become a facilitator for public cloud adoption, security must align itself to native cloud processes, consumption models and mentality.

    This session will provide an insight into the security technology foundations required to turn security into a public cloud adoption enabler.
  • Automate the Dreaded Task of Software Asset Management
    Automate the Dreaded Task of Software Asset Management Gary Paquette, CTO, Mike Schmitt, Sr Director Product Marketing, Karen Hutton, Sr Director of Marketing, at Nlyte Oct 23 2018 9:00 am UTC 31 mins
    Nlyte’s Gary Paquette uncovers how you can automate discovery, management, and reporting with Nlyte Software Optimizer agentless software.

    What you will learn from the webinar:

    - Organic installation and distribution of software
    - Lack of visibility in current and new deployments
    - Matching databases to physical and virtual
    - Reconciliation between required services versus installed
    - Inaccurate systems, too many systems and files
  • Migrating to the Cloud with Automation
    Migrating to the Cloud with Automation Omer Ganot, Product Manager, AlgoSec Oct 23 2018 1:00 pm UTC 60 mins
    83% of enterprise workloads will be in the cloud by 2020. Migrating the storage and compute is the easy part. Migrating the SECURITY is the part that you have to get right – unless you don’t care about outages and cyberattacks. Don’t struggle with application connectivity and management of cloud security controls. Automate the entire process and get it right.

    In this webinar, Omer Ganot, Product Manager at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Simplify Discovery and Change Management for Cloud and Container Environments
    Simplify Discovery and Change Management for Cloud and Container Environments Doron Orbach and Pulin Brahmbhatt, Micro Focus Oct 23 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest releases of Universal Discovery and UCMDB.

    The new releases offer advanced capabilities to discover and map services and infrastructure that are deployed on private and public clouds or in containers leveraging technologies such as Kubernetes and OpenShift.

    See how you can leverage your data in ITSM or cloud management processes either using Micro Focus suites or other tools that you already use.
  • Cloud Security Trends and Best Practices for 2019
    Cloud Security Trends and Best Practices for 2019 Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks) Oct 23 2018 3:00 pm UTC 60 mins
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Cyber Security Risk Management –New Methods to Gain Control
    Cyber Security Risk Management –New Methods to Gain Control Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray Oct 23 2018 3:00 pm UTC 60 mins
    Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

    This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

    Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

    • Security risks across the complete cyber attack lifecycle, not only detection and response
    • A simple and proven method for approaching the risk reality facing all organizations
    • The rising cyber security insurance market and how it will affect risk management efforts
    • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
    • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
    • Best practice exercises to test your incident response plan based on real-world experiences
    • Techniques for effectively reporting risk and capability needs to a Board-level audience
  • Automating your way past NFV complexity
    Automating your way past NFV complexity Paul Brittain, VP Product Strategy, Metaswitch Oct 23 2018 3:00 pm UTC 45 mins
    Network Functions Virtualization (NFV) is the future network architecture that almost all Telcos/CSPs desire. For many, though, it is proving an elusive goal despite the shift that IT made to cloud several years back. Network Functions are just another class of x86 workload, so why is this seemingly so hard?

    Much of the problem is due to treating NFV as purely an engineering challenge, characterized by chasing a “Telco Cloud” fit for all possible purposes. That is genuinely a tough project, but NFV will also impact many processes and people across your organization. Automation may appear to add yet more change to be managed, but it is actually key to making NFV attainable. This webinar will show how, with Cloud Native VNFs and an agile approach to Automation, you can clear both the technical and operational roadblocks on the path to a fully virtualized network.
  • 8 Essentials for SDI, Including Support for New Cloud Native Applications
    8 Essentials for SDI, Including Support for New Cloud Native Applications John Abbott of 451 Research and Jennifer Kotzen at SUSE Oct 23 2018 3:00 pm UTC 60 mins
    Moving to software defined infrastructure is all about getting rid of rigid system silos that can hold companies back from digital transformation, replacing them with more fluid resources that provide the flexibility and agility required to support a rapidly evolving mix of existing and new cloud native workloads. It’s the direction of travel for most enterprises and service providers alike. But how do you get there?

    451 Research has identified a core set of essentials for companies looking to become software-defined organizations. In this webinar we’ll examine these principles, explore their importance to IT decision makers, and look at the new cloud native workloads and modern DevOps processes that they enable. Join us to hear from John Abbott, co-founder and distinguished analyst at 451 Research and Jennifer Kotzen, Applications Delivery Solutions Team Lead at SUSE.
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Oct 23 2018 3:00 pm UTC 75 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • Secure Cloud Migration: Automated!
    Secure Cloud Migration: Automated! Jonathan Gold-Shalev, Director of Product (AlgoSec) Oct 23 2018 4:00 pm UTC 60 mins
    As their first big move into the Age of the Cloud, enterprises are rapidly migrating applications from on-premise data centers to the cloud to take advantage of agility, segmentation, scalability, flexibility, cost and other benefits.

    While migrating the storage and compute is pretty straightforward, migrating the SECURITY presents unique challenges that cause enterprises to struggle with application connectivity and management of the cloud security controls alongside their traditional firewalls in a secure and compliant way – and quickly.

    In this webinar, Jonathan Gold-Shalev, Director of Product at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Panel: Responding to Evolving Threats With People, Intelligence & Technology
    Panel: Responding to Evolving Threats With People, Intelligence & Technology Colin Connor, Director, AT&T; Jim Waggoner, Sr. Director, FireEye; Seth Summersett, Chief Scientist, FireEye Oct 23 2018 4:00 pm UTC 60 mins
    Ransomware, application exploits, advanced persistent threats, all put your data, customer information and intellectual property in more danger than ever, putting your company’s reputation and revenue at risk. Even if you are able to protect yourself against today’s threats, you cannot stand still. Threats and threat actors are constantly evolving. You need to understand how the threats are evolving and what you need to do to protect yourself.

    In this expert panel discussion with Colin Connor Director, Threat Intelligence and Cyber Forensics at AT&T, Seth Summersett, Chief Scientist at FireEye and Jim Waggoner, Sr. Director of Product Management for Endpoint Security at FireEye, learn how threats are evolving, how companies are becoming more proactive in the response to the threats and how technology is changing to provide greater protection, detection and response to the emerging threats.
  • Simplified Systems Management - Saving Resources Across Your PC Environment
    Simplified Systems Management - Saving Resources Across Your PC Environment Aaron Spencer, Product Marketing Manager, Client Manageability - Dell EMC Oct 23 2018 4:00 pm UTC 60 mins
    We know keeping end users productive is top of mind for IT, and that’s why good systems management is so important. But it can be difficult to stay on top of deployment, configuration, compliance and access.

    Dell can simplify it all for you. We’ve developed products and services that will keep your systems running at peak efficiency so you can spend time and labor on the more important and strategic parts of your business.

    Join us for this webinar to learn how Dell simplifies systems management, allowing our customers to save time, money and resources across their entire PC environment.

    Highlights include:
    • Streaming and automating with Dell Client Command Suite
    • How Intel vPro Out of Band integrates into the solution
    • Powerful new provisioning capabilities
  • Choosing a Gateway to Europe
    Choosing a Gateway to Europe Penny Jones, 451 Research & William Fenick, Interxion Oct 23 2018 5:00 pm UTC 60 mins
    Europe is seeing an influx of US organizations keen to establish or expand operations across the region for a diverse set of reasons. Many face challenges, from understanding new business cultures and data regulations and the service provider landscape, to knowing where IT should be best positioned to scale for new technology adoption. We surveyed 250 US organizations seeking entry into - or expanding across - Europe to get a deep understanding of the issues that could delay actions in Europe today. In this webinar, we will draw upon these results to discuss not only the challenges these organizations face but considerations that should be top of mind for companies wanting to simplify and futureproof rollouts across Europe, a market that provides great opportunity for those that can deploy their IT assets right.
  • Apple Device Management for Beginners
    Apple Device Management for Beginners Nick Thompson, Product Manager, Jamf Oct 23 2018 6:00 pm UTC 60 mins
    While some are already familiar with Apple device management, many of you are diving in for the first time and seeking guidance on ways to properly deploy, manage and secure the growing number of Mac, iPad, iPhone and Apple TV devices joining your environment. If you fall into the “I want help” camp, we are here for you.

    In our webinar, Apple Device Management for Beginners, we’ll teach you the basics and help you build, and ultimately master, your Apple management skills.
    You’ll learn:

    • What Apple services and programs are available
    • The stages of Apple lifecycle management
    • Best practices for infrastructure planning
  • Running Object Storage on a Single Server
    Running Object Storage on a Single Server John Bell, Sr. Consultant and Jamshid Afshar, Engineer Oct 23 2018 6:00 pm UTC 60 mins
    Massive scalability is one thing, but what if you want to run Object-Based Storage for a smaller shop? Can you start with a small hardware investment and run object-based storage on just one server? John Bell, Sr. Consultant, and Jamshid Afshar, Caringo Engineer, will explain how you can store, manage, search and deliver data with just one server, while maintaining the ability to scale out by simply plugging in additional servers as your data storage needs grow. They will explain how this “pay-as-you-grow” model can benefit organizations as they start to outgrow traditional SAN, NAS and Tape storage solutions.
  • The Double-Edged Sword of Cloud Security
    The Double-Edged Sword of Cloud Security Shashwath Hegde, Solutions Architect, APAC, FireEye Oct 24 2018 3:00 am UTC 60 mins
    In many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. Mandiant, the industry leader in incident response consulting, estimates that 15 percent of all of its incident response involves public cloud assets. So, if the cloud is more secure, why is it still getting hacked?

    In this session, we will discuss
    • the challenges in Cloud Security
    • how to design an effective strategy to tackle them