Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Cloud Bursting with One-Click Simplicity
    Cloud Bursting with One-Click Simplicity Karthik Balachandran, Technical Solutions Leader, Aviatrix; Chris Brown, Solutions Marketing Manager, Nutanix Recorded: May 17 2018 39 mins
    Using the public cloud for temporary or elastic workloads enables flexibility and agility to address today’s enterprise compute needs. Implemented correctly, a hybrid architecture assures cloud-like responsiveness that pleases end users while maintaining the procedures that any well-run organization needs. However, implemented poorly or left to individuals, it becomes a budgetary and security exposure, frustrating the user and putting the company at risk.

    Join Nutanix and Aviatrix and learn how Calm and Aviatrix’ Cloud Networking solution will simplify and automate the placement of applications and temporary workloads in to the Public Cloud (Amazon Web Services, Google Cloud Platform, and Azure). With Aviatrix and Nutanix the cloud becomes a seamless extension of your datacenter allowing you to use the cloud when it is needed and bring workloads back on premises where it makes sense. Learn how Nutanix and Aviatrix are making the cloud, and networking to it, as invisible as Nutanix has made virtualization and storage in your data center.
  • Facilitating Information Governance for Rapidly Scaling Datasets
    Facilitating Information Governance for Rapidly Scaling Datasets Jacques Sauvé, Director, NetGovern Partner Enablement & Ben Canter, Caringo Global Sales Director Recorded: May 17 2018 47 mins
    No organization wants to lose data or waste precious time searching for it when it is needed. And, we all know the costly ramifications of failing to comply with governmental regulations: HIPAA/HITECH, PCI, Freedom of Information Act, GDPR, and many more. Join Jacques Sauvé, IGP of NetGovern, a leader in Information Governance software, and Ben Canter of Caringo, secure scale-out storage, to learn how compliance with current, large rapidly scaling data sets requires tighter integration between information governance and underlying storage infrastructure.
  • How Cyber (measured in dollars) Earns a Spot on the Risk Register
    How Cyber (measured in dollars) Earns a Spot on the Risk Register Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security Recorded: May 17 2018 47 mins
    Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.

    Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
  • A Bias for Action: Security Analytics for the Advanced SOC
    A Bias for Action: Security Analytics for the Advanced SOC Jon Oltsik, Sr. Principal Analyst, ESG, and Barbara Kay, Sr. Dir. Security, ExtraHop Recorded: May 17 2018 64 mins
    Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.

    The foundation of a successful security architecture in this model requires:
    - Rich, trustworthy data covering all aspects of the environment
    - Consolidated data sources and analytics processes
    - Automated investigation and response capabilities
    - Integration between tools and services for total coverage of every critical asset and data set.

    In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • Dell EMC Unity: Update & Architectural Overview
    Dell EMC Unity: Update & Architectural Overview Ji Hong Recorded: May 17 2018 46 mins
    Dell EMC Unity has been designed and engineered from the ground-up to be radically simple, flexible and unified. Come hear and see what's new. This session will look at how Dell EMC Unity delivers both advanced features (such as, built-in encryption, inline data reduction, forever snapshots, storage analytics – CloudIQ, cloud tiering...) and high performance in just 2U.
  • LAN Standards, News & Trends: 2018 Update
    LAN Standards, News & Trends: 2018 Update Cindy Montstream, Legrand Recorded: May 17 2018 77 mins
    Join FOTC Standards Chair Cindy Montstream for an update on structured cabling standards.

    Attendees will earn one BICSI CEC.
  • Technology Trends & Use Case in AI
    Technology Trends & Use Case in AI Camberley Bates, Evaluator Group; Frederic Van Haren, Evaluator Group; Keith Kirkpatrick, Tractica Recorded: May 17 2018 58 mins
    What are the top use cases in AI? Or should we say, what will be the top use cases in the next 5-10 years? How are companies using the disciplines of Machine Learning, Deep Learning and HPC? What is needed to enable faster adoption? What technology changes are expected or required? Evaluator Group and Tractica, leading analyst firms on the topic of Artificial Intelligence come together to discuss these topics of market adoption and technology requirements.

    This is an INTERACTIVE session. We will start with short presentations then open up the Fireside chat. The audience is invited to submit their questions and participate in what will be a lively discussion.
  • Optimizing your data management in the cloud
    Optimizing your data management in the cloud Holger Kaercher, Cloud Business Development Manager, NetApp and Chris Priest ,Senior Consultant, Amido Recorded: May 17 2018 9 mins
    Join Holger Kaercher and Chris Priest on for a 1:1 interview on:
    - Unexpected challenges of managing data in the cloud
    - Managing and controlling your data, your way
    - Optimising wherever your data is stored
  • Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud
    Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud Robert Strechay - Senior VP Product, Zerto Recorded: May 17 2018 47 mins
    With the introduction of Zerto Virtual Replication 6.0, enterprises can now fully experience the true benefits that cloud technology has long promised.

    Listen in as Senior Vice President of Product, Rob Strechay reveals Zerto’s Game-changing technology so you can be ready to solve for cloud with a single solution.
  • Metrics drive behaviours: How to avoid common IT metric mistakes
    Metrics drive behaviours: How to avoid common IT metric mistakes Steve Morgan, Director, Syniad IT Recorded: May 17 2018 33 mins
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • Running IT as a Business
    Running IT as a Business Rob Akershoek, Solutions Architect at Shell Recorded: May 16 2018 47 mins
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • New Opportunities with Hybrid Cloud Architectures
    New Opportunities with Hybrid Cloud Architectures Horst Thieme, Manager Cloud Business Development EMEA and Chris Priest, Senior Consultant, Amido Recorded: May 16 2018 10 mins
    Join Chris Priest and Horst Thieme for a 1:1 interview on:
    - How to get files from existing infrastructures into the public cloud
    - The importance of bringing AI Analytics workloads closer to the public cloud
    - Lower costs and greater efficiencies
  • Embracing the Journey to Digital Executive Leadership [Live Panel]
    Embracing the Journey to Digital Executive Leadership [Live Panel] Margaret Dawson, VP Product Marketing, Red Hat Recorded: May 16 2018 74 mins
    Digital transformation is the journey all organizations must go through to compete and win in today’s economy. It includes fundamental changes across the business and information technology. The hallmark of digital transformation is that software differentiates in ways it never has before, and technology is no longer about running the business-instead it creates competitive advantage.

    To attain digital leadership requires embracing a new generation of technology that encompasses real-time decision platforms, cognitive systems, and the Internet of Things, as well as new processes and cultural perspectives. Digital leaders move fast and embrace disruption both internally and externally. No wonder 90% of CEOs are changing the way they use technology to be successful, according to IDC Research.

    Join this spotlight overview and hosted panel discussion to hear insights from top executives.
  • Discover and take action on any resource in your IT estate
    Discover and take action on any resource in your IT estate John Tonello-Sr. Product Marketing Manager at Puppet, Carl Caum-Product Marketing Engineer at Puppet Recorded: May 15 2018 44 mins
    Whether you’re grappling with brownfield environments that aren’t under management, infrastructure inherited from various acquisitions or shadow IT, one of the earliest and most significant challenges to achieving pervasive automation is not knowing what you have. Simply put, you can’t automate what you don’t know exists. This is why discovery of your infrastructure resources is step zero in bringing automation to any organization.

    Puppet Discovery solves this problem by giving you an accurate, real-time picture of your IT inventory so you always know what’s running, and can prioritize what to automate.

    Join Carl Caum, Engineering Product Manager for Puppet Discovery, and John Tonello, Sr. Technical Marketing Manager, for a closer look at Puppet Discovery’s capabilities:

    - See everything you have running on your servers, VMs and containers in an intuitive dashboard, so you know what’s under management, and what’s not.
    - Unlike clunky CMDB tools and static spreadsheets, Puppet Discovery maintains a dynamic and actionable inventory, making it easy to see exactly what software, services and operating systems are running.
    - More than just a resource inventory, Puppet Discovery provides deep insights about infrastructure, bridging the gap between resource discovery and automation.
    - Unlike any other solution, Puppet Discovery allows you to take action on what you find, including restarting and stopping services and installing the Puppet agent
  • Solving Exabyte-Scale Search (and Beyond!) with Object Storage & Elasticsearch
    Solving Exabyte-Scale Search (and Beyond!) with Object Storage & Elasticsearch John Bell, Senior Consultant & Jamshid Afshar, Engineer Recorded: May 15 2018 43 mins
    Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability with metadata, enabling you to search billions of files ad hoc with "Google-like" search capabilities, without the rigid structure of relational databases and file systems. Caringo Senior Consultant John Bell and Caringo Engineer Jamshid Afshar take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage in this webinar.
  • Digging into DevSecOps: Realities and Opportunities
    Digging into DevSecOps: Realities and Opportunities Jay Lyman, Principal Analyst, Cloud Management and Containers, 451 Research; Meera Rao, Senior Principal Consultant, Synopsys Recorded: May 15 2018 62 mins
    To learn more about the realities of DevSecOps today and the real degree to which security is or is not being included in enterprise continuous integration/continuous delivery workflows, we surveyed 350 decision-makers at large enterprises across a variety of industries.

    What we found is that only about half of enterprise CI/CD workflows include any security elements at all, highlighting ample room for improvement. Enterprises did seem to show an awareness of the importance of adding security elements into DevOps releases, but they are not necessarily injecting security early in the process -- ideally at code commit and in pre-implementation. This webinar will cover these and other results of our survey, and offer guidance on how enterprise organizations can effectively integrate security tools, thinking and people into their CI/CD workflows to reduce rework and risk without sacrificing velocity.
  • Everything You Wanted To Know...But Were Too Proud To Ask - Storage Controllers
    Everything You Wanted To Know...But Were Too Proud To Ask - Storage Controllers Peter Onufryk, Microsemi, Craig Carlson, Cavium, Chad Hintz, Cisco, John Kim, Mellanox, J Metz, Cisco Recorded: May 15 2018 48 mins
    Are you a control freak? Have you ever wondered what was the difference between a storage controller, a RAID controller, a PCIe Controller, or a metadata controller? What about an NVMe controller? Aren’t they all the same thing?

    In part Aqua of the “Everything You Wanted To Know About Storage But Were Too Proud To Ask” webcast series, we’re going to be taking an unusual step of focusing on a term that is used constantly, but often has different meanings. When you have a controller that manages hardware, there are very different requirements than a controller that manages an entire system-wide control plane. From the outside looking in, it may be easy to get confused. You can even have controllers managing other controllers!
    Here we’ll be revisiting some of the pieces we talked about in Part Chartreuse [https://www.brighttalk.com/webcast/663/215131], but with a bit more focus on the variety we have to play with:
    •What do we mean when we say “controller?”
    •How are the systems being managed different?
    •How are controllers used in various storage entities: drives, SSDs, storage networks, software-defined
    •How do controller systems work, and what are the trade-offs?
    •How do storage controllers protect against Spectre and Meltdown?
    Join us to learn more about the workhorse behind your favorite storage systems.
  • Join the White-box Revolution
    Join the White-box Revolution Paul Stevens Marketing Director, Advantech and Yann Rapaport VP of Product Management, 6WIND Recorded: May 15 2018 56 mins
    This webinar will discuss how high performance networking software combined with commercial-off-the-shelf (COTS) edge servers and open management can offer real alternatives to expensive networking equipment.

    The webinar will cover:

    • How white box server solutions based on Intel Architecture scale from Customer Edge to Provider Edge
    • Physical constraints at the Edge and why location is so important
    vRouter use-cases
    • How to successfully replace Brocade Vyatta vRouters with 6WIND Turbo Router software appliances
  • How to protect VMs or Datastores
    How to protect VMs or Datastores Reduxio Systems Recorded: May 15 2018 2 mins
    A quick guide on how to protect virtual machines or a datastore using Quiescence policy in the Reduxio StorApp for VMWare vSphere v2.0.
  • SDNs: Managing Security across the Virtual Network
    SDNs: Managing Security across the Virtual Network Omer Ganot, Product Manager May 22 2018 2:00 pm UTC 45 mins
    Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.

    Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.

    Key topics include:

    • How to securely discover, map and migrate application connectivity to the SDN

    • Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass

    • Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN

    • Best practices for managing security policies across Cisco ACI and VMware NSX

    • Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer May 22 2018 3:00 pm UTC 75 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • Delivering Virtual Services to Enterprises from the Service Provider Cloud
    Delivering Virtual Services to Enterprises from the Service Provider Cloud Sanjay Bhatia, VP Solutions Marketing & Strategy and Daniel Teichman,Sr Solutions Marketing Manager [Ribbon Communications] May 22 2018 3:00 pm UTC 60 mins
    As the service provider adoption of network functions virtualization (NFV) continues, new business opportunities expand for Service Providers.

    This webinar will explore the rationale, value, and implementation options of using NFV and uCPE/vCPE models to deliver session border control (SBC) as a service.
  • XtremIO X2 Native Replication: Use Cases, Architecture & Best Practices
    XtremIO X2 Native Replication: Use Cases, Architecture & Best Practices Aharon Blitzer May 22 2018 4:00 pm UTC 60 mins
    XtremIO X2 delivers a unique metadata-aware and highly efficient native replication data services. Learn the details of XtremIO X2 replication architecture – built on inline data reduction and in-memory snapshots to reduce data transfers between primary and secondary sites. We will also discuss different key features required to manage DR requirements for business critical applications in a customer-centric model.
  • Security in the Age of Hybrid Cloud
    Security in the Age of Hybrid Cloud Ajay Uggirala and Marty Jost — Product Marketing, Imperva May 22 2018 5:00 pm UTC 60 mins
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • GDPR - Is Data Still the New Currency?
    GDPR - Is Data Still the New Currency? Primitive Logic CEO Jill Reber & President Kevin Moos May 22 2018 9:00 pm UTC 60 mins
    Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
  • Semantic AI: Bringing Machine Learning and Knowledge Graphs Together
    Semantic AI: Bringing Machine Learning and Knowledge Graphs Together Kirk Borne, Principal Data Scientist, Booz Allen Hamilton & Andreas Blumauer, CEO, Managing Partner Semantic Web Company May 23 2018 1:00 pm UTC 60 mins
    Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."

    This webinar covers:

    - An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
    - How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
    - How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
    - Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
  • Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash
    Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash Ori Modai, VP R&D, Iguazio May 23 2018 3:00 pm UTC 60 mins
    Using Flash to substitute memory in databases can substantially increase density, reduce costs and improve durability. However, most databases access Flash through traditional storage and file system layers, utilizing only a fraction of Flash’s potential speed. As a result, companies keep using in-memory databases with expensive memory and limited data capacity and resiliency. Ori Modai will explain how to build real-time intelligent apps which run across large data sets and reach in-memory database performance with Intel’s NVMe Flash. He will describe the challenges posed by traditional database and storage architectures and will present a new database design which maximizes the value of flash, reaching 20x lower costs and 100x higher density. The session will include a technical deep dive followed by real-world customer use-cases in the fields of IoT edge and online AI applications.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director May 23 2018 4:00 pm UTC 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Transform IT with Storage and Data Protection to deliver maximum ROI
    Transform IT with Storage and Data Protection to deliver maximum ROI Steve Spataro, Garret Van Siclen May 23 2018 4:00 pm UTC 60 mins
    If your information infrastructure is not robust and flexible, then business agility is reduced, managing applications is time consuming, and total cost of ownership is higher than necessary. Learn how Dell EMC’s storage and data protection solutions help organizations like yours by leveraging an information infrastructure that is designed for change and delivers both high performance and high availability.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Pierre-Francois Guglielmi, Veeam May 24 2018 1:00 pm UTC 60 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Pierre-Francois Guglielmi, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • AI and the Future of Cyber Conflict
    AI and the Future of Cyber Conflict Michelle Cantos, Strategic Intelligence Analyst, FireEye May 24 2018 3:00 pm UTC 60 mins
    Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

    Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

    Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:

    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Use of AI applications in businesses and associated vulnerabilities
  • [Ep.15] Ask the Expert: Managing Change in Cloud-Based Systems
    [Ep.15] Ask the Expert: Managing Change in Cloud-Based Systems David Cuthbertson, CEO, Square Mile Systems and Kelly Harris, Senior Content Manager, BrightTALK May 24 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join David Cuthbertson, CEO of Square Mile Systems, as he takes a deep dive into cloud management. Many senior decision makers have negative feelings regarding the issues of technical teams and don't want to bring them to light - data security, change control, lock in to a supplier who overcharges, proper outage stats, etc.

    Just as there is more awareness of outsourcing contract nightmares, many of the same issues apply to cloud providers. Managing change in cloud-based systems is still a relatively new issue as most technical teams don't think about how cloud systems are managed and the potential risks posed by many suppliers without a viable business model.

    Audience members are encouraged to send questions to the expert which will be answered during the live session.
  • Dell EMC CloudIQ: Cloud-based Analytics and Machine-Learning Applications
    Dell EMC CloudIQ: Cloud-based Analytics and Machine-Learning Applications Susan Sharpe May 24 2018 4:00 pm UTC 60 mins
    See the future of cloud-based storage management & analytics in this demo-filled webinar. Manage storage from anywhere and detect performance anomalies and measure overall health of Dell EMC storage systems through intelligent, comprehensive and predictive analytics. Harness the power of using CloudIQ across your storage platforms including Unity, SC, and more coming soon.
  • Architecting Machine Learning Ecosystems Using Best-in-Class NVMe SSDs
    Architecting Machine Learning Ecosystems Using Best-in-Class NVMe SSDs Rick Walsworth & Cameron Brett May 24 2018 5:00 pm UTC 60 mins
    Machine learning and Deep learning architectures are driving efficiencies and automation across enterprise systems and creating challenges for infrastructure architects in order to deliver the desired outcomes. These issues are manifested through infrastructure I/O bottlenecks that result poor ingest throughput performance that slow cognitive system training times due to excessive latencies. In this webinar, Toshiba and Vexata join forces to provide actionable information about the latest generation of NVMe based solid state drive (SSD) media and how to architect systems to deliver the low latency, high bandwidth I/O services to these advanced neural nets and cognitive systems.

    Join this webinar and learn about the latest technologies, architectures and best practices purpose built for these AI ecosystems.

    In this webinar
    1. Latest generation of SSD technologies that deliver low latency performance
    2. Advances in storage architectures that maximize the SSD media
    3. Use cases and customer examples that have deployed these architectures for machine learning environments.
  • Locking in HIPAA Compliance with Privileged Access Management
    Locking in HIPAA Compliance with Privileged Access Management CA Hosts: Cullen Lemley, Cybersecurity Consultant & Alexandra Beswerchij, Product Marketing Manager May 24 2018 5:00 pm UTC 60 mins
    The healthcare industry is facing increased pressure to comply with strict regulatory requirements that focus on managing, controlling, and monitoring privileged access to sensitive data. Yet, data breaches remain at an all-time high, while compliance and security measures seem to be on hold. In fact, 2018 has already imposed over $3.6 million dollars* in fines, due to HIPAA compliance violations.

    Take control of your environment, your privileged users, and get compliant. Join CA hosts – Cullen Lemley, Cybersecurity Consultant and Alexandra Beswerchij, Product Marketing Manager – as they reveal necessary steps to HIPAA compliance and Privileged Access Management best practices to defend against cybersecurity risks.


    *Compliancy Group, 2018 HIPAA Fines
  • From Insight to Action: Best Practices for the GDPR-Ready Organization
    From Insight to Action: Best Practices for the GDPR-Ready Organization Zachary Bosin, Director, Digital Compliance, Veritas May 24 2018 8:00 pm UTC 60 mins
    The world’s most expansive data privacy regulation -- the General Data Protection Regulation (GDPR) -- takes effect on May 25, 2018, and organizations of all sizes must be prepared to respond.

    This session will provide powerful insights from recent Veritas research regarding consumer sentiment toward data privacy and the implications for accelerating your compliance journey.  Additionally, we will cover a brief overview of the regulation’s most important tenants and key technology areas that can reinforce your compliance posture, including a helpful new framework for evaluating GDPR Readiness. 
  • GDPR - Why May 25th Is Just the Beginning
    GDPR - Why May 25th Is Just the Beginning Primitive Logic CEO Jill Reber & President Kevin Moos May 24 2018 9:00 pm UTC 60 mins
    Even though the GDPR enforcement date is here, it’s never too late to get on board and start assessing your data processes to begin aligning with the requirements.

    And even if your company is already prepared, May 25 is not a finish line.

    Not only will the regulation itself continue to be clarified through interpretation, but certain triggers in your organization down the road will require a re-evaluation of your compliance status.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to assess your GDPR readiness and identify gaps that need to be filled
    - Why GDPR compliance is not a one-and-done endeavor
    - The internal and external triggers that may demand a re-evaluation of your GDPR compliance
    - How to build GDPR checks into your ongoing data management strategy
  • The Last-Minute Guide to GDPR
    The Last-Minute Guide to GDPR Argin Wong, Data Privacy and Compliance, Box May 25 2018 8:00 pm UTC 60 mins
    The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.

    It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
     
    •How to show that you are processing data in accordance to the GDPR
    •How to ensure (and document) the security, confidentiality and availability of data
    •How to support the Right to be Forgotten 
     
    You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
  • Securing the Transforming Industrial Environment
    Securing the Transforming Industrial Environment Ronen Shpirer, Security Solutions Architect, Fortinet May 29 2018 9:00 am UTC 60 mins
    IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.

    Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.

    This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.
  • Unlock the Power of Data Capital to Accelerate Digital Transformation
    Unlock the Power of Data Capital to Accelerate Digital Transformation Ritu Jyoti, Research Director, IDC and Varun Chhabra, Sr. Director - Product Marketing, Dell EMC May 29 2018 4:00 pm UTC 60 mins
    IDC estimates by 2021 at least 50% of global GDP will be digitized. Data Capital is about helping customers to maximize the value of the insights and information in their data centers today to reach new audiences and revenue potential.

    In this webinar, we’ll be discussing the role data plays and why an emphasis on unlocking the power of your Data Capital will drive success for organizations. We’ll also cover real world examples that show the value of digital transformation, and how you can start your journey.

    In this webcast you will learn:

    Why Data Capital is so important to your organization
    How to unlock your Data Capital and overcome common challenges
  • Living in the GDPR World – What Now?
    Living in the GDPR World – What Now? Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva May 29 2018 4:00 pm UTC 60 mins
    With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
  • Embrace Central Office 2.0 with QCT NFV Platform
    Embrace Central Office 2.0 with QCT NFV Platform Marco Huang [QCT] Amy Chang [QCT] Wei Yeang Toh [Intel] May 29 2018 11:00 pm UTC 45 mins
    Telco operators are looking for open source solutions to reduce vendor lock-in and to meet growing customer demand in transformation. In this session, we provide a glimpse of common NFVI inquiries from telco customers, and propose a modularized NFVI OpenStack Platform with flexible, reliable, and high-performance infrastructure:

    ○ OpenStack architecture design and network planning for NFVI. We will present how to plan a NFVI OpenStack environment from scratch.

    ○ Enhanced Platform Awareness (EPA) adoption and performance evaluation. We will introduce the network stack and provide detailed performance evaluation results.

    ○ Ansible based auto-deployment tool to accelerate the overall deployment process. We will present you how our streamlined auto-deployment tool saves your effort to build a well-integrated OpenStack


    More about our presenters:

    Marco Huang – Open Infrastructure Engineering Team Leader. QCT
    Amy Chang - Open Infrastructure Business Development Team Leader, QCT
    Wei Yeang Toh - Marketing Development Director, Network Platform Datacenter Group, Intel Corporation