Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Ron Bonica, Distinguished Engineer Recorded: Jun 17 2019 60 mins
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • Veritas and AWS: 350 Data Management in a Multicloud World
    Veritas and AWS: 350 Data Management in a Multicloud World
    Rick Wissenz, Matt Sirbu, Jeremy Snow Recorded: Jun 17 2019 44 mins
    Storage cost, the risk of data corruption, and increased strain on IT's time and resources is why many orgniazations look at backup and disaster recovery as their first meaningful move to the public cloud.

    Our webinar: 360 Data Mangement in a Multicloud World with Veritas, AWS, and Softchoice will discuss the effective ways to move and protect your data in AWS.

    In this webinar you’ll learn:

    - Data management and protection across multiple use cases:
    -Backup and Restore
    -Large Data Archive and Recovery
    -Onsite Virtualization Replication, Backup and Failover
    -Multi-site Replication Failover
    -How optimizing your data prior to migration helps you in:
    -Compliance risk
    -Cost overruns
  • How to succeed in DevOps, Automation and Multicloud strategies
    How to succeed in DevOps, Automation and Multicloud strategies
    Jen Thomson, IDC - Archana Venkatraman, IDC Recorded: Jun 17 2019 61 mins
    Learning from trendsetter European Enterprsies' Journey
  • Infosecurity Europe: Multi-Cloud Security and Compliance Panel
    Infosecurity Europe: Multi-Cloud Security and Compliance Panel
    Patrick Grillo, Fortinet | John Meakin, GSK | Dave Barnett, Forcepoint EMEA | James Hughes, Rubrik Recorded: Jun 17 2019 46 mins
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    Panellists
    Patrick Grillo, Senior Director - Security Solutions, Fortinet
    James Hughes, Field CTO, Rubrik
    Dave Barnett, Head of CASB, Forcepoint EMEA
    John Meakin, Group Chief Information Security Officer, GlaxoSmithKline (GSK)

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Jun 13 2019 51 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Business Continuity Measures for Volatile Times
    Business Continuity Measures for Volatile Times
    Augie Gonzalez, Director of Product Marketing, DataCore Recorded: Jun 13 2019 45 mins
    Every master plan is created to fulfill specific demands. But what if you did not consider one or two unpredictable factors? This webinar will provide insights to help you maintain business continuity by adapting to those inevitable, yet unforeseen turn of events.

    - Find out where your organization ranks within the Vulnerability Index
    - How to protect your BC/DR plans and avoid common storage pitfalls
    - Discover the new standard of BC/DR planning and stay future-ready
  • Live Demo: Configure NetFlow/IPFIX.  Gain Insights. Take Action.
    Live Demo: Configure NetFlow/IPFIX. Gain Insights. Take Action.
    Andy Hutchison, Sales Engineer Gigamon Recorded: Jun 13 2019 44 mins
    Lack of visibility into network traffic, coupled with an inability to ingest large amounts of packet data, leads to network blind spots. The good news is that NetFlow IPFIX metadata generation allows for richer metadata than standard NetFlow, with more flexibility when sending to a tool such as a SIEM.

    Register for this live demo webinar to:

    - Understand NetFlow concepts, and how they apply to security and other use cases.
    - See how Gigamon helps strengthen your existing infrastructure and tools.
    - Learn factors to consider when planning to use network metadata.

    Attendees will learn how to gain insight into metadata without an extensive investment in new tools.
  • Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400
    Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400
    Rahul Sharma and Michael Carcerano, Dell EMC Recorded: Jun 13 2019 41 mins
    Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400

    Existing data protection solutions targeted at the mid-size orgs sacrifice comprehensive coverage, efficiency, and support in the name of simplicity. The IDPA DP4400, including the new 8-24TB option, delivers a converged data protection solution that is the perfect mix of simplicity and power for SMB organizations and remote office/branch office (ROBO) environments. In addition, it offers the lowest cost-to-protect and is guaranteed under the Future-Proof Loyalty program.

    In this webinar, you’ll learn how Dell EMC’s IDPA DP4400 is not only receiving plaudits from industry experts, but also winning the trust of new and existing customers. According to IDC, both IDPA revenue and unit shipments have grown by more than 10x from 2017 to 2018 with an annual run rate exceeding $100 million in just six quarters in the market.

    The IDPA DP4400 is a turnkey data protection appliance tailor-made for mid-size organizations. It offers complete backup, deduplication, replication, recovery, search & analytics, system management—plus, cloud readiness with disaster recovery and long-term retention to the cloud—all in a convenient 2U appliance.

    Come learn how your organization can benefit from all that IDPA DP4400 has to offer.

    Presented by:
    Rahul Sharma - Product Marketing, Dell EMC
    Michael Carcerano – Product Management, Dell EMC
  • Commvault and Cisco: Combining Modern HCI with Complete Data Protection
    Commvault and Cisco: Combining Modern HCI with Complete Data Protection
    Forrester, Commault, and Cisco Recorded: Jun 13 2019 52 mins
    Learn how two industry leaders, Cisco and Commvault, are working together to help customers achieve data center modernization, and overcome the challenges of implementing hyperconverged infrastructure and hybrid IT. ​

    Please join Naveen Chhabra, Senior Analyst at Forrester; Vijay Venugopal, Cisco Senior Director of Product Management for HyperFlex; and Jonathan Howard, Commvault Director of Technical Alliances to learn more about why an integrated Cisco-Commvault implementation addresses data centers' key challenges.
  • Test Design Management within ARD Hub
    Test Design Management within ARD Hub
    Joshua Taylor, ARD Product Manager Recorded: Jun 13 2019 58 mins
    From capturing clear requirements used in model-based testing to auto-generating test designs that’s optimized for maximum test coverage, development teams do so with Agile Requirements Designer (ARD) today.

    Key to creating valuable test assets is in facilitating end-end collaboration, starting with a file storage mechanism that’s purpose built to help developers create and manage multiple projects across dedicated workspaces. Distributed teams rely on ARD Hub, a central repository found within ARD to maintain, share and reuse different versions of a project from one sprint to the next, across the business.

    Join ARD Product Manager Joshua Taylor as he discusses the finer points in the organization and performance of a central repository that’s used in test design automation, as seen through the lens of customers using ARD Hub today.

    You'll learn:
    •Simple elegance of the ARD Hub Architecture
    •ARD Insights to be leveraged in test plans
    •Managing Projects, Versions & Sub-flows through ARD Hub
    •Migrating a Flow into the ARD Hub to be shared and reused
    •Future Release Plans for ARD Hub
  • Managing Multi-Cloud Data Protection
    Managing Multi-Cloud Data Protection
    Ned Bellavance, Ned in the Cloud LLC and Matt Tyrer, Commvault Recorded: Jun 13 2019 46 mins
    Data protection for on-premises workloads isn’t anything new in IT. The same cannot be said for data protection in the cloud. Managing a single cloud service seems manageable, but how do you protect your data across multiple clouds and services? With the increasing prevalence of data regulation, how can you embrace multi-cloud and meet your SLAs, while staying in compliance? What specific features should you be looking for in a potential cloud-native data management solution?



    In this webinar you will learn:

    Common misconceptions about cloud data protection
    Why cloud-native data protection is essential for a successful multi-cloud strategy
    The real-world implications of cloud data protection
    Requirements of a modern, consolidated data management solution
    The business, operational, and risk management advantages of cloud-native data protection
  • 5  Herausforderungen eines zukunftssicheren Datenschutzes
    5 Herausforderungen eines zukunftssicheren Datenschutzes
    Anneke Stockhausen Corporate Account Manager, Druva Deutschland and Dietmar Simon Senior PreSales Engineer, DACH, Druva Recorded: Jun 13 2019 13 mins
    Nehmen Sie an unserem Webinar teil, und erfahren Sie, wie Sie mit den Druva Cloud Services die Herausforderungen eines zukunftssicheren Datenschutzes lösen können:

    - Zentralisierung und Vereinfachung der Verwaltung von Unternehmensdaten.
    - Reduzierung des Bedarfs von lokalen Ressourcen und Kosten.
    - Modernisierung des Datenschutzes für virtuelle Workloads.
    - Erfüllung wichtiger SLAs für Anwendungsdaten.
    - Nutzen der Effizienz und globalen Reichweite der Public Cloud um maximale Speicherflexibilität, Datenbeständigkeit und Sicherheit zu erreichen.
  • Driving Digital Transformation with Application Intelligence
    Driving Digital Transformation with Application Intelligence
    John LeHane, Product Marketing Gigamon Recorded: Jun 13 2019 19 mins
    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Xi Frame: Introduction to Delivering Virtual Desktops and Apps
    Xi Frame: Introduction to Delivering Virtual Desktops and Apps
    Joel St-Pierre, Technology Program Manager at Autodesk, Carsten Puls (ENG), Kong Yang (PMM) Recorded: Jun 12 2019 49 mins
    This session will introduce the Frame architecture and complete feature set within the context of the modern, digital workspace. Nutanix experts will show how Frame is the only modern, full stack, multi-cloud virtual desktop solution available on the market today. See how Frame delivers virtual apps and desktops from multi-clouds in any region to your end-users and their web browsers.
  • Modern Infrastructure needs Modern Backup and DR – HYCU for Google Cloud
    Modern Infrastructure needs Modern Backup and DR – HYCU for Google Cloud
    Bader Hamdan, Head of Technology Partnerships Google; Subbiah Sundaram, VP Products HYCU; Cory Cater, Cloud Solutions Agosto Recorded: Jun 12 2019 57 mins
    Companies are upgrading to a modern infrastructure with Google Cloud. To run an always-on digital business, customers must face the data protection and backup challenge head-on with a modern backup solution that leverages the reliability and scalability of Google Cloud. Enterprise customers may not be aware that backup is not included in cloud platforms, and that customers data workloads in the cloud must hit the same backup and disaster recovery RTOs and RPOs.

    Join us for this 45 min + QA - webinar to hear how customers are implementing Google Cloud and HYCU Backup-as-a-Service as an integrated, seamless solution.

    - Modern, simplified data protection, purpose-built for Google Cloud workloads and Cloud SQL.
    - Cost Optimization with a pay-as-you-go model with infinite scale.
    - Achieve your RTO and RPO goals and get time back in your day when you need to quickly recover VMs, Apps, and Data.
  • Data Protection Strategies for VxRail in a Multi-Cloud World
    Data Protection Strategies for VxRail in a Multi-Cloud World
    Colin Durocher - Product Manager, Dell EMC and KJ Bedard - VxRail Technical Marketing Manager, Dell EMC Recorded: Jun 12 2019 48 mins
    VxRail leads the HCI market by combining best of breed technologies to simplify the path to the VMware cloud. Dell EMC and VMware provide a wealth of data protection options in both private and hybrid cloud deployments for VxRail customers. In this session, we will survey the options ranging from stretched clusters through disaster-recovery-as-a-service (DRaaS). For each solution, we’ll clarify use cases, benefits, costs, and appropriate deployment models.
  • What’s New in Data Protector? Introducing Data Protector 2019.05
    What’s New in Data Protector? Introducing Data Protector 2019.05
    Ken Lamb, Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Recorded: Jun 12 2019 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector continues to deliver flexible and powerful enterprise protection with version 2019.05—consolidating additional reporting functionality, deeper storage infrastructure support, and further platform integrations.

    This webcast will cover some of the recent enhancements as well as provide an overview of the latest release including:

    • Usability improvements: introducing Chromium Dashboard support
    • NetApp ZDB using SnapMirror
    • Integrated reporting review
    • PostgreSQL 10 Agent; Power PC for SAP HANA

    See a live demo of all the new features.
  • Securely Managing Application Connectivity – Best Practices
    Securely Managing Application Connectivity – Best Practices
    Yoni Geva, Product Manager (AlgoSec) Recorded: Jun 12 2019 19 mins
    New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will present:

    • Innovative application-discovery technologies
    • Application-centric use cases, including policy cleanup and documentation
    • How to simplify and accelerate rule recertification through automation
    • How to prevent breaches by associating vulnerabilities to business applications and
    firewall rules
    • How to ensure ongoing compliance and audit-readiness
  • Flip The Switch to Open Networking with Dell Technologies PowerSwitch
    Flip The Switch to Open Networking with Dell Technologies PowerSwitch
    Lee Larter, Sales Director of UK&I Networking Recorded: Jun 12 2019 27 mins
    20 minute introduction to Dell Technologies Open Networking vision for the Modern Enterprise.
  • Visibility in the Public Cloud
    Visibility in the Public Cloud
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP Recorded: Jun 12 2019 23 mins
    Many organisations are looking to the Public Cloud as a means to extend – and in some cases replace – their existing infrastructure. Whilst the use of the Public Cloud offers formerly unheard-of flexibility in terms of deployment and provisioning, it does present organisations with a challenge as to how to Secure and Monitor these environments, particularly when considering east-west traffic. Getting access to this traffic is the first step in securing these environments as well as ensuring that the resources are used in an efficient manner to optimise their performance.

    Join us for this 25min webinar to find out how you can:

    • Learn about the challenges to organisations when adopting the Public Cloud
    • Understand the ways in which tools can access this traffic using Gigamon’s solutions, thereby improving security and performance
    • See how Gigamon has Virtualised the Network Packet Broker into these environments and tied it all together with GigaVUE-FM
  • Mastering Day One Operations and Beyond
    Mastering Day One Operations and Beyond
    Tarak Parekh (PM) & Ben Peterson (SE) Recorded: Jun 11 2019 44 mins
    So you have deployed Nutanix; that was easy but now what? You're probably thinking about health, workload monitoring, upgrades, general daily management, and capacity analytics. In this session, we review how easy it is to operationalize Nutanix in your organization. Nutanix specialists cover common management with Prism, predictive analytics from Prism Pro, and delve into software maintenance and upgrades via Lifecycle Manager (LCM).
  • Network Upgrades Giving You Security Headaches?
    Network Upgrades Giving You Security Headaches?
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Jun 11 2019 57 mins
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Powering the Data Center with NVM Express™
    Powering the Data Center with NVM Express™
    Mark Carlson, Toshiba Memory and John Kim, Mellanox Recorded: Jun 11 2019 60 mins
    The NVMe standard is evolving to support data center deployment of SSDs. Hyperscalers have brought their requirements into NVM Express regarding isolation, predictable latency and write amplification. As a result, new features such as I/O determinism and predictable latency has been added to the upcoming NVMe 1.4 specification to address some of these concerns, and NVMe-oF has added support for TCP as a transport. In this NVM Express, Inc. hosted webinar, Mark Carlson of Toshiba and John Kim of Mellanox will cover the issues and show the new features from multiple data center perspectives.

    About the Presenters
    - Mark Carlson is a Principal Engineer at Toshiba Memory and an NVMe Board Member.
    - John Kim is the Director of Storage Marketing at Mellanox.
  • Application Monitoring in the Enterprise: Frustration, Pain, and Hope
    Application Monitoring in the Enterprise: Frustration, Pain, and Hope
    Mike Julian, CEO, Duckbill Group Recorded: Jun 11 2019 48 mins
    Improving application monitoring platform in a large enterprise is no easy feat: it's ripe with pitfalls, gotchas, and comes with plenty of frustrating aspects that smaller companies don't often experience. Seemingly simple questions around "Who gets paged for this?" can turn into a week's worth of meetings, and never mind coming to consensus around what tools you should be using.

    Join Mike Julian, author of O'Reilly's Practical Monitoring and Editor/Analyst at Monitoring Weekly, on June 11th at 9am Pacific as he shares advice from people who have led an overhaul of monitoring systems in large companies, as well as his own experiences. When you attend, you will hear about:

    - Why monitoring in an enterprise is so difficult
    -Understanding the *real* pains your internal customers are experiencing
    - How to get buy-in (and budget!) for your major changes
    - Designing a platform architecture that won't lead to frustration six months in

    ...

    Mike Julian is the CEO of The Duckbill Group, a consultancy helping companies lower their AWS bills. When he's not wondering what he's gotten himself into, Mike is the host of the Real World DevOps Podcast and editor/analyst at Monitoring Weekly. He wrote Practical Monitoring (O'Reilly), a book about actionable ways to improve your monitoring. He was previously an SRE/DevOps Engineer/system administrator for companies such as Taos Consulting, Peak Hosting, Oak Ridge National Laboratory, and many more. Mike is originally from Knoxville, TN (Go Vols!) and currently resides in Portland, OR.
  • The Magic of AI: Demystify AI with Sophia the Robot and Dell EMC’s Thomas Henson
    The Magic of AI: Demystify AI with Sophia the Robot and Dell EMC’s Thomas Henson
    Sophia the Robot, Hanson Robotics and Thomas Henson, Sr Engineer Unstructured Data Solutions, Dell EMC Recorded: Jun 11 2019 19 mins
    Artificial Intelligence (AI) holds limitless potential for businesses in every industry and humanity as whole; from bringing vision to the blind, to curing cancer, to self-driving cars. However, connecting the dots between these magical AI outcomes and the impact AI could have on your business is not always straightforward. This is highlighted by the fact that 95% of CXO’s agree that AI will transform their business but only a few percent of organizations actually have AI in production.

    Sophia the Robot and Dell EMC are working to bridge that gap and demystify the complexity of AI by showcasing the ‘Art of the Possible’ with AI. You may not need a walking, talking humanoid bot like Sophia, but she can be your muse to spark ideas about how techniques like video analytics, image detection, and natural language processing can be applied across industry.

    Join this webinar to hear directly from Sophia about why there has never been a better time to jump into AI and experience AI in action as Sophia fields question from Thomas and our live studio audience
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Jun 18 2019 2:00 am UTC 60 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • What’s New in Data Protector? Introducing Data Protector 2019.05
    What’s New in Data Protector? Introducing Data Protector 2019.05
    Paul Carapetis, Senior Technical Consultant and Joe Mihaljevic, Technical Consultant, Micro Focus Jun 18 2019 3:00 am UTC 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector continues to deliver flexible and powerful enterprise protection with version 2019.05—consolidating additional reporting functionality, deeper storage infrastructure support, and further platform integrations.

    This webcast will cover some of the recent enhancements as well as provide an overview of the latest release including:

    • Usability improvements: introducing Chromium Dashboard support
    • NetApp ZDB using SnapMirror
    • Integrated reporting review
    • PostgreSQL 10 Agent; Power PC for SAP HANA

    See a live demo of all the new features.
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Jun 18 2019 6:00 am UTC 60 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • APT Groups: How They Think, What They Want, and How to Fight Them
    APT Groups: How They Think, What They Want, and How to Fight Them
    David Grout, CTO, EMEA, FireEye Jun 18 2019 9:30 am UTC 60 mins
    Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.

    Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:

    •A high-level overview of the nation-state interests driving APT activity
    •Insight into the most recent APT attacks investigated by FireEye
    •A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Jun 18 2019 1:00 pm UTC 60 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.

    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Jun 18 2019 2:00 pm UTC 75 mins
    SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.

    Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.

    Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:

    •Reduce costs associated to database backups
    •Increase backup performance by reducing recovery times
    •Implement a cloud native solution to manage your cloud based SAP
    HANA databases.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Jun 18 2019 3:00 pm UTC 60 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Introduction to Incast, Head of Line Blocking, and Congestion Management
    Introduction to Incast, Head of Line Blocking, and Congestion Management
    Sathish Gnanasekaran, Broadcom; John Kim, Mellanox; J Metz, Cisco; Tim Lustig, Mellanox Jun 18 2019 5:00 pm UTC 75 mins
    For a long time, the architecture and best practices of storage networks have been relatively well-understood. Recently, however, advanced capabilities have been added to storage that could have broader impacts on networks than we think.

    The three main storage network transports - Fibre Channel, Ethernet, and InfiniBand – all have mechanisms to handle increased traffic, but they are not all affected or implemented the same way. For instance, placing a protocol such as NVMe over Fabrics can mean very different things when looking at one networking method in comparison to another.

    Unfortunately, many network administrators may not understand how different storage solutions place burdens upon their networks. As more storage traffic traverses the network, customers face the risk of congestion leading to higher-than-expected latencies and lower-than expected throughput. Watch this webinar to learn:

    •Typical storage traffic patterns
    •What is Incast, what is head of line blocking, what is congestion, what is a slow drain, and when do these become problems on a network?
    •How Ethernet, Fibre Channel, InfiniBand handle these effects
    •The proper role of buffers in handling storage network traffic
    •Potential new ways to handle increasing storage traffic loads on the network
  • Video Surveillance On Quantum - VS-Series Overview
    Video Surveillance On Quantum - VS-Series Overview
    Eric Bassier, Senior Director, Product Marketing Jun 18 2019 5:00 pm UTC 60 mins
    The Quantum VS-Series is an efficient, flexible platform designed for surveillance and industrial IoT applications. It enables our customers to efficiently record and store surveillance footage and run an entire security infrastructure on a single software-defined platform.

    Surveillance and security operations continue to get more complex, with more cameras, higher-resolution cameras and increasing data retention requirements. As buildings become smarter, everything from access control systems to lighting and HVAC systems are now connected - part of the "Internet of Things." And of course, security and loss prevention are more critical than ever.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Jun 18 2019 6:00 pm UTC 60 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.

    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Lenovo and Intel discuss data center efficiency tools
    Lenovo and Intel discuss data center efficiency tools
    Jeff Klaus General Manager, Intel Data Center Solutions - Chuck Weber Product Manager, Lenovo Enterprise Business Group Jun 18 2019 6:00 pm UTC 60 mins
    Lenovo XClarityTM Energy Manager helps you reduce the cost of powering your data center. XClarity Energy Manager is an easy to use application that analyzes and controls power consumption and temperature for groups of servers. By analyzing power and temperature data, XClarity Energy Manager helps data center administrators establish policy-based control over data center energy optimization goals which can improve business continuity and energy efficiency. Join us to see how this this application improves operation processes by:

    •Monitoring energy consumption, estimating the power demand, and reallocating power to servers as needed.
    •Monitoring the temperature and cooling capacity of servers and datacenter spaces.
    •Sending notifications when certain events occur or when thresholds are exceeded.
    •Limiting the amount of energy that an endpoint or a group consumes using policies.
    •Optimizing energy efficiency by monitoring real-time inlet temperatures, identifying low-usage servers based on out-of-band power data, measuring power ranges for different server models, and evaluating how servers accommodate new workloads based on the availability of resources.
    •Reducing the power consumption to a minimum level to prolong service time during an emergency power event (such as a data-center power failure).

    Presenters
    Jeff Klaus
    General Manager, Intel Data Center Solutions
    Chuck Weber
    Product Manager, Lenovo Data Center Group
    George Clement
    Senior Application Engineer, Intel Data Center Solutions
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Jun 19 2019 12:00 pm UTC 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • How To Train Your Email Security Dragon
    How To Train Your Email Security Dragon
    Gareth Fraser-King, Director, Product Marketing EMEA Jun 19 2019 1:00 pm UTC 45 mins
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Jun 19 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer Jun 19 2019 4:00 pm UTC 60 mins
    In this quarterly update webinar, Uptime Institute Intelligence and technology executives discuss developments in the field of mission-critical digital infrastructure. Among the topics are recent outages; cloud expenditure; fuel cells and datacenters; the technology “cold war”; and climate change and infrastructure.