Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Test Drive Nutanix Hyperconverged Infrastructure (HCI)
    Test Drive Nutanix Hyperconverged Infrastructure (HCI)
    Nutanix Recorded: Jun 6 2020 3 mins
    Ever wondered what it would take to build your own private cloud with Nutanix? Well, now you can try it out with the all-new Nutanix Test Drive 2.0. If you want to experience frictionless IT, you can put our software to the test in this new and improved Test Drive.

    We’re excited to deliver this new release so that you can test out the infrastructure that thousands of companies rely on every day for fast, efficient datacenter operations. With just a few clicks, you’ll accomplish tasks that used to take days or even weeks.

    Once you sign up for Test Drive and log in, you will be presented with three experiences from the Nutanix Solution Portfolio:

    • My Infrastructure – shows how you can manage your virtual infrastructure with Prism Central and AOS
    • My Operations - lets you monitor and plan with Prism Pro.
    • My Applications - enables you to deploy and publish applications with Cloud Application Lifecyle Management (CALM).

    Take a guided tour and then get moving on your own with a deep dive hands-on lab. And if you have questions along the way, connect with an expert through our chat system.

    Get ready to experience IT at a whole new level of simplicity!

    https://www.nutanix.com/test-drive-hyperconverged-infrastructure
  • Was ist Open Networking? Und warum es Sie interessieren sollte!
    Was ist Open Networking? Und warum es Sie interessieren sollte!
    Timo Klos, Account Executive, Cumulus Networks Recorded: Jun 6 2020 37 mins
    Sie haben bestimmt davon gehört, aber kennen Sie die Rolle, die Open Networking bereits in vielen modernen Rechenzentren spielt? Oder besser noch, was sind die überzeugenden Argumente, warum Open Networking mehr und mehr an Fahrt aufnimmt? Unabhängig davon, ob Sie und Ihre Organisation schon überzeugt sind oder nicht, sollten Sie sich mit Open Networking auskennen, da es längst Rechenzentrum zukunftsweisend verändert.
  • Qu'est-ce que le Réseau ouvert? Et pourquoi devriez-vous vous en soucier?
    Qu'est-ce que le Réseau ouvert? Et pourquoi devriez-vous vous en soucier?
    Frank Lorentz, Account Executive, Cumulus Networks Recorded: Jun 6 2020 32 mins
    Réseau ouvert ou « l’open networking » . Vous en avez entendu parler, mais pourriez-vous l'expliquer à quelqu'un d'autre? Ou mieux encore, expliquez pourquoi ils devraient s'en soucier? Que vous convainquiez ou non votre organisation de sitôt, vous voudrez vous familiariser avec le réseaux ouvert car il remodèle le centre de données.
  • Infrastructure with a purpose
    Infrastructure with a purpose
    JR Rivers, Co-founder & Former CTO, Cumulus Networks Recorded: Jun 6 2020 40 mins
    Architects and networking professionals today continually push the boundaries of what is possible, turning innovative ideas into real-world solutions. IT is no longer a commodity, but rather something that fuels the business and establishes a competitive edge. I&O professionals today are building infrastructure that will take the business to the next stage. At Cumulus, we call this "Infrastructure with Purpose."

    So how (and why) does one build "infrastructure with purpose"? There are many ways to do this, and it requires not just technology adoption but an operational mindset shift. Join our discussion in this on-demand webinar with JR Rivers, Co-founder and CTO of Cumulus Networks, as he shares his vision of what defines Infrastructure with Purpose and insights on how you can establish the building blocks of your infrastructure and IT success.
  • オープンネットワーキングの定義とその重要性について
    オープンネットワーキングの定義とその重要性について
    Tomoo Yamazaki, Regional Sales Manager Recorded: Jun 5 2020 44 mins
    オープンネットワーキングという言葉を聞いたことはあるかと思いますが、最新のデータセンターにおいてどんな役割があるのか説明できる人は少ないと思います。また、誰もが気にするべき重要性について、議論できる人も少ないと思います
  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    Vasu Jakkal CMO, FireEye; General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO, FireEye Recorded: Jun 5 2020 28 mins
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • Change with confidence - a NetQ demo
    Change with confidence - a NetQ demo
    Faye Ly, Senior Product Management & Justin Betz, TME Recorded: Jun 5 2020 48 mins
    Whether they’re made intentionally or as a side effect of application changes, network changes cause disruption. Fortunately, Cumulus NetQ’s got you covered. With state-of-the-art network visibility, Cumulus NetQ catches network issues before and after configuration changes are made. Watch this live demo to see in realtime how NetQ can help you make a network change without disrupting your services.
  • The old way of networking meets the new way of innovation
    The old way of networking meets the new way of innovation
    Justin Betz, TME and Scott Ciccone, Senior Director, Head of Product Marketing Recorded: Jun 5 2020 47 mins
    Compare traditional, legacy networking with open, web-scale networking and decide for yourself which methodology offers the most benefit to your business.

    This webinar, featuring TME Justin Betz and senior product marketing director Scott Ciccone walks through the outdated technologies in networking today and how innovative companies are thinking about data center network design.

    Watch the webinar to make sure your data center network stays innovative.
  • Sécurisez vos applications avec Kemp LoadMaster et l’IA
    Sécurisez vos applications avec Kemp LoadMaster et l’IA
    Yann Bouillon,Responsable technique, Kemp France et Afrique Francophone Recorded: Jun 5 2020 44 mins
    Le changement de nos pratiques engendre une évolution de notre protection. Site institutionnel, site vitrine, site de E-commerce, messagerie, portail collaboratif et applications critiques, etc. Autant d’exemples qui démontrent que les applications accessibles depuis les navigateurs Web deviennent omniprésentes dans votre entreprise.

    La majorité des données de l’entreprise sont désormais stockées dans ces applications. Toutes les évolutions réalisées sur ces applications sont autant de nouvelles failles potentielles. Alors, comment protéger vos données ?

    En 1h, vous allez découvrir comment utiliser Kemp LoadMaster pour la sécurisation de vos applications.

    Dans ce webinar, vous allez découvrir comment architecturer efficacement un reverse proxy :

    - Vous protéger d’attaques DOS & DDOS
    - Décrypter les attaques dans des flux HTTP et HTTPS
    - Mettre en place une protection IPS & WAF efficace contre des attaques applicatives évoluées (Injection, XSS, CSRF…)
    - Utiliser vos défenses dans une double architecture WAF basée sur de l’IA
  • Forget cloud first - think cloud smart
    Forget cloud first - think cloud smart
    Sahil M Bansal, Senior Product Marketing Manager Recorded: Jun 5 2020 34 mins
    "One cloud, two clouds. Hybrid cloud, multi-cloud. Got an idea which really fits your needs? Do you have to pick one vs the other or can hybrid clouds, leveraging a cloud-like experience built on your datacenter, cohabit with multiple public clouds? This matchup has got you covered!
    In this webinar you will learn:
    What is a True Hybrid Cloud and how to build one
    Benefits of a hybrid cloud vs multi-public cloud strategy
    How to make cost-aware decisions when choosing private vs public clouds"
  • Catalyze Transformation Through Software
    Catalyze Transformation Through Software
    Dell Technologies Recorded: Jun 4 2020 50 mins
    There is a new imperative in today’s modern era of Government application development. If you do not show up to your mission space, “software enabled”, you are not prepared to win in the environment in which you are responsible. To win today, you need to invest in both your people and your technology. Free up your teams to take on more complex challenges. Adopt agile, cloud native development methods and tools. Upgrade your legacy systems to new cloud native runtimes.This kind of transformation at enterprise scale isn’t easy. But with VMware Tanzu, you can accelerate the pace of change. We’ll help rethink the way your agency operates and turn it into a next generation enterprise.

    Please join us in a webinar brief that outlines the recipe and steps needed to make strides toward Digital Transformation and creating modern “Software Factories”. Conversation will be led by Mikey McCormack, Federal Lead for Cloud Native Applications, and Angus Small, Sales Lead in TANZU Federal. For more information please visit TANZU .
  • Take Full Advantage of Your PowerVault ME4 Investment
    Take Full Advantage of Your PowerVault ME4 Investment
    Tim Carlson | Dell Technologies Recorded: Jun 4 2020 47 mins
    Are you getting all you can out your PowerVault ME4? Even as an entry-level array, it empowers businesses to be able to support a variety of use cases including HPC, Surveillance, Backup/Recovery, Virtualization, VDI, and more. In this webinar session, we’ll explore configuration optimization for your applications, when to run Virtual or Linear mode, the extended management ecosystem, whether to use as an RBOD (RAIDED array) or as a server attach JBOD and much more.

    Presented by: Tim Carlson

    An IT veteran with over 35 years’ experience in HPC and Enterprise DataCenters, specializing in storage and filesystems, Tim has a unique combination of expertise in sales, pre-sales, professional services and support from large corporations to smaller businesses. With hands-on experience in large SAN, heterogeneous filesystems, HPC and performance tuning, Tim is currently the Product Line Manager for PowerVault in EMEA.
  • The Network Edge Moves Closer to the User—Is Your Infrastructure Ready?
    The Network Edge Moves Closer to the User—Is Your Infrastructure Ready?
    Avi Freedman, Moderator, Co-founder and CEO, Kentik Recorded: Jun 4 2020 60 mins
    Kentik’s third virtual panel brings together networking leaders from Cisco and StackPath to discuss how remote work, IoT, and smart manufacturing are just a few of the trends redefining the network edge. For networking teams, managing edge complexity requires rethinking infrastructure strategies.

    Watch this panel discussion to learn how today’s “network edge” means that digital businesses and service providers are bringing everything closer to their end-users for a more unified workforce or faster digital experiences. In other cases, sensors are being added to everything from connected cars to industrial machines for optimal performance. And during COVID-19, the network edge has expanded in the home, which has now become the center of work, commerce and culture.

    Cisco’s Matt Price, StackPath’s Wen Temitim, and Kentik’s Avi Freedman discuss how organizations are updating their network infrastructures to get ahead of the game.

    Topics include:

    * What is the network edge today?
    * How is COVID-19 changing edge network and application demand?
    * What is different about edge network architectures?
    * What is the impact on edge computing?
    * What changes are needed for monitoring and operations?
    * What impact is 5G on having on edge networks?
    * Where will the edge go in 2020? 2023?
    * How will COVID-19 accelerate, slow, or change edge expansion?

    Panelists include:

    * Matt Price, Senior Director of IoT Engineering and Operations, Cisco
    * Wen Temitim, CTO, StackPath
    * Avi Freedman, Moderator, Co-founder and CEO, Kentik
  • Hurricane-Proof Your Disaster Recovery Plan
    Hurricane-Proof Your Disaster Recovery Plan
    Andy Fernandez, Product Marketing Manager Recorded: Jun 4 2020 43 mins
    Hurricane season is approaching and maintaining 24/7 availability of your IT systems is a priority for all businesses.Whether it’s hurricanes, fire or even an ongoing pandemic, disaster recovery planning is essential for IT resilience. Listen in to Andy Fernandez, Product Marketing Manager, to hear how your IT organization can be truly hurricane-proof.
  • Grow Revenue with Managed Service Offerings for App Performance & Security
    Grow Revenue with Managed Service Offerings for App Performance & Security
    Mariana Agache, VP Managed Services, F5 Recorded: Jun 4 2020 21 mins
    Applications are your enterprise customers’ capital. F5 can help you bring new managed services to market that allow you to help your enterprise customers ensure the performance and security of their applications no matter where they run—in the cloud, in their private data centers, or on premises in the enterprise. In this session, you will learn how to offer an Advanced WAF managed service for increased application security as well as other services you can offer to differentiate and grow revenue. We’ll also introduce the new Managed Service Program, which can help you accelerate your time to market for new services and grow revenue.

    Register Today
  • GPU Accelerated VDI solutions utilizing Supermicro Server & NVIDIA vGPU Software
    GPU Accelerated VDI solutions utilizing Supermicro Server & NVIDIA vGPU Software
    Arty Lee, Product Manager, Supermicro & Charlie Huang, Sr. Product Marketing Manager, NVIDIA Virtual GPU Recorded: Jun 4 2020 49 mins
    As the workplace environment is seeing a major shift to remote working, the requirement for businesses to provide employees with a high performance virtual experience is now more prominent than ever. Remote working has seen many employees across the office taskforce, creative, technical and financial teams experience issues with application performance, and resulting in employers looking to find new ways to deploy an infrastructure that can successfully support workloads.

    Supermicro VDI solutions, optimized for NVIDIA GPUs and supporting NVIDIA vGPU Software, enable users to effectively implement an infrastructure to support the work from home issues we are seeing more often.

    Join Supermicro & NVIDIA in a webinar which discusses the challenges being faced right now and the solutions we can offer to support the success of your business.
  • An Overview of Roles in Incident Management
    An Overview of Roles in Incident Management
    Rob Schnepp, General Partner, Blackrock 3 & Iain Armstrong, AVP Sales Engineering, BigPanda Recorded: Jun 4 2020 35 mins
    While the Incident Commander is most often talked about, when it comes to incident management, there are several other key roles to build processes around: the Liaison Officer, SMEs, customers, executives, and internal stakeholders. Find out what each role needs and what they contribute in this four-part series of webinars.

    An overview of roles in incident management - June 4th, 2020

    In the first webinar of the series, Blackrock 3 academy leader, Ron Schepp, will explain why time is the only non-renewable resource of incident response. The only thing responders can do is manage it as efficiently as possible.

    As the incident clock keeps ticking, money may be lost, a company’s reputation takes a hit, and the trust you spent time to build is eroding with each passing second.

    Taking the command staff approach to incident response is a force multiplier of skills, and a way for a response team to manage the chaos as fast as it’s occurring. Find out what it takes to manage the three critical swim lanes of incident management: Command, Communications and Problem-solving.
  • Composable Infrastructure: Data Center Architecture for AI
    Composable Infrastructure: Data Center Architecture for AI
    Marius Tudor, VP of Sales, Liqid, Inc. Recorded: Jun 4 2020 44 mins
    Join Liqid VP of Sales Marius Tudor as he discusses the benefits that composable infrastructure solutions deliver for AI workloads.

    Liqid composable infrastructure enables IT users to orchestrate, deploy and change hardware configurations of previously static servers. Disaggregated trays of GPU, NVMe, FPGA, Intel® Optane™, networking, and CPU are managed through software, across multiple fabrics, including PCIe, Ethernet, and Infiniband to provision and augment bare-metal servers in seconds.

    Data has gravity. Learn how composable IT enables users to provision resources independently to meet the requirements specific to each stage of the AI workflow, providing business agility and infrastructure elasticity, while in tandem minimizing silos and hardware sprawl. Outcome: faster time to meaningful data at improved economics together with adaptive infrastructure.

    Marius will discuss recent deployments by organizations such as the University of Illinois at Chicago, which is now using Liqid solutions to manage global research for visually intensive computing, including AI deployments for scientific research.

    Join Us! One lucky attendee will receive a $100 gift card to the grocery delivery or food delivery service of their choice.
  • Take Advantage of Cisco MDS SAN Analytics for Application Performance
    Take Advantage of Cisco MDS SAN Analytics for Application Performance
    Art Scrimo, Product Manager, MDS Software DCNM & SAN Insights of Cisco and Keith Barto, WW Sales and GTM Leader for Cisco MDS Recorded: Jun 4 2020 53 mins
    Cisco and Virtana have partnered to provide unprecedented value to enterprise customers. The combined solution offers a robust, flexible hardware and software architecture with multiple layers of compute, network, and storage-management intelligence. Together, Cisco MDS switches and Virtana’s VirtualWisdom support NVMe and SCSI (Small Computer System Interface) over Fibre Channel or FCoE fabrics.

    Join Art Scrimo, Product Manager, MDS Software DCNM & SAN Insights of Cisco and Keith Barto, WW Sales and GTM Leader for Cisco MDS, and John Gentry, CTO of Virtana, as they discuss:
    •Full Stack application service assurance
    •Increased fabric visibility
    •Problem resolution and avoidance
    •AI powered capacity management and fabric balancing
    •Scalable traffic inspection and modeling

    Be sure to join us for the conversation on May 21st at 10AM pacific to learn how VirtualWisdom uniquely enables you to map, monitor, analyze, and manage the delivery of mission-critical workloads that depend on Cisco MDS storage technologies
  • DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    Anthony Vicinelly, Technology Director, Nlyte Software Recorded: Jun 4 2020 21 mins
    Join this candid conversation on the NEW Federal DCOI Initiative.

    The new DCOI M19-19 mandate expands on the previous DCOI M19-16 by further improving federal data center initiatives as well as provide a path for Modernization, implementing a Cloud First initiative, and performing Application Rationalization.

    What you will here is:
    - What is new and improved in the new initiative
    - Best practices in implementing a DCOI program
    - How DCIM is the Rosetta Stone in getting your agency on board with the federal mandate
  • Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cy Englert Recorded: Jun 4 2020 18 mins
    The BigFix Endpoint Management Platform can perform multiple functions that have previously required many disparate tools. We'll look at building a business case for BigFix by identifying infrastructure cost savings, productivity improvements, operational efficiencies, and other benefits.
  • Fight and Prevent Ransomware | Live Virtual Panel
    Fight and Prevent Ransomware | Live Virtual Panel
    Matt Robertson, Andrew Miller, Sohil Merchant, Charles Johnson Recorded: Jun 4 2020 59 mins
    Ransomware alone impacted the 2019 economy by $11.5 billion. With no signs of slowing down, ransomware continues to be a growing fear in today’s environment. Accudata has assembled a panel of cybersecurity experts to discuss the threats facing organizations today.

    Tune in to our panel June 4 at 11 a.m. to learn about tangible best practices that you can implement in your environment to fight and prevent ransomware. Our expert panel includes:

    -Matt Robertson, principal SE, Pure Storage
    -Andrew Miller, principal SE, Pure Storage
    -Sohil Merchant, senior practice manager, data center & cloud applications, Accudata Systems
    -Charles Johnson, cybersecurity practice manager, Accudata Systems
  • Harnessing the Power of Machine Data with Dell Technologies and Splunk
    Harnessing the Power of Machine Data with Dell Technologies and Splunk
    Brett Roberts - Data Analytics Solutions Specialist | Dell EMC Recorded: Jun 4 2020 30 mins
    Ready Architectures for Splunk provide non-disruptive scalability and performance, optimized for Splunk workloads. We are excited about the possibilities for customers working together with Dell Technologies and Splunk on their journey to AI.

    Together, we offer a few ways to help customers tackle AI, ML, or DL challenges with prebuilt, pretested, preconfigured Ready Solutions or Reference Architectures, all with or without GPU’s. As data growth continues, the opportunities for Dell Technologies and Splunk customers expand. Register for the webcast, to learn more about our joint offerings.
  • Pre- CertificacionPAVA Sesion 1- CS Description: Entrenamiento Comercial
    Pre- CertificacionPAVA Sesion 1- CS Description: Entrenamiento Comercial
    Sebastian Martínez Jun 8 2020 7:00 pm UTC 120 mins
    Entrenamiento Comercial INTEVIO y X-618
  • Secure the Edges of Your Business Network with Secure SD-Branch
    Secure the Edges of Your Business Network with Secure SD-Branch
    Chris Hinsz - Director Product Marketing, James Allen - Director of Products & Solutions Fortinet Jun 9 2020 1:00 am UTC 50 mins
    Learn how to take branch locations to the next level with a truly Secure SD-Branch and a deeper understanding of how to extend edge security to branch locations while streamlining management. Plus, take a look at what an extended architecture that goes a step beyond edge security can achieve with secure access points, phone and camera systems, switches, and more that can increase efficiency without compromising protection.
  • An Intelligence Driven Approach to Security Validation
    An Intelligence Driven Approach to Security Validation
    Shashwath Hegde, Solutions Architect, APAC Jun 9 2020 2:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • 2020 Data Breach Investigations Report (DBIR) Key Findings
    2020 Data Breach Investigations Report (DBIR) Key Findings
    Alex Pinto and Gabriel Bassett Jun 9 2020 3:00 am UTC 75 mins
    This is the 13th edition of the Data Breach Investigations Report (DBIR). Join the discussion with Alex Pinto and Gabriel Bassett, as they reveal key findings on global cyber security breaches and threat patterns faced by businesses and organizations. A Q&A session will be hosted by Ashish Thapar after the presentation.

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group

    Gabriel Bassett
    Data Breach Investigations Report (DBIR) Co-author
    Verizon Business Group
  • 3 Ways the Cloud is Reshaping EUC
    3 Ways the Cloud is Reshaping EUC
    Ruben Sprujit, CTO Frame Jun 9 2020 3:00 am UTC 42 mins
    Traditionally, end-user computing has been dominated by on-premises solutions like virtual desktop infrastructure (VDI). But the cloud has ushered in the emergence of desktop-as-a-service (DaaS), and many organizations have transitioned from a "design-build-support" model to an as-a-service model.

    Join us for this informative webinar to learn what the DaaS landscape looks like, including the differences between VDI and DaaS and why DaaS has become such a compelling option for IT teams.

    Ruben Sprujit, Sr. Technologist at Nutanix will lead you through:

    - Core DaaS technologies and their value.
    - Pros/cons of Azure, AWS, and GCP as Infrastructure-as-a-Service platforms for DaaS.
    - Tips for DaaS success
    - And more!
  • [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change
    [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change
    Kulpreet Ahuja, Solutions Engineer (AlgoSec) Jun 9 2020 7:00 am UTC 45 mins
    With increased attack surfaces created by the need to work from home, security management and continuous compliance are more important than ever in government agencies and those supporting them.

    Agencies are undertaking digital transformation initiatives and moving to public and private clouds. The current crisis has only accelerated these critical initiatives. Agencies must protect applications and data in periods of rapid change.

    In this live demo, we will show you how to accelerate change while securing your government network and its critical applications.

    In the session, learn how to:
    • Model your heterogeneous network to surface compliance, policy, and zone to zone traffic risks
    • Create an accurate application dependency model to understand risks, vulnerabilities, incidents, and prioritize remediation efforts
    • Gain control of server and application migration projects and automate provisioning to assure continuous compliance and reduce outages
    • Maintain compliance with critical regulations and internal standards, while effectively documenting changes so you remain audit-ready
    • Associate the new rules and changes with their related business applications, in order to enable recertifications and secure decommissioning
    • Empower responders to quickly visualize the criticality of incidents and reduce their impact on the organization rapidly
  • Мониторинг компонентов Micro Focus ArcSight
    Мониторинг компонентов Micro Focus ArcSight
    Иван Лопатин, Технический эксперт, ДиалогНаука Jun 9 2020 8:00 am UTC 60 mins
    SIEM является критичной системой в SOC и требуется обеспечивать постоянный контроль за ArcSight ESM и его компонентами. Необходимо проводить регулярный анализ журналов событий системы на наличие критических ошибок или отклонений, чтобы оперативно выявлять проблемы и возможные инциденты.
    В докладе будут рассмотрены следующие задачи:
    • Анализ состояния БД
    • Анализ корректности работы контента
    • Анализ работы ОС
    • Анализ правильности настройки SIEM
    • Анализ критичных ошибок в журналах событий
  • Waarom Private Cloud en hoe bouw je er één
    Waarom Private Cloud en hoe bouw je er één
    Mischa Hal | Senior Systems Engineer, Nutanix Jun 9 2020 8:30 am UTC 60 mins
    Volgens IDC is bijna 80% van de organisaties bezig met de bouw, uitbreiding of planning van privé clouds. Wat is de drijvende kracht achter die verandering? Neem deel aan deze webinar om de zakelijke noodzaak van private cloud te ontdekken en hoe dit een springplank is naar hybride cloud. Bovendien zult u vertrouwd raken met de kritische componenten die een robuuste, functionele private cloud bevatten - en hoe u zelf de weg kunt inslaan naar cloud adoptie.

    3 belangrijke leermomenten:

    • Ontdek waarom 80% van de organisaties investeert in een private cloud...
    • Criteria herzien die nodig zijn voor het bouwen van uw private cloud
    • Snel aan de slag gaan zonder afbreuk te doen aan het succes
  • Security Validation - what is it and how can it improve security effectiveness?
    Security Validation - what is it and how can it improve security effectiveness?
    Mike Batten - VP Sales Engineering EMEA, FireEye Jun 9 2020 9:00 am UTC 60 mins
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye Jun 9 2020 11:00 am UTC 60 mins
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • False Alarms Be-gone
    False Alarms Be-gone
    Richard Williams Jun 9 2020 11:00 am UTC 90 mins
    ‘False Alarms Be-gone’ is a guide to understanding how and why false alarms occur and what we can do to reduce them.

    We describe common everyday problems and provide solutions to reduce and/or potentially avoid future false alarms. Whilst it may be impossible to eliminate them completely, we investigate available systems and technologies along with good management and maintenance of systems to reduce them to a manageable level.

    False Alarms Be-gone is accredited by CPD UK
  • Scaling Data Quality for Trusted Machine Learning, AI and Analytics
    Scaling Data Quality for Trusted Machine Learning, AI and Analytics
    Marco de Jong, Data Quality Director at Precisely Jun 9 2020 11:00 am UTC 60 mins
    Successful business initiatives today rely on higher volumes of data — from more sources than ever — processed across divergent, hybrid architectures. And, of course, the quality of that data must be trusted.

    With recent studies indicating that 80% of AI and machine learning projects are failing due to data quality related issues, and most business executives don’t fully trust their data, it’s critical to think holistically about this fact. This is not a simple topic – issues in data quality can occur throughout from starting the project through to model implementation and usage.

    To have confidence in decision-making, regulatory compliance and more, enterprises require data quality tools that can handle these growing and complex data sets.

    Join this webinar to learn about the latest advancements in industry-leading data profiling and data quality at scale, designed specifically to meet the challenges presented by today’s data environments.

    Topics to be covered include:

    • Understanding and addressing critical data quality issues and requirements

    • Getting insight into big data, relational, and text-based data sources for rapid understanding of your data sources

    • High-scale, high-performance execution for critical data quality processes including global data enrichment and multi-domain entity resolution

    • Consistent data quality processing across traditional, distributed and cloud environments
  • A Scalable Infrastructure for Advanced Analytics and AI
    A Scalable Infrastructure for Advanced Analytics and AI
    Dr. Florian Baumann, UDS CTO Dell Technologies (Specializing in Automotive and AI) Jun 9 2020 12:00 pm UTC 60 mins
    Development AI and Analytics solutions is a massively complex process, requiring management of vast data sets and data management capabilities. In turn, this leads to subsequent iterative development using algorithm performance testing against defined test cases, and development of real-time inference engines driven by deep Neural Networks via the process of Machine Learning and Deep Learning.

    Innovation in algorithms, toolchains, annotation services and access to public training data sets makes it desirable to be able to participate in the development ecosystem, whilst still carefully managing security and access to highly-valuable and company confidential information.

    An approach to use a scalable architecture that also offers access to multiple public cloud services at the lowest cost, with the greatest agility whilst still enabling individual companies to innovate and accelerate the process is essential to take a leading position in this market.
  • Soluções em saúde Notifier / ESSER / Xtralis
    Soluções em saúde Notifier / ESSER / Xtralis
    Raafel Tridade Jun 9 2020 1:00 pm UTC 120 mins
    Proteção contra incêndio da Honeywell aplicada a ambientes do setor de saúde
  • Connect to SupportAssist for business PCs
    Connect to SupportAssist for business PCs
    Stephen Young | Dell Technologies Jun 9 2020 2:00 pm UTC 60 mins
    Connect to SupportAssist for business PCs – Learn how to maximize your ProSupport Suite for PCs experience

    This webinar series shows the SupportAssist for business PCs features as part of the ProSupport Suite for PCs. IT Managers can learn how to get connected with a live deployment demonstration and how to manage their Dell fleet in TechDirect, Dell’s online self-service portal. Experience access to insights and tools that deliver best-in-class PC performance and fast issue resolution to your team so they can work anywhere, anytime, without the stress of technology hiccups.
  • Introduction to IoT Technologies
    Introduction to IoT Technologies
    Jock Reed, Developer Advocate, Cisco DevNet Jun 9 2020 3:00 pm UTC 60 mins
    Through this webinar you will learn the technologies you need to know to make working with IoT straight forward and easy. You will learn about the most commonly used protocols for communication in IoT, you will learn about which devices are good to get started with, and you will learn how to build IoT applications in the ever-evolving world of IoT. This session will have light coding and will have live examples of using IoT.
  • [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change
    [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change
    James Miller, Solutions Engineer (AlgoSec) Jun 9 2020 3:00 pm UTC 45 mins
    With increased attack surfaces created by the need to work from home, security management and continuous compliance are more important than ever in government agencies and those supporting them.

    Agencies are undertaking digital transformation initiatives and moving to public and private clouds. The current crisis has only accelerated these critical initiatives. Agencies must protect applications and data in periods of rapid change.

    In this live demo, we will show you how to accelerate change while securing your government network and its critical applications.

    In the session, learn how to:
    • Model your heterogeneous network to surface compliance, policy, and zone to zone traffic risks
    • Create an accurate application dependency model to understand risks, vulnerabilities, incidents, and prioritize remediation efforts
    • Gain control of server and application migration projects and automate provisioning to assure continuous compliance and reduce outages
    • Maintain compliance with critical regulations and internal standards, while effectively documenting changes so you remain audit-ready
    • Associate the new rules and changes with their related business applications, in order to enable recertifications and secure decommissioning
    • Empower responders to quickly visualize the criticality of incidents and reduce their impact on the organization rapidly
  • Take Control of Your Cloud Environments
    Take Control of Your Cloud Environments
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director Jun 9 2020 3:00 pm UTC 60 mins
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • The Best of All Worlds - Integrated Global Workflows with Cloudian and eMAM
    The Best of All Worlds - Integrated Global Workflows with Cloudian and eMAM
    eMAM- Chuck Buelow: VP of Business Development, Cloudian-Christopher Cambridge: Solutions Architect Jun 9 2020 3:00 pm UTC 60 mins
    This webinar will explore how a cloud-enabled media asset management platform and an on-prem S3 object storage system combine to create a versatile and cost-effective distributed production solution. eMAM inc. is a well well-respected solution for connecting creative people regardless of their physical location. Cloudian Hyperstore provides a low cost, high density, means of storing large scale volumes of media data. Together they lay the foundation for a hybrid-cloud workflow that optimizes costs while empowering remote crews to collaborate across the globe.

    -Store media online and make available by utilizing low-cost object storage
    -Search through assets using an intuitive web-based interface
    -Share media with crew members on any device worldwide
    -Tag media with custom and AI auto-generated metadata
    -Create hybrid-cloud workflows that mix on-prem and cloud solutions
    -Eliminate tape as a backup and archiving data destination
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester Jun 9 2020 4:00 pm UTC 60 mins
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    - MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    - Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    - Impact of environmental drift on your security posture and how to plan for it
    - Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>