Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Don’t know where to start with migrating to the cloud? Here’s one answer.
    Don’t know where to start with migrating to the cloud? Here’s one answer.
    Ensono Recorded: Feb 15 2019 3 mins
    Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.

    Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.

    Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
  • What are containers?
    What are containers?
    Stephen Dixon Recorded: Feb 15 2019 22 mins
    UK Public sector organisations have IT requirements that are evolving. Techniques such as containerisation, continuous integration and infrastructure-as-code have significantly increased the pace and agility of modern development teams.

    Correct deployment of these techniques can enable deployment of new features many times a day, so that business value is achieved in the shortest time possible.

    As a result, UKCloud recognise that there is a need for a fully optimised Platform as a Service offering which enables Developers to push applications straight to the cloud all without having to concern themselves with the management, support and configuration of underlying infrastructure

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Priya Shivakumar, Director of Product, Confluent + Ryan Lippert, Product Marketing, Google Cloud Recorded: Feb 14 2019 57 mins
    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka® service, to migrate to Google Cloud Platform. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    Register now to learn:
    -How to take the first step in migrating to GCP
    -How to reliably sync your on premises applications using a persistent bridge to cloud
    -How Confluent Cloud can make this daunting task simple, reliable and performant
  • Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera Recorded: Feb 14 2019 56 mins
    Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.

    Datera is the only true, software-driven data services platform that:

    •Powers modern application environments at global scale
    •Provides game-changing data orchestration and automation with enterprise-class performance
    •Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
    •Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions

    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
  • How PhoenixNAP Streamlines Data Protection with Veeam and Cloudian
    How PhoenixNAP Streamlines Data Protection with Veeam and Cloudian
    Sam Fawaz, Cloud Solutions Architect; Amit Rawlani, Dir. of Tech Alliance, Cloudian; William Bell, EVP of Product, PhoenixNAP Recorded: Feb 14 2019 41 mins
    Storage admins today manage ever-increasing data volumes in a 24x7, zero-downtime environment. Protecting these critical assets – while maintaining service levels, compliance, and security across all locations – has never been more costly and complex. Excessive backup times and unmet RPO/RTO SLAs potentially lead to data loss and downtime.

    Join us for a live webcast to learn how PhoenixNAP streamlined their backup and storage services with Veeam and Cloudian to provide:

    • Flexible data protection options for all of your workloads – including for VMware and Hyper-V
    • Improved operational efficiencies, including RPO/RTO service levels
    • Optimized data storage for scale and performance
    • Simple and unified control and visibility of data
    • Protection from ransomware

    Live Webcast: Thursday, February 14th at 10am PST / 1pm EST / 6pm GMT
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Recorded: Feb 14 2019 56 mins
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • Arrival of Cloud-Managed Gateways
    Arrival of Cloud-Managed Gateways
    Elodie Huang, IoT Embedded Solution Manager, Supermicro & Magnus Almquist, VP Business Development, ZEDEDA Recorded: Feb 14 2019 45 mins
    Supermicro and ZEDEDA solutions deliver cloud-managed devices with password-less installation to reduce the costs of deploying and managing geographically widespread edge devices. Join this webinar to learn about:
    • New Supermicro Cloud-Managed Gateway solutions designed to enable business' to drop-ship and instantly provision Supermicro devices at thousands of locations.
    • One-click mass updates, real-time visibility of every device and disaster recovery at every location, all centrally controlled from the cloud
    • Securely adding new services to edge gateways and how they can be as easy to deploy and update as adding an app to your smartphone.
  • The Perils of Point Products – Why Consolidating Backup and Recovery Makes Sense
    The Perils of Point Products – Why Consolidating Backup and Recovery Makes Sense
    Dave Hiechel, Eagle Technologies and Greg Bennett, Commvault Recorded: Feb 14 2019 30 mins
    Backup and recovery has become increasingly complex due to the continued exponential growth of data and the need to protect it across physical, virtual, endpoint, and cloud environments. In response, IT has implemented solutions to address each of these use cases. But what started out as a noble effort to protect data with ‘optimized’ solutions has morphed into a convoluted mess of point products, each with its own interface, capabilities, and hardware and software infrastructure. These data silos increase complexity and make recovery challenging. Bottom line, this is unsustainable.

    You need a complete solution that can address each of these uses cases without increasing complexity in your environment. In this webinar, you’ll learn how Commvault Complete Backup & Recovery:

    - significantly reduces your management complexity
    - improves operational efficiency
    - lowers costs vs. managing multiple point products so you can focus your valuable IT resources on more strategic initiatives
  • From Steel Manufacturing to Farming: Bring In Cutting-Edge Analytics
    From Steel Manufacturing to Farming: Bring In Cutting-Edge Analytics
    Dr. Anya Rumyantseva, Data Scientist, Solution Engineering Recorded: Feb 13 2019 39 mins
    The transition from descriptive to predictive & prescriptive analytics is speeding up across digitally native industries, while more traditional industries are lagging behind. This transition often requires usage of machine learning techniques and a variety of data formats. Many companies find it difficult to complete. In this webinar, we review barriers for implementation, best practices, interesting use cases and success stories coming from steel and oil industries. Also, we will show how IoT data can be used to predict health problems of cows at farms. Moooving to cutting-edge analytics is possible for everyone!
  • Five Cloud Deployment Mistakes that Will Cost You
    Five Cloud Deployment Mistakes that Will Cost You
    Jim Meehan, Director of Product Marketing Recorded: Feb 13 2019 34 mins
    With physical network infrastructure moving to the cloud, it’s easy to think that networks are instantly faster, more reliable, limitless, and cheap. However, the reality is that cloud technology can be complex, especially when it comes to networking. Combined with the rapid pace of deployment and lack of visibility into how cloud resources are being utilized, it’s easy to make costly mistakes.

    Please Join Jim Meehan, Kentik Product Marketing Director, to discuss five network-related cloud deployment mistakes that you might not be aware of, but can negate the cloud benefits that you’re hoping to achieve.
    Mistake #1 - Duplicate services and unknown dependencies
    Mistake #2 - Traffic or request hair-pinning
    Mistake #3 - Unnecessary inter-region traffic
    Mistake #4 - Missing compression
    Mistake #5 - Internet traffic delivery

    In this webinar, we will also advise how to avoid these top cloud deployment mistakes with pervasive visibility.
  • Why Composable Infrastructure?
    Why Composable Infrastructure?
    Philip Kufeldt, Univ. of California, Santa Cruz; Mike Jochimsen, Kaminario; Alex McDonald, NetApp Recorded: Feb 13 2019 60 mins
    Cloud data centers are by definition very dynamic. The need for infrastructure availability in the right place at the right time for the right use case is not as predictable, nor as static, as it has been in traditional data centers. These cloud data centers need to rapidly construct virtual pools of compute, network and storage based on the needs of particular customers or applications, then have those resources dynamically and automatically flex as needs change. To accomplish this, many in the industry espouse composable infrastructure capabilities, which rely on heterogeneous resources with specific capabilities which can be discovered, managed, and automatically provisioned and re-provisioned through data center orchestration tools. The primary benefit of composable infrastructure results in a smaller grained sets of resources that are independently scalable and can be brought together as required. In this webcast, SNIA experts will discuss:

    •What prompted the development of composable infrastructure?
    •What are the solutions?
    •What is composable infrastructure?
    •Enabling technologies (not just what’s here, but what’s needed…)
    •Status of composable infrastructure standards/products
    •What’s on the horizon – 2 years? 5 Years
    •What it all means
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Recorded: Feb 12 2019 57 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.

    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.

    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Feb 12 2019 49 mins
    Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
    • Who are the right providers?
    • What are the critical factors to consider in selecting one?

    This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
  • Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Nathan Rader, Director of NFV Strategy, Canonical Recorded: Feb 12 2019 30 mins
    The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
    • Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
    • Redevelopment path of VNF for containers
    • Laying the groundwork for container technology: proactive planning and prep
    • The impact of containers on strategy for 5G, edge computing, AI, and blockchain
    • Components for core certifications, portability and kubernetes distributions
    • Use cases and deployments
  • Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Parker Sinclair Sales Engineer, Druva Inc. Recorded: Feb 12 2019 20 mins
    Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?

    Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!

    During this demo you'll learn how to:

    - Provide global protection for enterprise server and virtual workloads
    - Reduce total cost of ownership (TCO) by up to 60%
    - Isolate and quickly restore data during infrastructure attacks
    - Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
  • IT Service Intelligence for Improved Business Monitoring – 15-minute webinar
    IT Service Intelligence for Improved Business Monitoring – 15-minute webinar
    Ian Hartley, Principle Engineer, Syncsort Recorded: Feb 11 2019 18 mins
    View this 15-minute webinar to see how you can broaden the scope of ITSI in Splunk to include mainframe and IBM i log data - achieving end-to-end visibility into application health and performance…

    When an application goes down or IT services are delayed, your business can grind to a halt. It’s important to have a view of operational data from across all of your systems so you can identify and fix problems quickly.

    Splunk IT Service Intelligence (ITSI) is a monitoring and analytics solution that gives visibility across IT infrastructures and business services. By proactively watching streams of machine data it can detect when something starts to step out of line, and more importantly, give you time to correct problems before they have a negative impact.

    But in today’s enterprise IT environments, systems can span multiple technology stacks and platforms. So, what if you have a mainframe or IBM i server? Can you bring this onto the surveillance radar of ITSI? With Syncsort Ironstream® you can.
  • Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Daniela Fusaro, Senior Solutions Architect Recorded: Feb 8 2019 20 mins
    Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.

    Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.

    Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.

    Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.

    Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.

    An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.

    Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.

    Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
  • In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    Nirav Shah Sr. Director, Product & Solutions & Stephen Watkins, Principal Security Architect, Secure SD-WAN Recorded: Feb 8 2019 47 mins
    SD-WAN was the most sought out technology in 2018. Organizations eagerly adopted it to replace legacy WAN edge products. SD-WAN provides the application visibility to enable digital transformation at enterprise branches. However, many solutions largely lack essential security.

    Watch this webinar.to learn:

    - How to enable enterprise branches by creating an SD-Branch
    - Third Party analysis and outlook for the future of SD-WAN
    - Multiple use cases and examples that demonstrate the cost savings and unified management benefits of SD-WAN.
  • Webinar: Key Lessons from an advanced Multi-Vendor NFV Trial
    Webinar: Key Lessons from an advanced Multi-Vendor NFV Trial
    Kiran Sirupa Recorded: Feb 7 2019 17 mins
    PoC combined Anuta Orchestrator, HPE Helion OpenStack, Virtual Router (VRS) and HPE DCN SDN controller.
  • Event-Driven Network Security & Control - Insight from the IBM Cloud NetOps Team
    Event-Driven Network Security & Control - Insight from the IBM Cloud NetOps Team
    Nathan Newton, IBM Cloud network developer, and Gerard Sheehan, Cisco product manager Recorded: Feb 7 2019 34 mins
    Attend this 30-minute webinar to learn how the network team at IBM Cloud uses SaltStack event-driven automation to increase operational efficiency, enhance visibility into current state, streamline deployments, and to proactively and reactively secure network infrastructure. Cisco, a primary networking vendor for IBM Cloud, will join the webinar to share its contributions to the project's success through a native integration between Cisco NX-OS and SaltStack network automation. Learn how an event-driven approach to software-defined networking provides unparalleled control and security at scale for enterprise network operations teams.
  • 5 steps to make your Box account GDPR Ready
    5 steps to make your Box account GDPR Ready
    Vaishnav Gorur, Box | Morgan Littell, Box | Ling Wu, Box  Recorded: Feb 7 2019 46 mins
    When the EU General Data Protection Regulation (GDPR) went into effect in May 2018, there was a lot of confusion about its impact. Today, the picture is more clear: multi-million dollar fines have been levied and companies have learned just how costly non-compliance with GDPR can be.

    The good news is that Box is GDPR-ready so that all customers can use Box as the Cloud Content Management platform to facilitate their GDPR compliance program. Watch our webinar as we look at how to meet GDPR standards and protect yourself. You'll learn:
    -How to set up your Box account for GDPR, step by step
    -How to support key GDPR requirements like the Right to be Forgotten
    -How to formalize your usage of Box for GDPR with the Box Data Processing Addendum (DPA)
  • Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Recorded: Feb 7 2019 52 mins
    Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
  • Workshop HYCU: la solution de sauvegarde dédiée pour NUTANIX
    Workshop HYCU: la solution de sauvegarde dédiée pour NUTANIX
    Xavier Stern, Territory Director Southern Europe, HYCU, Inc. Feb 19 2019 9:00 am UTC 90 mins
    Nous organisons un Workshop de notre solution HYCU solution dédiée pour NUTANIX
    Hycu est une solution de sauvegarde dédiée NUTANIX ( AHV, ESX), permettant de venir en complément de la Data protection délivrée en natif par NUTANIX.
    Certifiée AHV ( HYCU développe en premier sur Acropolis) et ESX , Nutanix Files, Volume Groupes, CALM….
    Hycu, Strategic Technology Partner Nutanix.
    Nutanix utilise la solution Hycu pour ses sauvegardes
    Bonne journée
  • Accelerate your Digital Transformation through PDF Productivity and eSigning
    Accelerate your Digital Transformation through PDF Productivity and eSigning
    David Bloxham, SoftwareONE; Kevin O'Donnell, Nitro Feb 19 2019 2:00 pm UTC 45 mins
    Successful digital transformation begins by equipping all knowledge workers with strategic, easy-to-use tools. SoftwareONE and Nitro can provide you with tools to reduce printing and enable 100% digital workflows through PDF productivity, eSigning and usage insights.

    During this webinar, Nitro’s Director of Product, Kevin O’Donnell, will explain how these tools can be easily implemented and how they can benefit organisations of every size.

    • Learn the benefits of going paperless. Aside from saving trees a paperless office can help greatly with GDPR compliance and protects the confidentiality and integrity of documents.

    • eSigning tools are only available to a fraction of knowledge workers today; Kevin will discuss why this is the case and how this tool can be extended across the entire organisation in an affordable way.

    • Can every industry and organisation digitize their workflows? We will share how companies in various industries are using Nitro as part of their digital transformation initiative.

    Kevin has 16 years of experience in technology innovation, strategic leadership and delivering scalable, breakthrough global solutions. Kevin leads Nitro’s Product Management and UX teams to deliver innovative Digital Transformation breakthroughs across all platforms.
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Sarah Beaudoin, Product Marketing Manager, Druva Feb 19 2019 4:00 pm UTC 44 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • Accelerating Virtual Infrastructure Deployment
    Accelerating Virtual Infrastructure Deployment
    Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / Intel Feb 19 2019 4:00 pm UTC 60 mins
    Workloads are shifting across platforms that span from entry-level to extreme performance.
    Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
    More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.

    This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:

    •Simplify Network Evolution using platforms verified as Intel® Select Solutions
    •Get on faster, more efficient deployments using tested white box servers
    •Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
  • Workshop HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    Workshop HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    Xavier Stern, Territory Director Southern Europe, HYCU, Inc. Feb 20 2019 9:00 am UTC 90 mins
    Buen día,
    Deseamos invitarle a nuestro workshop de HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    HYCU es la única solución de respaldo y seguridad dedicada a NUTANIX (AHV, ESX), para complementar la protección de datos proporcionada de forma nativa por NUTANIX.
    Certificado en AHV (HYCU se desarrolla en primer lugar en Acrópolis) ESX, Nutanix Files, Volume Groups, y CALM .
    HYCU, socio tecnológico estratégico de Nutanix.
    Nutanix utiliza la solución de HYCU para sus copias de seguridad.
    Los esperamos!
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Micro-Segmentation based Network Security Strategies
    Micro-Segmentation based Network Security Strategies
    Yoni Geva, Product Manager Feb 20 2019 3:00 pm UTC 60 mins
    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:

    • Segmentation challenges
    • Micro-segmentation explained
    • Micro-segmentation strategy benefits
    • Micro-segmentation strategy development – first steps
    • Implementation Do’s and Don’ts
  • Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    David Neugebauer, Sr. Business Development Mgr, Fujitsu Feb 20 2019 4:00 pm UTC 60 mins
    Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Feb 20 2019 5:00 pm UTC 45 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Support Your Continuous Operations by Architecting Oracle Database
    Support Your Continuous Operations by Architecting Oracle Database
    Tony Palmer, Enterprise Strategy Group; Marcus Thordal, Brocade; Eduardo Freitas & Tony Huynh, Hitachi Vantara Feb 20 2019 5:00 pm UTC 60 mins
    Join Tony Palmer, senior analyst from Enterprise Strategy Group, and technical experts from Hitachi Vantara and Broadcom as we discuss how customers can achieve strict zero RTO/RPO objectives for mission-critical Oracle database deployments.

    •Join experts from Enterprise Strategy Group, Hitachi Vantara and Broadcom as we discuss how you can achieve strict zero RTO/RPO SLO’s for your Oracle database deployment.
    •Learn best practices to maximize Oracle performance on Hitachi Virtual Storage Platform (VSP) and Hitachi Unified Compute Platform (UCP).
    •Ask your toughest Oracle questions and, if you can stump the experts, win a prize!
  • FICON 201
    FICON 201
    Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO Technologies Feb 20 2019 6:00 pm UTC 75 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.

    The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.

    Join this live FCIA webcast where you’ll learn:

    - How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
    - The evolution of the FICON protocol optimizations
    - How FICON adapts to new technologies
  • 8 ROI Benefits of APM
    8 ROI Benefits of APM
    John Armstrong, Head of Product Marketing, Pepperdata Feb 20 2019 6:00 pm UTC 30 mins
    For most enterprises, APM is considered an essential element of IT operations, bridging production and development with IT and digital business. As companies invest in new technology and projects in their digital transformation journeys, it’s critical to understand the ROI value of those investments.

    This webinar will look at eight ROI benefits of APM — both financial and non-financial — that organizations need to consider when evaluating APM solutions. These include increased developer productivity, reducing downtime, improving business continuity and more.

    Attendees will learn:
    - 8 elements to consider when assessing APM solutions
    - How to evaluate financial and non-financial benefits to technology solutions
    - How leading organizations measure ROI, often through hard lessons learned
  • 5 Things Every SecOps Team Wants Their NetOps Team to Know!
    5 Things Every SecOps Team Wants Their NetOps Team to Know!
    David Gehringer, Dimensional Research and Jon Kies, Micro Focus Feb 20 2019 6:00 pm UTC 60 mins
    Your Network Operations team knows that maintaining security is an increasingly large part of the job—and that working collaboratively with the Security Operations team is essential.

    But have you ever wondered what the security team thinks you should be doing better or how you can collaborate more effectively to solve complex risk management issues?

    Join us on this webcast as David Gehringer of Dimensional Research shares key insights from his research study with security and network professionals.

    You’ll learn what network teams are doing well—and what they can improve in order to ensure ongoing success.
  • Future IoT Growth Opportunities in Colombia
    Future IoT Growth Opportunities in Colombia
    Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & Sullivan Feb 21 2019 4:00 pm UTC 60 mins
    IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.

    Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.

    Key Takeaways:

    · What are the key verticals in this market?
    · How will the revenue shares of the hardware, software, services, and connectivity segments change?
    · What are the top three drivers for IoT investments?
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Feb 21 2019 4:00 pm UTC 60 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Mark Gaydos, CMO, at Nlyte Feb 21 2019 5:00 pm UTC 60 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    You will learn:

    - Security Officers report more than 10% of assets on network are undetected
    - Only 10% of IT Operations managers believe that all assets are detectable and monitored
    - 6% of Financial Officers feel they have no risk from a vendor software audit
    - IT Managers report more than 69% of assets not current with software and patches
    - 87% of Organizations believe 10% of assets or more are not in their CMDB
  • Architecting High-Performance Storage with Datera Data Automation on HPE Servers
    Architecting High-Performance Storage with Datera Data Automation on HPE Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Feb 21 2019 5:00 pm UTC 105 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, Tigera Feb 21 2019 6:00 pm UTC 60 mins
    Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
  • A Deep Dive of Data Lakes with Vertica for SQL on Hadoop
    A Deep Dive of Data Lakes with Vertica for SQL on Hadoop
    James Clampffer and Anatoli Shein, Vertica Feb 21 2019 6:00 pm UTC 60 mins
    If you use Vertica, you already know that it’s a high-performance MPP analytical database. But, did you know that Vertica is also a highly performant query engine?

    Join us for this Webcast to learn how Vertica for SQL on Hadoop offers the fastest and most enterprise-ready way to perform SQL queries on your Hadoop data. We’ve leveraged our years of experience in Big Data analytics and opened up our platform to use the full power of the Hadoop cluster.

    In this webcast, you’ll learn to take advantage of our open source contributions to the Apache community, ORC and Parquet file readers/writers, and various connectors and features to accelerate the exploration of your growing data lakes.
  • Streamline Software Procurement Processes with PyraCloud
    Streamline Software Procurement Processes with PyraCloud
    Rhys Williams Feb 22 2019 11:00 am UTC 45 mins
    Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.

    This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.

    Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.

    This is why we developed the new Procurement Workbench in PyraCloud.

    We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.

    Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:

    • Simplifying the management of quotes, orders and invoices
    • Improving product search capabilities across multiple products and services in global catalogues
    • Tracking software previously purchased, product favourites and subscriptions
    • Consolidating multiple aspects of the procurement process in one place

    PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Feb 22 2019 5:00 pm UTC 45 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Alessandro Barbieri, VP Product Management at Pluribus Networks Feb 26 2019 4:00 pm UTC 60 mins
    In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.