Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Transform IT with Storage and Data Protection to deliver maximum ROI
    Transform IT with Storage and Data Protection to deliver maximum ROI Steve Spataro, Garret Van Siclen Recorded: May 23 2018 60 mins
    If your information infrastructure is not robust and flexible, then business agility is reduced, managing applications is time consuming, and total cost of ownership is higher than necessary. Learn how Dell EMC’s storage and data protection solutions help organizations like yours by leveraging an information infrastructure that is designed for change and delivers both high performance and high availability.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director Recorded: May 23 2018 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash
    Iguazio Presents: Delivering In-Memory Database Performance on Intel Flash Ori Modai, VP R&D, Iguazio Recorded: May 23 2018 60 mins
    Using Flash to substitute memory in databases can substantially increase density, reduce costs and improve durability. However, most databases access Flash through traditional storage and file system layers, utilizing only a fraction of Flash’s potential speed. As a result, companies keep using in-memory databases with expensive memory and limited data capacity and resiliency. Ori Modai will explain how to build real-time intelligent apps which run across large data sets and reach in-memory database performance with Intel’s NVMe Flash. He will describe the challenges posed by traditional database and storage architectures and will present a new database design which maximizes the value of flash, reaching 20x lower costs and 100x higher density. The session will include a technical deep dive followed by real-world customer use-cases in the fields of IoT edge and online AI applications.
  • Semantic AI: Bringing Machine Learning and Knowledge Graphs Together
    Semantic AI: Bringing Machine Learning and Knowledge Graphs Together Kirk Borne, Principal Data Scientist, Booz Allen Hamilton & Andreas Blumauer, CEO, Managing Partner Semantic Web Company Recorded: May 23 2018 64 mins
    Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."

    This webinar covers:

    - An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
    - How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
    - How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
    - Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
  • GDPR - Is Data Still the New Currency?
    GDPR - Is Data Still the New Currency? Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: May 22 2018 37 mins
    Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
  • Security in the Age of Hybrid Cloud
    Security in the Age of Hybrid Cloud Ajay Uggirala and Marty Jost — Product Marketing, Imperva Recorded: May 22 2018 45 mins
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • XtremIO X2: An Architectural Deep Dive
    XtremIO X2: An Architectural Deep Dive Rami Katz Recorded: May 22 2018 47 mins
    XtremIO’s metadata-centric architecture is the base for delivering always-on inline data services and consistent performance. XtremIO X2 builds on that architecture delivering more performance, capacity, data services and simplicity. This session will provide deeper dives into many XtremIO X2-specific architectural innovations like Write Boost, multi-dimensional scaling, flexibility of using larger drives, enhanced management simplicity, serviceability and replication.
  • Delivering Virtual Services to Enterprises from the Service Provider Cloud
    Delivering Virtual Services to Enterprises from the Service Provider Cloud Daniel Teichman,Sr Solutions Marketing Manager and Walter Kenrich, Director, Solutions Marketing [Ribbon Communications] Recorded: May 22 2018 53 mins
    As the service provider adoption of network functions virtualization (NFV) continues, new business opportunities expand for Service Providers.

    This webinar will explore the rationale, value, and implementation options of using NFV and uCPE/vCPE models to deliver session border control (SBC) as a service.
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer Recorded: May 22 2018 72 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • SDNs: Managing Security across the Virtual Network
    SDNs: Managing Security across the Virtual Network Omer Ganot, Product Manager Recorded: May 22 2018 31 mins
    Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.

    Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.

    Key topics include:

    • How to securely discover, map and migrate application connectivity to the SDN

    • Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass

    • Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN

    • Best practices for managing security policies across Cisco ACI and VMware NSX

    • Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • Cloud Bursting with One-Click Simplicity
    Cloud Bursting with One-Click Simplicity Karthik Balachandran, Technical Solutions Leader, Aviatrix; Chris Brown, Solutions Marketing Manager, Nutanix Recorded: May 17 2018 39 mins
    Using the public cloud for temporary or elastic workloads enables flexibility and agility to address today’s enterprise compute needs. Implemented correctly, a hybrid architecture assures cloud-like responsiveness that pleases end users while maintaining the procedures that any well-run organization needs. However, implemented poorly or left to individuals, it becomes a budgetary and security exposure, frustrating the user and putting the company at risk.

    Join Nutanix and Aviatrix and learn how Calm and Aviatrix’ Cloud Networking solution will simplify and automate the placement of applications and temporary workloads in to the Public Cloud (Amazon Web Services, Google Cloud Platform, and Azure). With Aviatrix and Nutanix the cloud becomes a seamless extension of your datacenter allowing you to use the cloud when it is needed and bring workloads back on premises where it makes sense. Learn how Nutanix and Aviatrix are making the cloud, and networking to it, as invisible as Nutanix has made virtualization and storage in your data center.
  • Facilitating Information Governance for Rapidly Scaling Datasets
    Facilitating Information Governance for Rapidly Scaling Datasets Jacques Sauvé, Director, NetGovern Partner Enablement & Ben Canter, Caringo Global Sales Director Recorded: May 17 2018 47 mins
    No organization wants to lose data or waste precious time searching for it when it is needed. And, we all know the costly ramifications of failing to comply with governmental regulations: HIPAA/HITECH, PCI, Freedom of Information Act, GDPR, and many more. Join Jacques Sauvé, IGP of NetGovern, a leader in Information Governance software, and Ben Canter of Caringo, secure scale-out storage, to learn how compliance with current, large rapidly scaling data sets requires tighter integration between information governance and underlying storage infrastructure.
  • How Cyber (measured in dollars) Earns a Spot on the Risk Register
    How Cyber (measured in dollars) Earns a Spot on the Risk Register Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security Recorded: May 17 2018 47 mins
    Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.

    Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
  • A Bias for Action: Security Analytics for the Advanced SOC
    A Bias for Action: Security Analytics for the Advanced SOC Jon Oltsik, Sr. Principal Analyst, ESG, and Barbara Kay, Sr. Dir. Security, ExtraHop Recorded: May 17 2018 64 mins
    Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.

    The foundation of a successful security architecture in this model requires:
    - Rich, trustworthy data covering all aspects of the environment
    - Consolidated data sources and analytics processes
    - Automated investigation and response capabilities
    - Integration between tools and services for total coverage of every critical asset and data set.

    In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • Dell EMC Unity: Update & Architectural Overview
    Dell EMC Unity: Update & Architectural Overview Ji Hong Recorded: May 17 2018 46 mins
    Dell EMC Unity has been designed and engineered from the ground-up to be radically simple, flexible and unified. Come hear and see what's new. This session will look at how Dell EMC Unity delivers both advanced features (such as, built-in encryption, inline data reduction, forever snapshots, storage analytics – CloudIQ, cloud tiering...) and high performance in just 2U.
  • Technology Trends & Use Case in AI
    Technology Trends & Use Case in AI Camberley Bates, Evaluator Group; Frederic Van Haren, Evaluator Group; Keith Kirkpatrick, Tractica Recorded: May 17 2018 58 mins
    What are the top use cases in AI? Or should we say, what will be the top use cases in the next 5-10 years? How are companies using the disciplines of Machine Learning, Deep Learning and HPC? What is needed to enable faster adoption? What technology changes are expected or required? Evaluator Group and Tractica, leading analyst firms on the topic of Artificial Intelligence come together to discuss these topics of market adoption and technology requirements.

    This is an INTERACTIVE session. We will start with short presentations then open up the Fireside chat. The audience is invited to submit their questions and participate in what will be a lively discussion.
  • LAN Standards, News & Trends: 2018 Update
    LAN Standards, News & Trends: 2018 Update Cindy Montstream, Legrand Recorded: May 17 2018 77 mins
    Join FOTC Standards Chair Cindy Montstream for an update on structured cabling standards.

    Attendees will earn one BICSI CEC.
  • Optimizing your data management in the cloud
    Optimizing your data management in the cloud Holger Kaercher, Cloud Business Development Manager, NetApp and Chris Priest ,Senior Consultant, Amido Recorded: May 17 2018 9 mins
    Join Holger Kaercher and Chris Priest on for a 1:1 interview on:
    - Unexpected challenges of managing data in the cloud
    - Managing and controlling your data, your way
    - Optimising wherever your data is stored
  • Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud
    Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud Robert Strechay - Senior VP Product, Zerto Recorded: May 17 2018 47 mins
    With the introduction of Zerto Virtual Replication 6.0, enterprises can now fully experience the true benefits that cloud technology has long promised.

    Listen in as Senior Vice President of Product, Rob Strechay reveals Zerto’s Game-changing technology so you can be ready to solve for cloud with a single solution.
  • Metrics drive behaviours: How to avoid common IT metric mistakes
    Metrics drive behaviours: How to avoid common IT metric mistakes Steve Morgan, Director, Syniad IT Recorded: May 17 2018 33 mins
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • Running IT as a Business
    Running IT as a Business Rob Akershoek, Solutions Architect at Shell Recorded: May 16 2018 47 mins
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!