Hi [[ session.user.profile.firstName ]]

End User Computing

  • Operational Excellence in the New Normal
    Operational Excellence in the New Normal
    Mitch Berk, Simon Perry, Darrly Miles, Dave Kofoed and Dany Leclerc Recorded: Nov 23 2020 49 mins
    As businesses continue their journey with remote work options for their task force, enabling access from BYO devices apart from corporate owned, providing the best user experience, securing and supporting their employee’s digital lifecycle becomes a challenge. Join us for this session and learn how to easily manage and support employees across environments using Workspace ONE Assist and Carbon Black.
  • Security Made Simple: Lunch & Learn Series Part 1 | HP Services
    Security Made Simple: Lunch & Learn Series Part 1 | HP Services
    Keri Atkins; NA PC Services Security BDM; Terry Van Roekel; Director AMS Security Services Recorded: Nov 23 2020 41 mins
    Traditional methodologies in securing the PCs have quickly become ineffective as an unintended consequence of the impact to IT resources by recent events. Hear from HP’s Security experts who will discuss how HP can help keep your organization safe by defending against cyberattacks without changing user behavior or increasing your IT Staff's workload.

    In this webinar, participants will:
    • Discover how you can implement a protection-first approach in your environment
    • Learn about HP’s industry-leading isolation, monitoring, and proactive solutions to secure your business
    • Determine the right Security solution for your needs

    Original Webinar Date: November 19th, 2020
  • Ransomware Survival Guide: Education
    Ransomware Survival Guide: Education
    Ritesh Agrawal, CEO, Airgap Networks Recorded: Nov 23 2020 30 mins
    Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.

    In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.

    In this BrightTalk session, Edu tech and IT will learn:
    How ransomware is surging in a remote/online learning environment?
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms?
    What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Airgap CEO Interview with Neil C. Hughes
    Airgap CEO Interview with Neil C. Hughes
    Neil C. Hughes Recorded: Nov 20 2020 20 mins
    Exclusive Tech Talk Daily Podcast with Airgap Networks CEO Ritesh Agrawal
  • Think Big, Start Small, Scale Fast: The Journey to Digital Disruption
    Think Big, Start Small, Scale Fast: The Journey to Digital Disruption
    Susan Laine, VP of Strategic Technologies and Global Data Intelligence Advocate, ASG Technologies Recorded: Nov 19 2020 36 mins
    Don’t miss this replay of the EVOLVE20 Data Intelligence Keynote!

    Data-driven disruption is radically reshaping today’s markets and creating new ones. While many paths may help organizations reach digital maturity, the starting point is always the same – understanding your data environment.

    Sue Laine will share ASG’s approach to data maturity and how ASG customers using this approach can swiftly address new challenges and opportunities including retirement of the LIBOR exchange rates, emerging privacy regulations and advancing AI initiatives.

    As ASG’s Data Intelligence Customer Advocate, Sue speaks regularly with CDOs at the world’s most innovative companies. Her industry knowledge and insights are always entertaining and enlightening.
  • Micro clouds: Building your Kubernetes edge computing strategy
    Micro clouds: Building your Kubernetes edge computing strategy
    Alex Chalkias, Canonical; Jerry Ness, Dell; Collin LeGault, Dell Recorded: Nov 19 2020 49 mins
    Edge strategy is a challenge for many organisations working to define priorities, budgets and connect the edge fleet to their existing cloud infrastructure. Join Dell and Canonical to hear about how to maximise infrastructure benefits with an automated, micro cloud stack for running and scaling distributed computing.

    We will discuss:

    - The data centre at the edge, developed specifically for low-footprint, remote computing environments

    - Lightweight deployments at scale

    - Clustering Microk8s to create a base station

    - Automatic high availability with Microk8s for mission-critical workloads

    - Continuation of the edge strategy in the multi-cloud environment

    - Customer use case
  • BigFix Customer Focus: Fortune 100 Media Company
    BigFix Customer Focus: Fortune 100 Media Company
    Dan Wolff, BigFix Director of Products; Jim Slebodnik, Manager - Infrastructure Software Currency & Deployment Recorded: Nov 19 2020 17 mins
    Join us as we have a one-on-one conversation with Jim Slebodnik who operates at a Fortune 100 Media Company. We'll discuss how BigFix solves his enterprise's endpoint management issues and outperforms other products by reducing costs through automation and by providing easy near-real-time reporting.
  • Innovation in Government: Fighting Cyber Threats with Identity Management
    Innovation in Government: Fighting Cyber Threats with Identity Management
    Government Cyber Leaders Recorded: Nov 18 2020 52 mins
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • #9 How Automated Testing Helps You Build Better Products And Lowers Your TCO
    #9 How Automated Testing Helps You Build Better Products And Lowers Your TCO
    Sascha Mladenovic (Suitest) & Stefan Blickensdörfer (3SS) Recorded: Nov 18 2020 44 mins
    We are empowering operators & broadcasters to build better products and lower their TCO! Sascha Mladenovic (Suitest) and Stefan Blickensdörfer (3SS) underline in this Spotlight, how Automated Testing can contribute by reducing the cost of finding & fixing bugs. Join to learn about Testing, ask your questions and get to know more about:

    ➡️ How an Automated Testing setup for Smart TVs looks like
    ➡️ How Automated Testing contributes to DevOps
    ➡️ How your product quality increases by applying Automated Testing

    Let's create the Future of Entertainment together!
    https://3ready.tv
  • Bot Protection - how can you remove traffic that provides no business benefit?
    Bot Protection - how can you remove traffic that provides no business benefit?
    Justin Thorogood, Mgr. Partner Strategy - Ronan O'Brien Lead Systems Engineer, Andrew Scott , Senior SE Mgr. - CITRIX Recorded: Nov 18 2020 63 mins
    Bot Management is a security software feature that identifies whether a traffic request comes from a human or from a machine then controls or blocks non-human and other suspicious requests. Ideally you want your web site to generate as much revenue as possible, so if you can find a way to control the robots that crawl the web, you can serve more real customers with your site. Join our webinar to find out how - with a little help from Citrix - this can be simple.
  • Independent SD-WAN Visibility and Why You Need It
    Independent SD-WAN Visibility and Why You Need It
    Chris Siakos, Founder and CTO and Alex Henthorn-Iwane, VP of Marketing at Sinefa Recorded: Nov 17 2020 31 mins
    Adopting SD-WAN means that you’re relying on a combination of internal, external and Internet networks. These create operational blindspots, Neither traditional network monitoring nor SD-WAN tools into these dependencies, leaving your SD-WAN deployment at risk of poor application performance, degraded user experience, and lost business outcomes.

    Watch this webinar on why you need independent SD-WAN to overcome these visibility challenges. Learn five critical aspects of SD-WAN visibility that can ensure the success of your planning, deployment, and ongoing network operations.
  • On-line Privacy, Security, and Seamless Patient Experiences
    On-line Privacy, Security, and Seamless Patient Experiences
    Balraj Dhillon, Engagement Director - Key Accounts-Simeio & Baber Amin, West CTO-Ping Identity Recorded: Nov 17 2020 47 mins
    Your patients and members are today's consumers, and they expect seamless user experiences. But you can't meet their demands at the expense of security. You must remain a stalwart steward of protected health information (PHI) and personally identifiable information (PII). The distributed nature of healthcare delivery and R&D make this an especially difficult balancing act.

    View this webinar OnDemand to learn how Simeio Solutions, on the Ping Identity Platform, offered patients the privacy and security they needed in a real life healthcare portal.
  • Translating IT Monitoring into Human Experience
    Translating IT Monitoring into Human Experience
    Jon Hodgson, Principal Scientist, Aternity Recorded: Nov 17 2020 23 mins
    Employees and customers are increasingly reliant on the digital services provided to them, so understanding their relationship with that technology is critical to an organization’s success.

    In this session Jon Hodgson, Aternity’s Principal Scientist, will discuss their exciting vision for Digital Experience Management, which blends device-centric technical telemetry with user-centric telemetry & feedback to understand the true human impact of application issues.
  • The Forces Driving Digital Transformation
    The Forces Driving Digital Transformation
    Scott McIntyre, Senior Director, Product Management, ASG Technologies Recorded: Nov 17 2020 39 mins
    Today, many organizations are struggling to simply survive while others are beginning to rebound. Some are even thriving and accelerating their digital strategies while relying on a mission-critical Content Services platform to strengthen compliance and seize competitive improvements.

    In this webinar, we explore how Mobius Content Services plays a key role in enabling digital transformation and how new trends and capabilities — like collaboration, federation and cloud deployments — are enabling some of today’s largest enterprises to take challenges head on and accelerate their modernization initiatives.

    Join our experts and learn how to:
    ● Optimize collaborative experiences
    ● Automate Information Governance with policy-first approach
    ● Leverage modernized infrastructure deployments
  • Demonstration: Remote Access to macOS computers with Leostream
    Demonstration: Remote Access to macOS computers with Leostream
    Karen Gondoly, Leostream CEO Recorded: Nov 17 2020 12 mins
    Manage and connect users to macOS with Leostream. Demonstrating both PCoIP and NoMachine connections as well as the NoMachine remote collaboration feature. To learn more about Leostream and try it out with our fully-supported free trial, visit https://leostream.com.
  • Ubuntu Pro FIPS on Azure - Compliance made easy
    Ubuntu Pro FIPS on Azure - Compliance made easy
    Shaun Murphy - Senior Product Manager - Canonical & Jon Wall, Enterprise Security Executive - Microsoft Recorded: Nov 17 2020 31 mins
    With Azure, government, US government agencies and their partners have been able to combine unparalleled flexibility, breakthrough innovation, world class security and compliance. However when it comes to running a secure and compliant enterprise Linux on Azure, IT departments are often left with expensive options that sacrifice innovation for compliance. This presentation will discuss how Microsoft and Canonical, the publisher of Ubuntu, have collaborated to create a new way for government agencies to consume Linux on Azure.

    In this webinar you will learn how Ubuntu Pro FIPS provides:

    1. The latest libraries for developers and devops

    2. Out of the box security (no configuration, no patching): FIPS compliance and the largest open source security coverage

    3.Cloud like consumption on all instances: no license, no yearly fee
  • Smart Infrastructure Delivers Safety and Security Today and into the Future
    Smart Infrastructure Delivers Safety and Security Today and into the Future
    Wayne Arvidson, Willie Reed and Randy Lack Recorded: Nov 17 2020 30 mins
    Welcome back to the Dell Technologies Innovation Webinar Series. As your organization continues on the journey to incorporate smart infrastructure into your safety and security strategies, Willie Reed, General Manager, Safety and Security / Computer Vision and Randy Lack, Manager, Americas, Safety and Security / Computer Vision, Dell Technologies will share current perspectives on the deployment of modernized technology to build out your Safety and Security framework across multiple use cases. They will explore next-generation solutions that leverage the power of edge computing and connected analytics to transform the value safety and security to all stake holders across the business. Welcome to the world of computer vision, structured modern IT solutions, “smart spaces,” and more. Join the conversation, register today.

    What’s In It for You
    • See how the deployment of a modern AI and computer vision-based infrastructure can enhance your safety and security framework today and tomorrow
    • Learn how you can quantify your safety and security investments and move them from a cost center into a revenue stream for your organization
    • Discover how Dell Technologies safety and security solutions are already delivering value to organizations such as yours
    • Explore how computer vision is providing additional actionable insights and faster ROI - evolving via edge computing and connected analytics
  • The Extended Benefits of Single Sign-On Solutions
    The Extended Benefits of Single Sign-On Solutions
    Stas Neyman, Director of Product Marketing Recorded: Nov 17 2020 43 mins
    Today, Single Sign-On (SSO) is a de facto standard for managing employee access to applications and systems. SSO eliminates the need for individual passwords for each application or system account and replaces them with a single set of credentials. The obvious and immediate benefits of Single Sign-On include drastically improved end-user experience, simplified access to corporate resources, and more robust identity security controls.

    However, there are many additional, long-term benefits organizations can realize by implementing SSO solutions that are frequently overlooked during initial discussions. For example, with properly configured self-service tools, companies can significantly reduce their IT costs by reducing the number of password-related help-desk tickets and calls. In addition, SSO can eliminate the risk accounts that remain active when employees change roles or leave companies.

    In this webinar, we’ll discuss the short-term and long-term benefits of modern SSO solutions and highlight the functionality needed to realize these benefits.
  • 5 Bonnes Raisons pour alléger vos applications Mainframe
    5 Bonnes Raisons pour alléger vos applications Mainframe
    Avi Sellem, Content Expert, ASG Technologies & Marouène Makhloufi, Expert Avant-Ventes, ASG Technologies Recorded: Nov 17 2020 41 mins
    L’augmentation des coûts et le déficit de compétences Mainframe qui atteint un niveau préoccupant poussent les entreprises à évaluer une démarche de réduction de l’empreinte Mainframe.

    Par la rationalisation, la migration, le ré-hébergement, il est possible de réduire les coûts d'exploitation des applications grâce au transfert de certains services Mainframe tels que la gestion de contenu (archives, données du Legacy, etc…) vers des plateformes distribuées.

    Décommissionner, c’est réduire de manière conséquente les MIPS, et donc les coûts, valoriser les services sans compromettre la fiabilité et la sécurité.

    Fort de plusieurs dizaines d'années d'expérience en environnement Mainframe et leader dans la gestion de contenu avec la solution Mobius, ASG vous propose de découvrir lors de ce webinaire comment amorcer ce type de démarche autour de vos applications de gestion de contenu.

    Vous découvrirez au cours de ce webinaire :
    - Pourquoi réduire l’empreinte Mainframe ? Et comment ?
    - Quels en sont les freins ?
    - La technologie de migration Mobius Mainframe
    - Des cas d'usages réussis dans la banque et les assurances

    Participez à ce webinaire pour comprendre pourquoi et comment libérer les ressources Mainframe et améliorer les processus de modernisation et de numérisation dans votre entreprise.

    *Mainframe Monthly License Charge
  • VPN is Not Enough
    VPN is Not Enough
    Nathan Wittke (Manager, Commercial Sales) and Pete Lindley (Senior Specialist System Engineer) Recorded: Nov 16 2020 53 mins
    The events of the last few months have changed the way in which we work forever. This ‘New Normal’ has dissolved the perimeter of security and opened up even larger surface of attack if your Organisation is not prepared. ​In this session, discover how VMware Workspace ONE can protect your users, devices and data.
  • Demonstration: Using MFA with Leostream
    Demonstration: Using MFA with Leostream
    Karen Gondoly, Leostream CEO Recorded: Nov 13 2020 11 mins
    Demonstration of multi-factor authentication options in Leostream.
    Using Locations, enforce MFA for remote users.
    Support for SAML, Duo, and any identity provider that supports Radius including Okta, Duo as Radius, Ping ID and more.
  • Ask Me Anything:  Avoiding Privilege-Related Blindspots
    Ask Me Anything: Avoiding Privilege-Related Blindspots
    James Quick,Director-Solutions & Advisory, Simeio and Brian Chappell, Director-Product Management, Beyond Trust Recorded: Nov 13 2020 30 mins
    Joins us for #SimeioCoffeeTalks

    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work.
  • Accelerate Microsoft SQL Server w/ Storage Class Memory powered by Intel Optane
    Accelerate Microsoft SQL Server w/ Storage Class Memory powered by Intel Optane
    Chris Tobias - General Manager, Optane Solutions Division, Intel & Rambo Wang - Technical Marketing Engineer, HPE Storage Recorded: Nov 12 2020 62 mins
    Growing enterprise data is driving the need for increased system performance, yet most companies are limited in datacenter space or SysAdmin time. The latest acceleration technology – Storage Class Memory in the form of Intel® Optane™ solid state drives – increases system performance without increasing system footprint or administration.
    This session will show how demanding Microsoft SQL Server workloads, such as OLTP, benefit from a high performance caching layer that reduces read latency and speeds overall system responsiveness and performance. It will include best practices, lessons learned, and recent performance testing results across different storage platforms and configurations.
  • What to Do When Resources Go Down and Demand Goes Up: A Pandemic Story
    What to Do When Resources Go Down and Demand Goes Up: A Pandemic Story
    Jeff Cherrington, VP, Product Management, ASG Technologies Recorded: Nov 12 2020 55 mins
    Don’t miss this replay of the ASG EVOLVE20 Systems Keynote!

    During the pandemic, some enterprises have seen demand increase (securities trading processors, wine club home delivery, media streaming providers); others have seen demand decline.  Leaders in both camps tell ASG that resources are remaining fixed or declining, while customer and business demands continue to rise. The burden is magnified by a workforce that is now remote and geographically dispersed. 

    In his Systems Infrastructure Management keynote, VP of Product Management, Jeff Cherrington will discuss some of these cases and explain how enterprises are responding using data visualization and automation to bridge the gaps imposed by both a remote workforce and increasing demands for innovation.
  • Is Your Endpoint Environment Fully Managed?  Prove it!
    Is Your Endpoint Environment Fully Managed? Prove it!
    Dan Imbach, BigFix Marketing; Dan Corcoran, Director Mid-Atlantic Recorded: Nov 12 2020 28 mins
    5 Ways to Verify Your Endpoint Vulnerability Remediation is Working.

    Join us as we discuss the struggles that enterprises face with endpoint vulnerability remediation. From too many tools, too few resources, and unreliable and outdated reporting. We will demonstrate how the BigFix Platform can help you establish, and verify, sustained success in remediating endpoint vulnerabilities.
  • Securing Linux machines with AppArmor
    Securing Linux machines with AppArmor
    Mike Salvatore, Ubuntu Security Engineer II Nov 24 2020 4:00 pm UTC 60 mins
    In an ideal world, applications would be free from security vulnerabilities but, once compromised, even a trusted application can become untrustworthy. AppArmor provides a crucial layer of security around applications. By providing the capability to whitelist an application’s permissible actions, AppArmor enables administrators to apply the principle of least privilege to applications. Once in place, AppArmor can halt attacks and minimise or prevent damage in the event of a breach.

    In this webinar you will learn:
    - Why a ‘defence in depth’ strategy should be employed to mitigate the potential damage caused by a breach
    - An explanation of AppArmor, its key features and why the principle of least privilege is recommended
    - The use of AppArmor in Ubuntu and snaps
  • Best Practices for Protecting Your Enterprise in a Work from Home World
    Best Practices for Protecting Your Enterprise in a Work from Home World
    Dan Wolff, BigFix Director of Products Nov 24 2020 5:00 pm UTC 28 mins
    As more people work from home and anxiety mounts, expect cyberattacks of all sorts to take advantage. If you were asked to continuously patch all of your endpoints across your enterprise, how many tools would you need and how would you handle those endpoints that are off the corporate network? These issues can be handled smoothly with:

    The right tools
    The right processes
    An automated, self-healing endpoint environment


    Join this webinar to learn how to quickly shift endpoints to remote workers, speed processes, and an automated, self-healing endpoint environment.
  • Four keys to a successful transition to zero trust network access
    Four keys to a successful transition to zero trust network access
    Akhilesh Dhawan, Michael Stringer Jr. Jason Willis, Christopher Barnum Nov 24 2020 7:00 pm UTC 58 mins
    Today, remote work is the most predominant version of the “new normal.” What that means is that IT organizations must deliver flexible work alternatives that are all about equipping employees anywhere -- and enabling them to seamlessly do their best work at any time, on any device over any network. This new world has made stringent security like zero trust crucial. A zero trust model relies on contextual awareness to adaptively grant access to authorized employees using patterns based on identity, time, and device posture. Zero trust helps mitigate risk and it improves the user experience. Even more compelling, it eliminates the need for traditional VPNs. The catch is that most IT teams already have a remote access solution in place. So how do you make the switch?

    Join this webinar to hear tips and best practices from security experts who can help.

    - Define your remote access strategy
    - Understand gaps with your existing VPN solution
    - Augment the existing solution with new use cases like BYO, web and SaaS apps
    - Start migration from existing VPN to cloud delivered security solution
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection
    Federal Agencies: A Risk Based Approach to Insider Threat Detection
    Kevin Jermyn, Federal Customer Success Manager Nov 24 2020 7:00 pm UTC 41 mins
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Demo Day | Ransomware Kill Switch
    Demo Day | Ransomware Kill Switch
    Satish Mohan, CTO, Airgap Networks Nov 24 2020 9:00 pm UTC 30 mins
    On Oct. 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing an advisory to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. The question is now back to you - How do you respond / react when you are hit by ransomware? What if you can push a “ransomware kill switch” to instantly stop the propagation of ransomware? Come and join us in this BrightTALK Demo Day and see it in person how you can easily lock down your network in tiers without unplugging any network cable or shutting down any devices.
  • What’s Really Down Under - Threats to Devices Below The Operating System
    What’s Really Down Under - Threats to Devices Below The Operating System
    Scott Scheferman - Principal Cyber Strategist, Eclypsium Nov 24 2020 11:00 pm UTC 60 mins
    Lying below the traditional operating system (Windows, Linux, Mac) is an entire "world down under" ripe for attacking. The firmware and hardware attack surface is diverse and wrought with vulnerabilities that are increasingly being exploited to great effect. Attackers have learned to fly under the radar, dip down underneath the traditional security stack, and persist indefinitely, all while enjoying the omnipotence and flexibility that firmware-level attacks provide.

    In this webinar, Scott Scheferman, Principal Cyber Strategist at Eclypsium, will share insights from recent attacks that challenge how we think about device security. You’ll learn:

    - Why APTs and criminal gangs are increasingly targeting firmware and hardware
    - Examples of firmware level vulnerabilities being used in the wild
    - How gaps in visibility - from supply chain to continuous operational risk management - undermine our defenses, and what we are doing about it
    - Why proactive risk management needs to incorporate hardware and firmware security
    -How defenders can meet the challenge down under

    Hackers have moved down for a reason. Now, defenders must too.
  • Sharing our secrets: Best practice for global ADC installations
    Sharing our secrets: Best practice for global ADC installations
    Justin Thorogood - Andrew Scott - Snorre Hansen -Terry Hooper - CITRIX Networking Nov 25 2020 10:00 am UTC 59 mins
    Application Delivery Management (ADM) is a central management solution that allows you to manage and monitor an entire global application infrastructure from a single unified console. It can be a real help when looking to get more information about the networking environment. Join our webinar to find out how ADM can be deployed to get better visibility of your networking environment.
  • Something Something Cyber Podcast Unplugged
    Something Something Cyber Podcast Unplugged
    Bill Thrash https://www.linkedin.com/in/wthrash & Chase Cunningham https://www.linkedin.com/in/dr-chase-cunningham-54b26243 Nov 25 2020 4:00 pm UTC 30 mins
    Welcome to Something Something Cyber! This is the first episode in our new series "Solution Spotlight" a special series that delves into new, unique, and exciting technologies in the industry and gives you a front row seat to the founders, engineers and executives bringing these new tools to market.

    This episode is sponsored by Airgap.

    Airgap is designed with total protection in mind, by providing an agentless zero trust isolation platform.

    Airgap can be deployed in minutes, not months. No agents, no APIs, no application architecture changes, Airgap platform works with a wide array of deployment models.

    Airgap empowers the enterprise through it’s unique “ransomware killswitch” technology that identifies, and isolates ransomware, protecting your environment from additional spread of infection.

    As part of this episode Airgap is offering our listeners in Higher Education and First Responders the ability to deploy and utilize Airgap for 1 year free of charge.

    We’re excited to welcome Ritesh Agrawal, founder and CEO of Airgap.
  • Single Sign-On & Password Management – Managing Every Access Point
    Single Sign-On & Password Management – Managing Every Access Point
    Barry McMahon, International Product Marketing Manager, IAM and Seamus McLaughlin, Senior Solutions Consultant, LastPass Nov 26 2020 9:00 am UTC 31 mins
    Employees need streamlined, secure and simple access to their work, otherwise lose productivity. But more apps, devices, networks and users entering the workplace makes it increasingly complex for IT to simply manage and protect user access.

    Discuss in this replay of this session to learn how the new LastPass Enterprise provides control and security for every access point in the business. The discussion will include:

    - How SSO and password management work together to manage every access point
    - The LastPass journey to evolve from a password manager to a holistic access solution
    - A product deep dive into the new LastPass Enterprise, now including an SSO portal with over 1,200 integrations

    Speakers:
    Brian McMahon, International Product Marketing Manager, IAM
    Seamus McLaughlin, Senior Solutions Consultant, LastPass
  • Maximize a Experiência ProSupport Suite com SupportAssist para PCs Empresariais
    Maximize a Experiência ProSupport Suite com SupportAssist para PCs Empresariais
    Eduardo Cintra - Presenter | Rafael Tramontini - Question Moderator Nov 26 2020 6:00 pm UTC 75 mins
    Conheça os recursos do SupportAssist para PCs empresariais como parte do ProSupport Suite. Os gerentes de TI aprenderão como se conectar com uma demonstração ao vivo e como gerenciar sua frota no TechDirect, o portal de autoatendimento online da Dell. Experimente o acesso a informações e ferramentas que oferecem o melhor desempenho do PC e resolução rápida de problemas. Dessa forma, eles podem trabalhar em qualquer lugar, a qualquer hora, sem o estresse de problemas tecnológicos.
  • Ransomware Survival Guide: Ransomware Kill Switch
    Ransomware Survival Guide: Ransomware Kill Switch
    Ritesh Agrawal, CEO, Airgap Networks Nov 30 2020 4:00 pm UTC 29 mins
    Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.

    In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.

    In this BrightTalk session, Edu tech and IT will learn:
    How ransomware is surging in a remote/online learning environment?
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms?
    What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Ransomware Battleground: The Ryuk Ransomware
    Ransomware Battleground: The Ryuk Ransomware
    Anonymous Security Expert Nov 30 2020 6:00 pm UTC 30 mins
    This unique BrightTALK session is your 1-on-1 meetup with the most recent ransomware attack - Ryuk - in UHS Universal Health Services Ryuk's operators are known to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.
  • Ransomware Survival Guide: Healthcare
    Ransomware Survival Guide: Healthcare
    Ritesh Agrawal and Jason Mafera Dec 1 2020 4:00 pm UTC 45 mins
    "All systems were quickly disconnected, and the network was shut down in order to prevent further propagation," Is this your response to a ransomware attack? If the answer is Yes or Maybe, this BrightTalk session can help you improve your ransomware response. In Oct 2020, Ransomware hit the Universal Health Services (UHS), one of the largest US health systems, and consequently, malicious actor affected all of its US care sites and hospitals, spurring clinicians into EHR downtime procedures. Healthcare facilities use common EMR and EHR solutions. When one is hit, it's inevitable for others to avoid it.

    In this BrightTalk session, Healthcare tech and IT will learn:
    How ransomware is surging in Healthcare facilities?
    Why agent-based endpoint security may not be your answer to ransomware defense
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms? What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • AI deployment and inference: reliable infrastructure and streamlined operations
    AI deployment and inference: reliable infrastructure and streamlined operations
    Rui Vasconcelos, Canonical and Michael Boros, Dell Dec 1 2020 5:00 pm UTC 60 mins
    As artificial intelligence reshapes traditional and new industries, challenges arise for enterprises looking to innovate. Dell and Canonical address these topics in our upcoming webinar.

    Join us to discuss:

    - What happens after you have trained your AI model? This spans model deployment for inference at the edge, to inference serving, to distributed training and the handling of new data, to the underlying setup and operations.

    - The importance of reliable hardware and software layers in critical applications and the benefits of using specialised data science workstations with Linux.

    - How to streamline your AI operations to shorten your deployment cycles.
  • Remote access workflows and where do we go from here?
    Remote access workflows and where do we go from here?
    Jason Blum:GPL Technologies, Paul Austin & Jack Liu:Teradici, Karen Gondoly & Robert Ewanouski - Leostream Dec 1 2020 6:00 pm UTC 56 mins
    Panel discussion with GPL Technologies, Teradici, and Leostream on high performance remote access workflows with a focus on media and entertainment.
  • Citrix Virtual Apps and Desktops: Cloud Service or On-Premises Upgrades
    Citrix Virtual Apps and Desktops: Cloud Service or On-Premises Upgrades
    George Kuruvilla, Ryan McClure, Carisa Stringer Dec 1 2020 7:00 pm UTC 47 mins
    IT planning takes into consideration unpredictable events, but the 2020 calendar year presented an unprecedented challenge which put many IT initiatives on hold. While there has been a lot of excitement surrounding recent on-premises releases of Citrix Virtual Apps and Desktops solutions, in this pandemic era many businesses are weighing that effort alongside the decision to embrace new cloud technologies. In this webinar, we will walk you through key datapoints and considerations to help guide you through your decision.

    Join this webinar to learn:

    - Important considerations for evaluating an on-premises upgrade or cloud service transition

    - Updated details on Citrix packaging and licensing options in order to provide greater choice
    - How Citrix is simplifying hybrid cloud deployments for organizations of all types and sizes
    - Enhancements released through 2020 and how they shape IT planning
  • Uncovering the True Impact of Digital Transformation
    Uncovering the True Impact of Digital Transformation
    CyberArk Dec 2 2020 5:00 pm UTC 29 mins
    In today’s mostly digital world, the increased number and sophistication of cyber attacks amplifies the need for consistent security controls across the IT infrastructure, cloud environments, RPA, DevOps and any digital initiative on your roadmap. As a security professional, you know all too well that privileged access is the gateway to your most valuable assets and is at the core of nearly all security breaches. If you are on the road to implementing a privileged access management (PAM) solution, here are the key use cases to consider.
  • What's Under The Hood In Your Devices
    What's Under The Hood In Your Devices
    Maggie Jauregi, Intel, Jesse Michael & Scott Scheferman, Eclypsium Dec 2 2020 6:00 pm UTC 75 mins
    How well do you know what's inside your computer? Today's laptops and servers are powered by dozens of components with their own complex programming that runs independently of the operating system. Attackers increasingly target vulnerabilities in firmware and hardware, and most organizations lack visibility into this attack surface. In this webinar we'll explore what manufacturers are doing to improve platform security, what kinds of vulnerabilities attackers are targeting, and what IT and security professionals need to do to protect their devices.
  • Ransomware at the Kitchen Table Securing Remote Access with Zero Trust Isolation
    Ransomware at the Kitchen Table Securing Remote Access with Zero Trust Isolation
    Ritesh Agrawal, CEO, Airgap Networks Dec 2 2020 6:00 pm UTC 45 mins
    The “workplace” is a very different environment this year. Enterprises are now using VPN as essential way into corporate production environment. While businesses scale remote access for employees everywhere, it is critical to discover, categorize, and secure every endpoint entering into your corporate network with centralized isolation policy controls.

    In this BrightTalk session, Airgap's experts will go through how the agentless Zero Trust Isolation platform can help secure remote access into business crown jewels and data at scale and stop any lateral device-to-device & device-to-application malicious attacks.
  • Demo Day | Zero Trust Isolation for Ransomware Defense
    Demo Day | Zero Trust Isolation for Ransomware Defense
    Vinay Adavi, CPO, Airgap Networks Dec 2 2020 9:00 pm UTC 30 mins
    Ransomware has become an industry upon itself with Ransomware as a Service (RaaS) evolving and distributed attacks crippling organizations around the world. Companies fall victim to ransomware every 11 seconds. More than 75% of companies infected with ransoware were running up-to-date endpoint protection. Ransomware is hitting the servers, and EPP/EDR tools are not adequate security. Join this Demo Day and learn how Airgap's Zero Trust Isolation can stop and neutralize ransomware propagation attacks instantly.
  • Safe-guarding Employees in the Era of Remote Working
    Safe-guarding Employees in the Era of Remote Working
    -Ian Pitt, CIO & SVO at LogMeIn. -John Baird, CEO at Revio & Chairman at NSW Government Cyber Security Advisory Council Dec 3 2020 9:00 am UTC 52 mins
    Almost all businesses from all sectors and industries have shifted to work from home in light of the covid 19 crisis. Businesses need to be on high alert as remote workers are facing a number security risks that affect them and the business network

    Join this Webinar to listen to our industry thought leaders discuss the current landscape of remote working and how employees and businesses can stay safe when cybercrime and vulnerabilities are increasingly knocking at the door.
  • Intelligent Automation for Frictionless Workforce Experiences
    Intelligent Automation for Frictionless Workforce Experiences
    Sally Eaves & Kevin Turner Dec 3 2020 2:30 pm UTC 45 mins
    The increasing sophistication of automation—artificial intelligence (AI), machine learning and robotics—is undoubtedly driving your digital transformation, with practical applications of these technologies fast becoming a fundamental part of your business. In the fast-changing digital world, however, your employees are most likely asking a lot of questions as they encounter these new technologies and your IT support is now expected to adapt rapidly to enhance both end user experience (EUX) and and customer experience (CX).

    With this in mind, IT leaders like you are now seriously investigating the impact that automation can have in improving support services and the workforce they serve. You review the benefits that frictionless experiences have on your productivity levels and even analyze the readiness of your workers in engaging with the latest technologies. With effective digital workplace services in place, or so the thinking goes, organizations like yours are able to innovate quickly, retain top talent and meet customer needs.

    All of this is vital to avoid falling behind your competitors. In this exciting panel discussion, join Sally Eaves (Strategic Advisor) and Kevin Turner (Strategy Lead for Digital Workplace Services) to discuss the following:

    • The reasons for the increased need to automate and enhance digital workplace services
    • The expectations and challenges in delivering digitally-enhanced end user experiences
    • The means for building an effective approach to ready automation amongst your digital workforces – and securely.

    Register now and discover how you can benefit from digital workplace services that remove friction and integrate the latest advances in automation to meet the demands of your workforces.
  • DevOps Chat: DevOps Strategies for Mainframe
    DevOps Chat: DevOps Strategies for Mainframe
    Anna Murray, ASG Technologies; Jeff Cherrington, ASG Technologies & Mitchell Ashley, Accelerated Strategies Group Dec 3 2020 6:00 pm UTC 28 mins
    DevOps is a cultural shift that introduces new methods of work, and it can be applied to any technology environment—including mainframe.

    During this DevOps Chat video podcast, you’ll hear ASG Technologies and Mitch Ashley, a former CIO and current CEO of the analyst firm Accelerated Strategies Group, share the importance of advancing mainframes with DevOps processes and toolchains and the vital role mainframes will continue to play in an organization’s future.
  • Protecting Your Organization From MosaicRegressor and Other UEFI Implants
    Protecting Your Organization From MosaicRegressor and Other UEFI Implants
    Yuriy Bulygin, CEO of Eclypsium & Scott Scheferman Principal Cyber Strategist Dec 3 2020 6:00 pm UTC 69 mins
    The recent discovery of MosaicRegressor spyware is the latest in an ongoing trend of UEFI implants observed in the wild. These threats are particularly powerful because their malicious code runs before and supersedes the operating system, while also allowing the threat to persist within firmware even after a system is reimaged. The implant code itself is universal and easy to build and the UEFI file system format is largely unmodified by individual OEMs. This creates a relatively low barrier to entry for attackers making it likely we will see this type of capability show up in other campaigns.


    In this webinar, you’ll learn:
    - How MosaicRegressor and other UEFI attacks work
    - Why these attacks are so dangerous and difficult to detect
    - Why this discovery is significant, and what it portends for future threats
    - How Eclypsium is able to detect these threats even before they are public
    - What strategies you can use to protect and defend your devices from UEFI attacks.
  • Ransomware Battleground: Ragnar Locker Malware
    Ransomware Battleground: Ragnar Locker Malware
    Anonymous Security Expert and Syya Yasotornrat Dec 7 2020 4:00 pm UTC 30 mins
    In this session, we will get to know the latest incident caused by Ragnar Locker malware - We can get to know from the security expert on what it is, how it works and how to prevent it in this interactive Q&A podcast style session. Please join us.