Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • [state of the internet]/security Credential Stuffing: Attacks and Economies
    [state of the internet]/security Credential Stuffing: Attacks and Economies
    Patrick Sullivan, Senior Director, Security Technology & Strategy Akamai and Shane Keats, Director of Global Industry Mktg. Recorded: Aug 22 2019 32 mins
    Webinar: Credential stuffing targets media

    January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.

    Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.

    During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies.

    You’ll learn:

    - Why cheap tools and free tutorials lower the bar of entry for would-be criminals
    - How malicious actors turn data breaches into substantial profits on darknet markets
    - What businesses can do to detect and prevent credential stuffing attacks
  • Powering Jira Workflows with Real-Time Messaging
    Powering Jira Workflows with Real-Time Messaging
    Aaron Rothschild, Senior Product Manager of Integrations & John Thompson, Solution Architect Recorded: Aug 22 2019 40 mins
    Mattermost reduces friction for development teams who are working together on projects in Jira. Seamless integration allows you to post Jira information to and from multiple channels across your teams for easy collaboration and quick resolution.

    Join this webinar to see a live demonstration of how our Jira integration can help your team work together more efficiently, including:

    1. Admin configuration and setup
    2. Posting notifications from Jira projects into Mattermost channels
    3. Creating Jira issues and attaching messages to Jira directly through the user interface
    4. Taking action on Jira issues via slash commands

    After the live demonstration, we’ll have a Q&A session where we can answer all your questions!
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Recorded: Aug 22 2019 59 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Why IoT Security is More Important Than Ever
    Why IoT Security is More Important Than Ever
    Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla Networks Recorded: Aug 22 2019 60 mins
    Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
    1. Defend against Cyberattacks
    2. Ensure Privacy Safeguards
    4. Minimize Reputational Risk
    5. Earn the Trust of your Customers

    Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.
  • Continuous Governance: Security and Compliance for Your Kubernetes Clusters
    Continuous Governance: Security and Compliance for Your Kubernetes Clusters
    Hitesh Parashar and Erik Melander, Astellent Inc. Recorded: Aug 22 2019 43 mins
    Containers, Kubernetes and OpenShift are radically redefining how security and compliance teams work with the product and development teams to secure their businesses. Continuous Integration (CI) and Continuous Delivery (CD) bring amazing agility and innovation to software development organizations but present unprecedented security challenges. Static security policies & checklists no longer suffice and don’t scale for containers in the enterprise. To truly get the business advantages of containers, enterprises need to evolve their approach to security. Security must become a continuous activity. It must be considered at every stage of your application and infrastructure lifecycle.

    Continuous Governance (CG) adds to CI/CD a shared model of security where compliance is not an after-thought but woven throughout the product, software engineering, infrastructure, operations, InfoSec and compliance organizations and culture.

    With this webinar, learn how containers, Kubernetes, OpenShift and Astellent Sigil (http://astellent.com/sigil) can help add Continuous Governance to your software development processes. Learn how you can maintain the agility and innovation that containers and Kubernetes provide while at the same time controlling and defending your Kubernetes clusters. With this webinar you will learn how to -

    Establish a preventative security posture by only running trusted code
    Verifiably prove the steps of your software supply chain
    Put in place integration with your existing tools to gather metadata for attestations
    Build flexible per-cluster policies to allow trusted images and emergency deployments
    Simplify governance with a single structured path for code to get from development to production
    Who is it for?

    Information Security teams
    Compliance teams
    Internal and external IT audit teams
    Container adoption teams
    Infrastructure teams
    Enterprise Architecture teams
    Applications and product teams
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Recorded: Aug 22 2019 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Recorded: Aug 22 2019 179 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Brian McClain, Assoc. Principal Product Marketing Manager & Tyler Britten, Sr. Principal Technologist, Pivotal Recorded: Aug 22 2019 30 mins
    As the popularity of microservices continues to rise, so does the need for an efficient means of intercommunication. Features such as service discovery, client-side load balancing, and circuit breakers become invaluable tools as the complexity of your landscape grows. Thus, the rising popularity of the service mesh as means of delivering those capabilities.

    While this technology space is still young, Istio and Envoy have already become the tools that many use to solve these problems. The Pivotal Application Service (PAS) integration with these solutions introduced weighted routing and guaranteed service identity—and now we’re bringing these features to Pivotal Container Service (PKS) via the new Pivotal Service Mesh.

    In this webinar, we’ll explore why a service mesh matters and how Pivotal Service Mesh works, and we’ll give you a sneak peak into its future.
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Recorded: Aug 22 2019 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Recorded: Aug 22 2019 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • WebRTC and You
    WebRTC and You
    Adam Bavosa Recorded: Aug 22 2019 20 mins
    Have you ever thought about building your own Skype or Google Hangouts video chat? It is necessary in futuristic connected shared experiences. Here’s the easy way to do it!
    Adam will go over: - What WebRTC is - Why it is important for developers - How it works - The necessary code to integrate WebRTC into a video chat app - and finally, write a simple website that uses WebRTC. Audience members need only a basic understanding of front-end web development to be engaged.
    PubNub has been an essential resource for WebRTC app development since its inception. Adam Bavosa has taken it upon himself to learn how to develop thoroughly with PubNub and WebRTC, so he can spread the word, and reduce friction for developers building video chat.
  • [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    Elisabeth Thomas, Mohan Kompella, Christoph Goldenstern, Beverly Weed-Schertzer Recorded: Aug 22 2019 58 mins
    As AI-enabled tools continue to make a mark on IT operations, the face of proactive problem and incident management in the enterprise is starting to change.

    From making IT staff roles’ easier to encouraging self-service, there is a broad range of AI-powered solutions on offer. Join leading ITSM experts as they debate the complexities, functionalities, benefits and considerations of next-generation cloud and hybrid problem and incident management tools.

    Moderator: Elisabeth Thomas, Launch Product Marketing
    Panellists: Christoph Goldenstern - VP, Kepner Tregoe; Mohan Kompella - VP, BigPanda and Beverly Weed-Shertzer - ITSM Author
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Recorded: Aug 22 2019 182 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Recorded: Aug 22 2019 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Recorded: Aug 22 2019 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Irwin Lazar of Nemertes Research, top Unified Communications expert Recorded: Aug 21 2019 47 mins
    What SD-WAN means for SaaS and UCaaS. How to provide a breakout at the branch and how to overcome global delivery challenge of real-time communications
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Recorded: Aug 21 2019 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Recorded: Aug 21 2019 49 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Recorded: Aug 21 2019 57 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Automating Operations: Impact of  AI, Machine Learning and Low-Code Development
    Automating Operations: Impact of AI, Machine Learning and Low-Code Development
    Phil Simpson Senior Principal Product Marketing Manager, Red Hat Prakasha Aradhya Director of Product Management, Red Hat Recorded: Aug 21 2019 49 mins
    Business process automation technology is rapidly emerging as a key to success in digital transformation projects. Automation is no longer just a set of business operations workflow items. A collaborative convergence of analytics, artificial intelligence or machine learning (AI/ML), robotic process automation (RPA), low-code development, etc. is changing the marketplace. Businesses are recognizing the value of this unified view in automating operations and decisions to improve the efficiency and agility of business operations—and thereby competitiveness and the bottom line.

    Join us for this session, where we'll explore:

    -Exploiting data analytics to make well informed decisions.
    -Building intelligent, context-sensitive applications.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Recorded: Aug 21 2019 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • Cath Goulding on Digital Transformation
    Cath Goulding on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video Cath Goulding, CISO at Nominet, talks of her experiences and provides her perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Forrester Research: Why agile integration is critical to digital transformation
    Forrester Research: Why agile integration is critical to digital transformation
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research Aug 23 2019 3:00 pm UTC 32 mins
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research discusses the importance of agile integration in digital transformation initiatives. Recorded during Red Hat's Microservices, Containers, API's an Integration Day on May 21, 2019 in Chicago, IL.

    About the speaker:
    Jeffrey helps CIOs and digital leaders succeed by working with them to improve their software delivery capability and by helping them assess the relevance of emerging software technologies. As a 25-plus-year software industry veteran, he's helped clients improve their development shop culture, apply Agile and continuous delivery best practices, and build successful developer ecosystems.
  • Platform of the Future - Efficiency (Part 5)
    Platform of the Future - Efficiency (Part 5)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 27 2019 1:00 am UTC 9 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • SSL Visibility with SSLO Orchestrator
    SSL Visibility with SSLO Orchestrator
    Peter Silva - Senior Solutions Marketing Manager Aug 27 2019 8:00 am UTC 8 mins
    Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 1:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • How Syniti delivers on the journey to SAP S/4HANA Central Finance
    How Syniti delivers on the journey to SAP S/4HANA Central Finance
    Susan Nee, Sr. Value Engineer at Syniti Aug 27 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP Advanced Data Migration for SAP Central Finance. See how to complete and maintain your SAP Central Finance program, allowing you to centralize your financial data and post to the supporting financial source systems. Using Syniti’s proven solutions and agile methodology will result in a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your organization.
  • Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat Aug 27 2019 3:00 pm UTC 55 mins
    Successful companies are measuring success from "idea to execution" in weeks and months. Getting there means navigating nearly unlimited technical choices, for both application and operations teams. Learn how leading companies are making the right choices for their Hybrid Cloud, to drive new market opportunities and greater business success.

    Brian Gracely (@bgracely) is Director of Product Strategy at Red Hat, focused on OpenShift. He brings 20+ years of experience in Strategy, Product Management, Systems Engineering, Marketing and M&A. He is recognized as an industry thought-leader in Cloud Computing and DevOps, as well as being co-host of the award-winning podcast, The Cloudcast (@thecloudcastnet) and weekly Kubernetes podcast @PodCTL.
  • 10 Tips for Achieving Cultural Change in DevOps
    10 Tips for Achieving Cultural Change in DevOps
    Jeffrey Martin (Director of Product, WhiteSource) Aug 27 2019 3:00 pm UTC 60 mins
    DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat
  • 5 keys to success with open hybrid cloud
    5 keys to success with open hybrid cloud
    Irshad Raihan, Director Product Marketing, Red Hat & Annie Potvin, Sr Manager, Portfolio Programs Product Marketing, Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Hybrid cloud has become increasingly popular. But what exactly qualifies as a hybrid cloud? What applications can benefit from a hybrid cloud approach? How do application and workload portability impact business agility? What customer successes has Red Hat had through their solutions and consulting portfolio?

    Join this session to hear industry experts discuss 5 keys to their open hybrid cloud success.
  • 3 pitfalls to avoid with hybrid multicloud
    3 pitfalls to avoid with hybrid multicloud
    Eric Schabell, global technology evangelist director, Red Hat Aug 27 2019 4:30 pm UTC 60 mins
    The hype about cloud computing is present daily. From cloud to hybrid cloud to hybrid multicloud, businesses hear that this technology is the way to ensure their digital future. As they ponder choices about cloud environments, businesses must continue the daily work of enhancing the customer experience and improving the agile delivery of applications.

    In this webinar, we’ll use real customer experiences to highlight the top 3 lessons those customers learned as they transitioned to hybrid multicloud environments. We’ll look closely at:
    - What hybrid multicloud means for your business.
    - Decisions that affect application delivery.
    - How to deal with legacy applications, likely the most important resources to your business.
  • Kickstarting appdev on OpenShift in 5 minutes
    Kickstarting appdev on OpenShift in 5 minutes
    Andre Lee Rubinger, Software Engineering Manager, Red Hat Aug 27 2019 4:30 pm UTC 55 mins
    This session explains how Red Hat fixed cloud application creation. We'll introduce a simple, yet comprehensive, way to build and deploy new applications on Red Hat OpenShift Container Platform in under 5 minutes. We'll demystify common appdev tasks on Red Hat OpenShift Container Platform by uncovering the basics tenants. Join this session to:

    - Create a new modern, front-end application, built with NPM/Yarn and served as static files.
    - Provision a new database or messaging system.
    - Share authentication information between application code and connected services.

    Come ready to dig under the covers and start to learn the cloud development concepts behind our simplified getting started flows.
  • Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Daniella Pontes, Senior Manager of Product Marketing at InfluxData, Jason Bloomberg, President of Intellyx Aug 27 2019 5:00 pm UTC 60 mins
    Kubernetes is more than a container orchestration platform. It’s a harbinger of a new paradigm for IT we’re calling cloud-native computing.

    The cloud-native world recognizes that containers and microservices are inherently ephemeral, and that the massive scalability and performance we expect from applications and services depends upon that ephemerality.

    Monitoring such radically dynamic environments is nothing like IT monitoring used to be. Statelessness, real-time behavior, and abstractions that drive configurations, security, and integration are core to cloud-native computing. These all require a fundamentally different approach to monitoring in order to provide the visibility and control that organizations require to keep this new infrastructure paradigm working at full bore.

    Join Daniella Pontes, Senior Manager of Product Marketing at InfluxData and Jason Bloomberg, president of industry analyst firm Intellyx, for a provocative discussion of the new cloud-native computing paradigm and the monitoring challenges organizations face.

    Attendees of this webinar will:

    -Gain a broad understanding of what it means to be cloud-native

    -Understand the particular monitoring challenges cloud-native infrastructures present

    -Learn how InfluxData’s cloud-native TICK Stack centered on its InfluxDB purpose-built time-series database was built from the ground up to resolve the monitoring challenges organizations face as they move to cloud-native infrastructure.
  • Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    John Huckle, John Beasley, Marci Parker, Meghan Lockwood Aug 27 2019 5:00 pm UTC 60 mins
    Does your ServiceNow strategy hold-up to the demanding needs of IT, your Customers, and your employees in 2020?

    With ServiceNow expanding beyond IT in recent years with Customer Service Management and HR Service Delivery, we see clients building strategic roadmaps that cross the entire enterprise.

    In this webinar, you'll learn how roadmaps are changing (and how to effectively communicate ServiceNow's value to your executives), roadmap examples from our clients with varying levels of maturity, the keys to success like governance and organizational change management, and what you can still accomplish in 2019.

    Don't miss out on this opportunity - register for the webinar today.
  • Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Dennis Drogseth, VP of Research, EMA and Mark Levy, Product Marketing Director, Micro Focus Aug 27 2019 5:00 pm UTC 60 mins
    What separates successful DevOps initiatives from unsuccessful ones? The answer to this and many other questions will be examined in this new research webinar presented by leading IT analyst firm Enterprise Management Associates (EMA).

    Join us as Dennis Drogseth, VP of Research at EMA provides observations and recommendations for successful DevOps implementations. Dennis will draw from a recent EMA survey of 400 global respondents spanning development, operations, IT service management (ITSM) teams and executive IT.

    This webinar will address DevOps initiatives from many perspectives. Topics covered will include pipeline activities, stakeholders, technological impacts including analytics and automation, roadblocks in terms of both tools and teams, organizational perspectives, best practices, and more.
  • Building production-ready containers
    Building production-ready containers
    Scott McCarty, Product Manager, Red Hat & Ben Breard, Product Manager, Red Hat Aug 27 2019 5:30 pm UTC 55 mins
    "Everyone knows that building containers is easy. Or is it? Have you ever wondered if it’s too easy? Are you following all the “best practices?” Which ones are relevant? What about security considerations?

    In this session, we’ll look at several strategies and provide recommendations for creating container images that can be confidently deployed in production environments. "
  • Automating security and compliance for hybrid cloud environments
    Automating security and compliance for hybrid cloud environments
    Lucy Kerner Security Global Technical Evangelist and Strategist, Red Hat Aug 27 2019 5:30 pm UTC 60 mins
    Maintaining visibility, control, and security, and ensuring governance and compliance remains paramount. But it becomes more difficult and time consuming in a hybrid infrastructure consisting of physical, virtual, cloud, and container environments. Also, it's becoming more and more challenging for security teams to examine and respond to the growing number of security alerts coming in from the increasing number of security tools in their security operations center. (This is a replay from Red Hat Summit)
  • Under the Hoodie: Lessons from a Season of Penetration Testing
    Under the Hoodie: Lessons from a Season of Penetration Testing
    Tod Beardsley, Research Director, Rapid7 & Kwan Lin, Senior Data Scientist, Rapid7 Aug 27 2019 6:00 pm UTC 62 mins
    In 2017, Rapid7 launched the “Under the Hoodie” project to shed light on the “dark art” of pen testing by revealing the process, techniques, and tools that go into it, as well as the insights that can be extracted. The 2019 Under the Hoodie report continues to provide visibility into this often occult niche of information security. Based on the results of about 180 engagements conducted in the most recent season of penetration testing, as well as real-world anecdotes from our engineers and investigators, our research explores recent trends and patterns derived from penetration testing.

    Join Rapid7 experts for an engaging discussion where you will learn:

    1. The report’s most significant findings, including the most commonly exploited vulnerability classes and network misconfigurations
    2. The most effective methods our team has found to compromise high-value credentials
    3. How you can use the data in the report to effectively detect and prevent breaches on your own network
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 6:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Building better Kubernetes applications with Operators & OpenShift
    Building better Kubernetes applications with Operators & OpenShift
    Josh Wood, Developer Advocate, Red Hat Aug 27 2019 6:30 pm UTC 55 mins
    Kubernetes scales and manages stateless applications easily. Stateful applications require more work. Databases, caching systems, and file stores are harder to dynamically manage with data intact, and they often come with their own notion of clustering. Operators are Kubernetes agents that automatically deploy, scale, manage, back up, and even upgrade complex, stateful applications.

    This technical webinar will provide an update on the Operator pattern from Red Hat—adopted by many community projects like Rook, Prometheus, and others—and supported by a Framework and software development kit (SDK) that make it easier to automate your applications.
  • 10 important things to consider when considering a container platform
    10 important things to consider when considering a container platform
    Dan Juengst, Brian Gracely & Josh Berkus - Red Hat Aug 27 2019 6:30 pm UTC 60 mins
    Everybody’s talking containers. Everybody’s talking Kubernetes. So many options and so little time to evaluate them all. How do you select a container platform? What’s really important?

    In this session recorded at Red Hat Summit, we'll journey through the what, how, who, and why of selecting a container orchestration infrastructure. We'll start with the relationship between Linux and containers, then explore the different options available if you want to move to Kubernetes for container orchestration. Along the way, we'll debunk some myths and shine some light into the dark corners of container orchestration. You'll leave this session armed with the knowledge you need to make the right container orchestration infrastructure decision to dive into the world of cloud-native application development and accelerate innovation to better serve your customers. (This is a replay from Red Hat Summit)

    Speakers:
    Dan Juengst, Sr. Principal Product Marketing Manager - Hybrid Cloud, Red Hat
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat
    Josh Berkus, Kubernetes Community Manager, Red Hat
  • Improve process and increase customer satisfaction through Service Automation
    Improve process and increase customer satisfaction through Service Automation
    Richard de Boer, Pink Elephant Aug 28 2019 9:00 am UTC 45 mins
    On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
    The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
    Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
  • Tips for realizing value from & managing impediments to digital transformation
    Tips for realizing value from & managing impediments to digital transformation
    Wayne Speechly - VP: Advanced Competencies – NTT Ltd Aug 28 2019 1:30 pm UTC 60 mins
    Join us for a panel discussion about how organizations are realizing value from and managing impediments to digital transformation. We’ll be discussing some of the results from the NTT 2019 Digital Means Business Benchmarking Report which indicate that digital is starting to gain meaningful traction in organizations. It also reveals that they’re focusing internally to see quick wins but still grappling with prioritization and organization-wide execution of digital transformation.
    Listen to experts in different areas of digital transformation share their insights and provide actionable advice on where to focus and what to avoid.
    Please join our panel discussion:
    Wayne Speechly - VP: Advanced Competencies – NTT Ltd.
    Hayden Lamberti – Digital Strategist, Digital Advisory – NTT Ltd.
    Adrian Ryan – Organizational Design Lead, Digital Advisory – NTT Ltd.
    Brittany Anderson – Innovation Lead – Digital Advisory – NTT Ltd.
    Siegfried Schallenmüller – General Manager – Customer Experience – Dimension Data