Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Live 45 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Jul 26 2017 5:00 pm UTC 60 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Harness the power of crowdsourced mobile data and GPU-powered analytics
    Harness the power of crowdsourced mobile data and GPU-powered analytics Tom Luke, VP Sales, Marketing and Partnerships, and Mike Gardner, CSM at MapD Jul 26 2017 5:00 pm UTC 60 mins
    Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.

    Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.

    Attend this webinar to learn how telecoms and other mobile companies can:

    Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.

    Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.

    Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.

    Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.

    MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.
  • Today’s Modern Business Management
    Today’s Modern Business Management James Chan and Laureen Knudsen Recorded: Jul 26 2017 48 mins
    Being an adaptive enterprise means having the ability to rapidly respond to changing conditions. As the market changes, you adapt. As customer feedback comes in, you adapt. As your competitors shift their focus, you adapt. 
     
    Join James Chan and Laureen Knudsen, of CA Technologies, on Wednesday, July 26, 9am PT / 12pm ET, as they dig deeper into how Modern Business Management is essential to a thriving, adaptive enterprise. During this webinar, you’ll learn:
     
    •How enterprise-wide business visibility provides real-time, continuous project data 
    •How to align funding for the projects agile teams are working on 
    •How financial and performance metrics connect financial models and audits to delivery practices 
     
    The adaptive enterprise is leveraging real-time visibility that allows it to proactively embrace changes and transform negatives into opportunities that move the business forward. It is prepared to respond to nearly every possibility with speed and agility and to take advantage of every circumstance. Are you ready?
  • Building a commercial robot with open source
    Building a commercial robot with open source Kyle Fazzari - Roboticist at Canonical Live 60 mins
    Developing a new device is hard. So is taking that device to production. However, we see numerous examples of companies devoting all of their time to development, and none to answering the important questions that are raised as one approaches production, such as:

    * What is my factory process?
    * How is the base OS updated so as to remain secure?
    * How is my own software updated?
    * How is the device recovered if an update goes wrong?

    In this webinar we'll discuss:

    * The challenges of commercialising robots
    * Using ROS in your production code
    * Build security in from the get go with snaps and Ubuntu Core
    * Continuously deliver new features and updates without the cold sweat
  • Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps
    Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps Fouad ElNaggar, CEO and Co-Founder of Sapho Recorded: Jul 26 2017 45 mins
    Enterprise systems are failing today’s employees because they are hard to use, they trap data in silos, they have a poor user experience, and they offer limited mobile support. Therefore, it is no surprise that a Forrester Research study showed that 76% of employees believe it takes too long to complete tasks in their systems and another 62% delay completing tasks that require multiple systems. In short, this means your business has delays.

    On the flip side, consumer applications keep getting better and better – these apps are simple, enable quick task completion, are accessible from anywhere, and offer a great user experience. Why can’t enterprise systems be as easy to use as consumer apps? It turns out, they can be. Modern portals are the next generation digital workplace tools that push data and key actions to employees from their systems so they can more effectively do their jobs.

    Join this webinar to learn how easy it is to:

    •Remove system bottlenecks, reduce helpdesk calls, decrease software spending, enable smart decision-making, and streamline workflows with consumer-like business apps.
    •Build smart, event-driven micro apps that sit on top of your existing systems and push actionable insights and tasks to employees on any device, intranet, or messenger.
    •Triple the productivity of your workforce with a modern portal that surfaces personalized and relevant tasks and information from all your systems.
  • Practical Guide to Cloud Management Platforms
    Practical Guide to Cloud Management Platforms Cloud Standards Customer Council Recorded: Jul 26 2017 60 mins
    Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.

    This webinar will cover:

    •A review of CMP capabilities
    •How to operate and manage applications and data across hybrid cloud infrastructures
    •Available CMPs on the market today
    •Evaluation criteria for selecting a CMP to meet your needs
    •Deployment considerations
  • Handling multiple releases for multiple customers
    Handling multiple releases for multiple customers Aspire Systems Recorded: Jul 26 2017 3 mins
    This video illustrates how multiple releases can be made at the same time for different customers, by adopting the feature-based release model.
  • Introduction to Being an Incident Commander
    Introduction to Being an Incident Commander Eric Sigler - Head of DevOps @ PagerDuty Recorded: Jul 25 2017 45 mins
    During a major customer-impacting incident, every minute counts. The team must work together seamlessly and quickly to a successful resolution — and that’s done best with an Incident Commander driving coordination.

    An Incident Commander is tasked with being the decision maker, delegating tasks and listening to input from subject matter experts in order to bring the incident to resolution. This is a critical role and there are essential best practices you must follow to get it right.

    Join us to learn:
    •What is an Incident Commander?
    •The role and responsibilities of an Incident Commander
    •Incident call procedures and terminology
    •Incident commander skills for success
  • From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift
    From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift Zohaib Khan, Practice Lead, App Modernization & Migration, Red Hat; Malik Sayed, Sr. Manager, Digital Architecture, Verizon Recorded: Jul 25 2017 44 mins
    Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.

    In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
  • What Even the Best Firms Miss About Customer Service
    What Even the Best Firms Miss About Customer Service Ellen Daley, Vikas Nehru, Nitin Badjatia Recorded: Jul 25 2017 63 mins
    Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.

    While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.

    Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Recorded: Jul 25 2017 52 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • The 3 Essentials of Digital Transformation & How to Deliver Them
    The 3 Essentials of Digital Transformation & How to Deliver Them Rob Koplowitz, VP and Principal Analyst at Forrester Research and Steve Tassell, Bizagi Recorded: Jul 25 2017 40 mins
    Is your digital transformation moving in the right direction? We know that there are three essential business imperatives that organizations need to act on: delivering better customer experiences, improving operational efficiency, and managing regulatory compliance.

    Wherever you are in your journey, process automation is recognized as a foundation for meeting these digital transformation goals. So join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research, as we explore the role of ‘Digital Process Automation’ in digital transformation and discuss real-life stories of how it has helped companies to:

    •Deliver digitally-led omni-channel customer experiences
    •Improve operational excellence, efficiency and agility
    •Manage data, privacy and processes to meet regulatory compliance
    •Innovate at the speed of changing customer expectations in your industry

    Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.

    About Rob Koplowitz

    Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing. Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy
  • Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform
    Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform Dave Rudzinsky, SVP & CIO; Jim McDaniel, VP, Strategic Accounts; Matt Serna, Manager, Industry Marketing Manager Recorded: Jul 25 2017 48 mins
    Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?

    Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.

    Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.

    Attendees will learn:

    - How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
    - The strategic role that delivery partners can play in supporting cloud migration initiative
    - How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Recorded: Jul 25 2017 52 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
     
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • 5 Principles I applied to build a sticky product that 800k people use weekly
    5 Principles I applied to build a sticky product that 800k people use weekly Glen Rabie, CEO, Yellowfin Recorded: Jul 25 2017 5 mins
    More than 800,000 people use our Yellowfin product every week. We’ve achieved this by making user adoption and stickiness a core part of our product development.

    We think about stickiness constantly and have a central goal to continuously improve our user adoption rates. It’s taken us years to understand the drivers of these behaviours. The lessons we’ve learned along the way can be distilled into five key components:
  • Seize the opportunity as GST launches in India
    Seize the opportunity as GST launches in India Hari Madhavan, Director of ERP Practice, Promantia Global Consulting Recorded: Jul 25 2017 45 mins
    On July 1, India ushered in the most significant tax reform in its 70-year history by rolling out the Goods and Service Tax (GST). The new fiscal measures will fundamentally change the way Indian businesses and, in particular, retailers work by impacting many functional areas, including pricing, supply chain management, IT, tax, and accounting. We at Openbravo are delighted to now announce that our software is now fully compliant with the GST requirements, and so we are ideally positioned to help retailers embrace the opportunities.
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 24 2017 37 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 24 2017 40 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Recorded: Jul 21 2017 26 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Keys to Continuous Testing for Faster Delivery
    Keys to Continuous Testing for Faster Delivery Shane Evans, Director of Product Management and Ayal Cohen, Chief Functional Architect, HPE Recorded: Jul 21 2017 25 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Your business needs to deliver faster. To accommodate, Development needs to introduce fewer changes but in a much more frequent cadence. This creates a challenge for test teams to keep up with the rapid pace of change without compromising on quality. Automation is paramount to the success or failure of Continuous Delivery, and Continuous Testing enables early and frequent quality feedback throughout the CI/CD pipeline. In this webinar, we will explore how to implement Continuous Testing to ensure high quality releases in a Continuous Delivery environment; including what to test and when to automate new functionality in order to optimize your efforts.
  • The Open Innovation Labs Experience: Redefining DevOps Culture
    The Open Innovation Labs Experience: Redefining DevOps Culture Justin Holmes, App Dev Architect, Red Hat; Øystein Bedin, PaaS Infrastructure Architect, Open Innovation Labs, Red Hat Recorded: Jul 20 2017 45 mins
    DevOps is foundational to the world’s highest-performing information technology organizations. But more than anything else, DevOps is about culture, and culture can be elusive. To help our customers experience how a DevOps culture can accelerate their innovative ideas, Red Hat launched it's Open Innovation Labs. In this session, Justin Holmes and Øystein Bedin from Open Innovation Labs will share their story building a DevOps culture for the Labs' core team.

    In this session, you'll learn about:

    - Behaviors and processes to enable collaboration between development and operations.
    - How tools like Ansible by Red Hat and Red Hat OpenShift can help facilitate communication between team members.
    - How Open Innovation Labs provide an environment for Red Hat customers to experience the unique advantages of a DevOps culture.
  • How ChatOps & Enterprise IT Application Maps Will Finally Kill Your War Room
    How ChatOps & Enterprise IT Application Maps Will Finally Kill Your War Room Petamber Pahuja (Director of Business Engineering) & Mike Lenze (Chief Automation Engineer) Recorded: Jul 20 2017 40 mins
    The quest to eliminate unwanted downtime feels like a permanent battle. We are all trying to reduce failures, diagnose issues faster, and deploy the right engineer(s) to fix the problem. This is top of mind for everyone in IT. 

    In this webinar, the team from pureIntegration share first-hand insights around IT enhancement projects that were recently deployed at our Fortune 500 clients, including:

    • ITSM strategies, processes, and tools that can integrate with your existing service management architectures.
    • The requirements to build application maps that will visually represent underlying application failure through correlated event data. 
    • A live demonstration of:
    - A visual application map (service model)
    - Graphical reporting dashboard
    - Underlying configuration management database
    - Ability to diagnose and restart services with Chatbots
     
    Register Now!
  • The Economics of Serverless Computing
    The Economics of Serverless Computing Owen Rogers Recorded: Jul 20 2017 32 mins
    Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Jul 27 2017 5:00 pm UTC 30 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • How to Scale Agile SAFely at the Portfolio Level
    How to Scale Agile SAFely at the Portfolio Level Dean Leffingwell, Scaled Agile, Inc & Tamara Nation, CA Technologies Jul 27 2017 5:00 pm UTC 60 mins
    Scaled Agile, Inc recently released SAFe® 4.5, with feedback from users and the community. In the words of Dean Leffingwell, Director and Chief Methodologist at Scaled Agile, Inc.: “we believe you’ll find 4.5 to be leaner, more Agile, and better at fostering faster innovation and learning than any of its predecessors”.

    Join Mr. Leffingwell and Tamara Nation, Agile Transformation Consultant at CA Technologies, on Thursday, July 27, 10am PT / 1pm ET, as they discuss:

    •What’s new with SAFe 4.5
    •How CA Agile Central supports SAFe 4.5 at the portfolio level
    •How successful companies combine SAFe implementation and CA Agile Central

    We encourage you to join us for the first of a three-part series on how CA Agile Central Products and Services supports scaling agile SAFely.



    SAFe is a registered mark of Scaled Agile, Inc. Reproduced with permission © 2011-2017 Scaled Agile, Inc. All rights reserved.
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture
    From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture Matthias Krohnen, Manager IT, Miles & More GmbH, Torben Jaegar, Solution Architect, Red Hat; Pagop, Sales Specialist, Red Hat Jul 27 2017 6:00 pm UTC 45 mins
    With over 29 million participants, Miles & More is the largest frequent flyer program in Europe. Expanding this travel rewards program into other markets required a fundamental change to the company's IT infrastructure, as the previous legacy environment was hard to maintain and not scalable. Miles & More chose to move to a microservices-based architecture built on Red Hat OpenShift. With this new environment, the company can support innovation and deploy new microservices into production within 5 days with zero downtime. Learn more about how Miles & More modernized their application development environment and process.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • Using Big Data & Machine Learning to Uncover Hidden Cyber Threats
    Using Big Data & Machine Learning to Uncover Hidden Cyber Threats Ofir Barzilay, VP R&D at Cyberbit Endpoint Detection & Dana Gardner, Principal Analyst, Interarbor Solutions Aug 1 2017 5:00 pm UTC 60 mins
    As we’ve learned from the recent WannaCry and Petya attacks, attackers can now bypass not only antivirus systems but more advanced, next-generation security systems and put large enterprises out of service.  Today, detecting advanced attacks requires understanding their behavioral patterns and analyzing massive amounts of data in near real time. This can be achieved by using machine learning, behavioral analysis and big data security analytics.

    Join us on this webcast and learn how Cyberbit Endpoint Detection is using next generation technologies originally developed for confidential military projects, to detect threats that outsmart conventional security solutions.

    What you will learn:

    -Why most organizations are vulnerable to advanced cyberattacks even after deploying security systems
    -How behavioral detection and machine learning can surface a cyber threat that penetrated the organization - before damage was done.
    -How you can detect zero-day attacks and accelerate response and slash SOC operation cost
    -How Cyberbit uses Vertica with near real-time data ingestion and advanced data transformation from hundreds of thousands endpoints
  • Software Quality at Speed in Agile and DevOps Environments
    Software Quality at Speed in Agile and DevOps Environments Nancy Gohring, Senior Analyst, 451 Research. Dharminder Dewan, Agile QA Manager, Infostretch Aug 1 2017 5:00 pm UTC 60 mins
    The meteoric rise of software is putting pressure on development teams to iterate faster. It’s no surprise that this trend has resulted in the adoption of new tools and more agile practices, such as DevOps, the impact of which has been to push testing left. Development and DevOps teams are now building in testing earlier in the development cycle, helping to speed delivery of new releases for maximum competitive advantage.

    This new methodology also is shaking up the relationship between testing teams and development teams. In some cases, developers might take on some QA functions, while the QA teams serve as consultants. A free web seminar on August 1st will explore these topics in-depth with expert advice from Nancy Gohring, 451 Research Senior Analyst for Application and Infrastructure Performance, and Dharminder Dewan, Agile QA Manager for Infostretch.

    Join this web seminar to learn how to:

    •Overcome common quality challenges that are faced by most developers
    •Apply “Shift Left” DevOps best practices to achieve the highest quality and fastest time to market
    •Improve group dynamics across DevOps teams to optimize the development life cycle for continuous delivery of quality software at speed.
  • The Application Lifecycle Model is Changing - Don't Get Left Behind!
    The Application Lifecycle Model is Changing - Don't Get Left Behind! Craig Sproule, CEO, Metavine Aug 1 2017 6:00 pm UTC 30 mins
    Your application's customers are facing unprecedented competition in their businesses. To win, they need you to help meet this challenge by delivering exceptional digital solutions faster than ever before. In order to achieve this digital agility, you must rethink your application lifecycle model and adjust how you are currently developing your enterprise applications. Join us for this 20-minute briefing to learn:

    • How industry dynamics are driving a change to the approach to application development
    • Why today’s application lifecycle models can no longer satisfactorily meet demand
    • Why next-generation application lifecycle models are needed and and how they work
    • How a real-world enterprise system achieved these goals

    Speaker Bio
    Craig Sproule is the founder and CEO of Metavine Previously, he had founded a successful systems integration firm that completed hundreds of enterprise-class development engagements in various industries over 17 years. From these projects, he developed Metavine Genesis that delivers an innovative approach to the application lifecycle that enables companies to achieve cloud-first digital agility. With more than 30 years experience in enterprise software sector, Craig has also held senior technology and management positions at several leading software companies.
  • Open Banking APIs: Where, what and when?
    Open Banking APIs: Where, what and when? Barry O'Donohoe, Senior Partner, RAiDiAM Consulting Aug 2 2017 1:30 pm UTC 45 mins
    The webinar will explore the topic of customer consent, its authorisation during an Open Banking API flow from an overall concept, design and implementation perspective.

    This will cover all main aspects of the security profile and enforcement on an API channel - also from a GDPR perspective.

    Also explored will be how a policy decision capability could help with fine grained authorisation in the context of an Open Banking / PSD2 API channel.
  • Speed up your software development lifecycle using Kubernetes
    Speed up your software development lifecycle using Kubernetes Marco Ceppi, Product Strategy at Canonical and Luke Marsden, Head of Developer Experience at Weaveworks Aug 2 2017 4:00 pm UTC 60 mins
    For a complete cloud native application lifecycle Kubernetes needs some tools to "close the loop". The promise of the new way of doing things, is that you'll speed up your software delivery with microservices and devops teams. But how should you really do that?

    Join this webinar to discover:

    * Why you should try the Canonical Distribution of Kubernetes container solution and how to install it.
    * How to deploy, troubleshoot and manage your application using Weave Cloud
    Prometheus monitoring.
    * What is Prometheus monitoring, how it works, how to instrument your application using it and how you can get the most out of it.
    * How to speed up your software development lifecycle - ship features faster, fix problems faster.

    The webinar includes live demo’s and Q&A.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Leapfrog your Virtualization Deployment Process with Ansible
    Leapfrog your Virtualization Deployment Process with Ansible Jon Benedict, technology evangelist, Red Hat; Moran Goldboim - senior technical product manager, Red Hat Aug 3 2017 4:00 pm UTC 45 mins
    Virtualization configuration management should be an easy and automated process that allows your team to continuously deliver innovation. Furthermore, you need to be able to provide speed, efficiency, and security for the DevOps and virtualization administration teams with simple architecture and management tools.

    In this webinar, you'll learn how Red Hat® Virtualization and Ansible Tower by Red Hat can help your organization to:
    > Quickly and easily provision, deprovision, take inventory, and manage your virtual infrastructure.
    > Empower your non-administrative users to confidently and securely request and manage virtual resources using provided playbooks.
    > Provide flexibility and control while speeding up development.
    > Add new capabilities to your continuous integration, improving the cycle times and agility of your application teams.
  • Big Data Analytics and Hybrid Cloud Considerations
    Big Data Analytics and Hybrid Cloud Considerations Cloud Standards Customer Council Aug 8 2017 3:00 pm UTC 60 mins
    Big data analytics (BDA) and cloud computing are a top priority for CIOs. Harnessing the value and power of big data and cloud computing can give your company a competitive advantage, spark new innovations, and increase revenue. The majority of the use cases for big data and analytics are built on hybrid cloud infrastructure. Hybrid cloud is a secure and cost-effective way to manage big data and analytics while allowing for increased scalability and computational power.

    This webinar will cover:

    •Business reasons to adopt cloud computing for big data and analytics capabilities
    •An architectural overview of a big data analytics solution in a cloud environment with a description of the capabilities offered by cloud providers
    •Proven architecture patterns that have been deployed in successful enterprise projects
    •An overview of what hybrid cloud is and why it is important in the context of big data and analytics
    •Hybrid cloud implementation considerations

    The information provided in this webinar draws from the following two deliverables from the Cloud Standards Customer Council: Cloud Customer Architecture for Big Data and Analytics Version 2.0 and Hybrid Cloud Considerations for Big Data and Analytics.
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Aug 8 2017 3:00 pm UTC 60 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Banking on OpenShift: A DevOps Journey
    Banking on OpenShift: A DevOps Journey John Rzeszotarski, Director of Continuous Delivery and Feedback at KeyBank Aug 8 2017 7:00 pm UTC 15 mins
    John Rzeszotarski, Director of Continuous Delivery and Feedback at KeyBank, shares how his organization tackled the modernization of a complex online banking system consisting of different merged banks with various legacy computer systems. Learn how KeyBank used Red Hat OpenShift and a DevOps approach to successfully update their online banking platform.
  • Get Ready for AI-Driven Analytics
    Get Ready for AI-Driven Analytics Martha Bennett, Principal Analyst, Forrester; Andrew Yeung, Sr. Director, Product Marketing, ThoughtSpot Aug 9 2017 5:00 pm UTC 60 mins
    Join ThoughtSpot and Forrester Research Principal Analyst, Martha Bennett, to learn best practices for leveraging AI as a key enabler for analytics. We’ll also discuss how to best understand and manage the potential risks involved.
  • 3 Reasons Why Flash is Changing Back-Up and Recovery
    3 Reasons Why Flash is Changing Back-Up and Recovery Jack Hogan, CTO and General Manager, Lifescript Brian Reagan, CMO, Actifio, Vaughn Stewart, VP of Technology, Pure Storage Aug 9 2017 5:00 pm UTC 60 mins
    Attend this webinar to find out why and how Lifescript, one of the world's largest women's health care websites serving 10 million customers and a half billion emails monthly have transformed their data centers with AppFlash from Actifio and Pure Storage.

    In this webinar you will learn about:

    - AppFlash, an all flash, enterprise backup appliance improving Business Resiliency & availability
    - How the solution improves internal SLA’s while reducing cost, risk, & complexity of backup & DR
  • Security Orchestration In Action: Integrate – Automate –Manage
    Security Orchestration In Action: Integrate – Automate –Manage Silvio Pappalardo & Alex Ruhl, FireEye Aug 10 2017 1:30 pm UTC 60 mins
    Simplify & Accelerate Security Operations through integration and automation

    Join us to hear how Security Orchestration from FireEye can:

    UNIFY SECURITY TOOLS
    Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
    Save time and resources & Improve your overall ROI

    ENHANCE SECURITY TEAM CAPABILITY
    Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
    Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.

    INCREASE EFFICIENCY AND PERFORMANCE
    Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
    Minimise error prone manual processes while maintaining response and process consistency &
    Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.

    Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
  • NTT DATA’s Intelligent QA Approach
    NTT DATA’s Intelligent QA Approach Nikhil Joshi - VP QAT Practice, Katsutoshi Imai - QAT Global R&D Lead Aug 10 2017 2:00 pm UTC 60 mins
    Join this informative webinar to see how we achieve superior test acceleration using NTT DATA's ML/AI based Intelligent QA solution. Our Software Test Acceleration Toolkit forays into Intelligent Automation space with its in-house built analysis driven testing engine, helping organizations improve their testing quality by taking better decisions.
  • Five Indicators Your Network May be Breached
    Five Indicators Your Network May be Breached Tony Thompson, General Manager, Threat Detection, SS8 Networks Aug 10 2017 5:00 pm UTC 45 mins
    Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats. The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.
  • How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery
    How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery Dale Bewley, Pixar, Leonard Arul, Walt Disney Studios, Thomas Haynes, Disney; Charles Sochin, Pixar Aug 10 2017 6:00 pm UTC 45 mins
    Providing platforms and services at Disney Studios and Pixar is both exciting and demanding. OpenShift offered a technology mix that assisted the technology teams to deliver an on demand, container platform that exposed developers to up-to-date content, pipeline automation, storage, and deployment patterns for microservices and tiered applications. During this talk we will hear from both the Disney and Pixar teams to find out how they are offering an automated experience for developers and IT services.
  • Start Benefiting from PAN-OS 8.0 Now
    Start Benefiting from PAN-OS 8.0 Now Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics Aug 15 2017 4:00 pm UTC 45 mins
    You’ve heard the hype, now see for yourself the innovations that PAN-OS 8.0 brings to your network security. Attend this 30 minute webcast, “Start Benefiting from 8.0 Now,” to get a quick overview of the new features and enhancements PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course and VM-100 - $800 value

    Reserve your spot now, so you can start to take advantage of all 8.0 has to offer.
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 15 2017 5:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Shashi Kiran, CMO, Quali, Jay Lyman,Analyst, 451 Research Aug 16 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations
  • Not Your Grandmother’s Network: What SDN Really Means
    Not Your Grandmother’s Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Aug 16 2017 9:00 pm UTC 60 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.