Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Choosing the Right Stack for Always-on Applications
    Choosing the Right Stack for Always-on Applications
    Simon Jones, CMO, PubNub Recorded: Jun 18 2019 32 mins
    Across every software category, there is a growing expectation and demand for realtime data. Yet, existing three-tier software architectures are being stretched to the limit trying to handle the latency, and scale, power, and bandwidth requirements of always-on streaming data. As software continues to evolve from a request/response architecture to an always-on data stream architecture, a lot has to change. This presentation will explore new software architectures that are needed to make it easy for companies to deliver applications that rely on the Streaming Web. Topics discussed include:

    -The APIs and infrastructure that exist (or need to exist) to address the new complexities that emerge from the Streaming Web.

    -The software design patterns that will emerge as architectures change to support a world of always-on data streams.

    -The industry trends and thought leadership that are helping define architecture for the streaming web.
  • Watch the exclusive Keynotes from Qonnections, Qlik®'s global conference
    Watch the exclusive Keynotes from Qonnections, Qlik®'s global conference
    Mike Capone, CEO, Qlik; Rick Jackson, CMO, Qlik Recorded: Jun 18 2019 118 mins
    Whether you live and breathe data or you've just begun your journey, Qlik®’s conference Qonnections provided the insight, knowledge, and inspiration you wouldn’t find anywhere else. And you have the opportunity to attend the Keynotes that were streamed live from Qonnections in Dallas on June 14th.

    From this Keynotes, you will hear straight from Qlik’s CEO, Mike Capone and CMO, Rick Jackson. They’ll share Qlik’s industry-leading vision and product strategy. You’ll hear how Qlik customers are solving their toughest data problems and see new product demos on how Qlik’s 3rd-generation BI technology is helping our customers achieve digital transformation faster and easier.
  • Unleash the Power of Identity-based Cloud Security with Aporeto
    Unleash the Power of Identity-based Cloud Security with Aporeto
    Anand Ghody, Sr. Marketing Technical Engineer Recorded: Jun 18 2019 56 mins
    As more organizations migrate to the cloud, many are confronted with the challenge of securing workload environments both on-prem and in the cloud. The increasing use of cloud-native technologies like containers, Kubernetes, service mesh and serverless add more complexity to effectively providing security for these very different environments. These shortcomings are emphasized with a traditional network security model that relies on IP addresses and lacks scalability and protection against advanced threats. What is needed is a new, identity-based approach to cloud security.

    The Aporeto platform abstracts security away from the IP infrastructure to address application segmentation requirements and improves application risk posture. Aporeto’s identity-based segmentation approach transcends the security constraints of on-prem infrastructure while securing all cloud services, by effectively implementing a Zero Trust security posture across any infrastructure at any scale. Aporeto provides the ultimate segmentation for modern applications based on cryptographic workload identity rather than IP addresses. Security policies remain persistent no matter where the application resides in your cloud or hybrid environment.

    In this webinar we will demo Aporeto’s cloud security services:

    Distributed Firewall: Protect any application across all hybrid and cloud environments

    Cloud PAM: Turn-key privileged access management to your cloud infrastructure

    Identity-Aware Proxy: Enable secure, VPN-less access to any web application
  • Unstructured Data Management: A New Way of Fighting Data
    Unstructured Data Management: A New Way of Fighting Data
    Enrico Signoretti, Krishna Subramanian Recorded: Jun 18 2019 62 mins
    The fight against data growth and consolidation was lost a long time ago. Several factors contribute to the increasing amount of data we store in storage systems such as users desire to keep everything they create, organizational policies, new types of rich documents, new applications, and demanding regulations are just some of the culprits.

    Many organizations try to eliminate storage silos and consolidate them in large repositories while applying conservative policies to save capacity. It’s time to take a different approach and think about managing data correctly to get the most out of it. Unstructured data, if not correctly managed, could become a huge pain point from both finance and technical perspectives. It is time to think differently and transform this challenge into an opportunity. Let us show you how to get more efficiency and value out of your data!

    Join this free 1-hour webinar from GigaOm Research that is bringing together experts in data storage and cloud computing, featuring GigaOm Enrico Signoretti and special guest from Komprise, Krishna Subramanian.

    In this 1-hour webinar, you will discover:

    • The reality beyond data growth and what to expect from the future
    • Why data storage consolidation failed
    • Why cloud isn’t a solution if not managed correctly
    • How to preserve and improve the user experience while changing how your infrastructure works
    • How to understand the value of stored data to take advantage of it
    • How data management is evolving and what you should expect in 12-to-18 months.
  • Using Metrics to Drive Your Software Security Initiative
    Using Metrics to Drive Your Software Security Initiative
    Kevin Nassery, Senior Principal Consultant, Synopsys Recorded: Jun 18 2019 48 mins
    Intuition can take you quite far at the beginning of your application security journey. But even the most experienced leaders will eventually need data to guide them through a decision or justify their investments. Well-designed software security metrics provide that compass.

    This webinar will arm software security group leadership with the knowledge necessary to design key metrics that drive thoughtful investment and enhancement of their software security initiative (SSI).

    We’ll pay special attention to must-have application security metrics, common missteps, and executive visibility across the Software Security Development Lifecycle (SSDL) and SSI.
  • Deliver Unrivaled End User Experience - How Synthetic Monitoring Can Help
    Deliver Unrivaled End User Experience - How Synthetic Monitoring Can Help
    Daniella Pontes, Senior Product Marketing Manager at InfluxData, Larry Gordon, CRO at xOps, Sean Mack, CEO at xOps Recorded: Jun 18 2019 50 mins
    DevOps engineers would love to measure the performance and availability of every page of a website or application. It’s easy enough to do technically. Just attach a Synthetic User Monitor to each page and then see the results in an easy-to-use data presentation tool. The snag is that it can be expensive since Synthetic User Monitoring tools usually come as part of a large Application Performance Monitoring package.

    In this webinar, learn how you can use open source tools as a powerful option for Synthetic Monitoring and be on the road to building observability into your applications.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Recorded: Jun 18 2019 57 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Why Model-Based Integration is Key for Value Stream Management
    Why Model-Based Integration is Key for Value Stream Management
    Tasktop Value Stream Architect, Zoe Vickers Recorded: Jun 18 2019 30 mins
    Despite the well-documented benefits and criticality of integration, at the enterprise level, integration continues to present big challenges for many organizations.

    The traditional approach to integration – i.e., point-to-point integration between two tools - cannot handle the size and complexity of the work that enterprises are undertaking.

    During this webinar, Tasktop Value Stream Architect, Zoe Smith, will demonstrate why model-based integration is the only way to efficiently synchronize large volumes of sophisticated data across teams and tools, while maintaining integrity and supporting cross-tool reporting.
  • Best Practices for Healthcare Digital Transformation
    Best Practices for Healthcare Digital Transformation
    John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout Recorded: Jun 18 2019 43 mins
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • Hyper-Converged Infrastructure: Maximizing TCO and ROI
    Hyper-Converged Infrastructure: Maximizing TCO and ROI
    Dave Demlow, Dusty Koenkenberg, Enrico Signoretti, Jody Harper Storage Capacity, HCI Recorded: Jun 18 2019 58 mins
    This free 1-hour webinar from GigaOm Research brings together IT infrastructure experts, featuring GigaOm Enrico Signoretti and special guests from Scale Computing, Dave Demlow, and the Detroit Symphony Orchestra, Jody Harper. The presentation and discussion will focus on the benefits of hyper-converged infrastructure (HCI) from the point of view of end users (those that have already adopted it) and an analysis of different approaches to HCI.

    End users struggle to keep their infrastructure simple, flexible, and scalable while keeping costs at bay. Hyperconvergence is a solution that promises it all, but there are also trade-offs and different approaches to solving the same problem. What is the best solution for your organization?

    Identifying the right solution is not easy, and it depends on several factors including system architecture, simplicity, usability, support, ease of use, and more.

    In this 1-hour webinar, you will discover:

    • Different types of HCI
    • What you can really do with HCI
    • The benefits of end-to-end solutions
    • HCI for centralized and distributed organizations
    • Key criteria to evaluate an HCI infrastructure
    • Data protection and Disaster Recovery options
    • Edge-Core-Cloud
    • The role of Cloud to improve infrastructure TCO

    This webinar is designed to inform and educate end users who are considering innovative solutions for their infrastructure strategy, giving both technical and business perspectives on the covered topics.
  • An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Jun 18 2019 57 mins
    SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.

    Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.

    Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:

    •Reduce costs associated to database backups
    •Increase backup performance by reducing recovery times
    •Implement a cloud native solution to manage your cloud based SAP
    HANA databases.
  • Rugged Continuous Delivery
    Rugged Continuous Delivery
    Rob Stock, Senior Solutions Architect, Micro Focus Recorded: Jun 18 2019 37 mins
    Improving pipeline release velocity and security.

    Continuous Delivery is the direction of travel for the IT industry – but where does your business meet the buzzwords? And – crucially – how can it improve release times and maintain security in your pipelines?

    Find out. Join Rob Stock, Senior Solutions Architect, for Rugged Continuous Delivery: Embedding security and release activities into your Pipelines.

    This 40-minute session explains how Micro Focus ALM Octane enables a more rugged approach to Continuous Delivery that can embed security and release activities into your pipelines.
  • Digital Business + SD-WAN = Your Digital Transformation Success
    Digital Business + SD-WAN = Your Digital Transformation Success
    Milind Bhise, Riverbed Sr. Director Product Marketing; Zeus Kerravala, ZK Research, Principal Analyst Recorded: Jun 18 2019 58 mins
    How to Overcome the Digital and Network Challenges in the Hybrid Enterprise

    Digital Transformation is driving business and IT leaders to dramatically rethink how their networks are managed, especially to embrace an increasingly complex IT landscape. Often overlooked, networks are required to deliver increased performance, while still be extremely flexible and agile. SD-WAN allows organization to manage and optimize the network in new, more efficient ways, allowing Digital Transformation to be successful.

    This webinar addresses core challenges and opportunities organizations are facing, and outlines paths to a transformative digital business.

    Join ZK Research and Riverbed to understand:

    How Digital Transformation is driving network evolution
    Networking challenges and opportunities within the digital age
    Why SD-WAN is critical for digital success
    Evaluation criteria for choosing an SD-WAN vendor
    Customer examples
  • Panel: How Your Company Can Move From Understanding DevSecOps to Implementing It
    Panel: How Your Company Can Move From Understanding DevSecOps to Implementing It
    Chris Wysopal, Veracode | Paul Keim, Cox Communications | Pejman Pourmousa, Veracode Recorded: Jun 18 2019 49 mins
    All our preceding sessions have described the key elements of a shift to DevSecOps. Now get practical tips, best practices and next steps on migrating to DevSecOps from our panel of experts. During this session, we will continue the conversation in an open discussion format and break for audience Q&A.

    Bring your questions and get ready to contribute your thoughts and ideas during this “ask the experts” session.

    Chris Wysopal - Chief Technology Officer - Veracode
    Paul Keim - Senior Security Architect - Cox Communications
    Pejman Pourmousa - Vice President, Services - Veracode
  • Integrating App Security Policies into a DevOps World
    Integrating App Security Policies into a DevOps World
    Pejman Pourmousa, VP, Services at Veracode Recorded: Jun 18 2019 39 mins
    Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.

    Key Takeaways:
    •Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
    •Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
    •How to proactively approach open source code your developers are using.
  • DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results
    DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results
    Sam King, CEO at Veracode Recorded: Jun 18 2019 34 mins
    DevSecOps is moving beyond the buzzword stage and into the real world. But there are obstacles standing in the way of widespread adoption. Perhaps the biggest obstacle is a lack of understanding about what DevSecOps is, which can discourage IT leaders, developers, and security teams who fear that it is a bridge too far to cross from DevOps, let alone Waterfall and Agile methodologies. Despite these myths and doubts, DevSecOps is producing real results in organizations that embrace it. For example, Veracode’s analysis of thousands of application scans found that applications scanned for security flaws early in the development process had a 48% higher fix rate (reduction in flaws) than other applications.


    In this keynote address, Veracode General Manager Sam King will introduce the concepts of DevSecOps that will form the basis of this virtual summit. Sam will discuss:

    -A simple definition of what DevSecOps is, beyond the hype and the myths, and why it holds promise for bringing together the assurances of AppSec with the speed and agility of DevOps

    -Why the evidence says that DevSecOps is attainable in the real world – how Veracode scanning data shows that there is a genuine shift to DevOps and DevSecOps happening, one step at a time.

    -Overview of the challenges that stand in the way – cultural, process, and technological – and how best practices can break down barriers to change.

    -Welcome to speakers and setting the stage for what you should expect and come away with from the event.
  • DevOps for Your Cloud Project - What’s Behind the Success of Cloud Adoption?
    DevOps for Your Cloud Project - What’s Behind the Success of Cloud Adoption?
    Alberta Bosco, Sr. Product Marketing Manager at Puppet Recorded: Jun 18 2019 19 mins
    The shift to the cloud is about breaking down traditional barriers and opening new lines of communication and collaboration to solve problems. If you have already implemented DevOps practices in your organisation you will find it much easier to transition to the cloud.

    Why? Because cloud transformation requires significant collaboration between different teams. Because cloud adoption is complex a diverse, cross-functional team with experience and perspectives from around the company, can help create a collaborative environment that enables success.

    In this talk you will learn:

    How to manage the cultural shift required for a successful cloud project;

    How to build cross-teams, establish processes, adopt new tools and define KPIs;

    How to identify areas for improvement, increase agility and efficiency.
  • A Process for Running Robust and Empowered DevOps at Scale
    A Process for Running Robust and Empowered DevOps at Scale
    Mark Debney, DevOps Director at 6point6 Recorded: Jun 18 2019 36 mins
    The first step in DevOps implementation at scale involves building a solid foundation of tooling, automation, architecture and testing to provide a standardised level of consistency for development teams to build upon. But where to from here?

    How do we move from dedicated DevOps engineering teams to a robust DevOps capability ingrained within multi-disciplinary teams?

    What steps can we put in place to ensure DevOps works effectively at scale?

    When we acknowledge that scaling DevOps is really about strengthening DevOps capabilities within development teams, we can identify which capabilities are core to our delivery process, how we can strengthen and share these effectively across the wider development practice and which capabilities, if any, are better suited to sit outside of a development team when running at scale.

    Join the 6point6 DevOps Director, Mark Debney, as he sets out the process for running robust and empowered DevOps at scale.

    About the speaker:
    Mark Debney, DevOps Director at 6point6

    Mark is an IT infrastructure specialist with over 20 years’ experience in technology and computer systems. His expertise lies in systems architecture and he has built a number of large-scale high transactional platforms using agile and DevOps methodologies.

    Mark is the Director for DevOps at 6point6, a leading technology consultancy, and helps to shape their DevOps offering with a focus on deploying DevOps at scale for Enterprise solutions.

    Prior to joining 6point6 Mark spent eight years at BSkyB where he was a Principal Engineer and led the Platform as a Service team, assessing emerging technologies and implementing solutions across the wider DevOps group. Before BSkyB Mark held System Administrator roles at The Prytania Group, Reading Room, AM International and was an Electronics Technician in the Royal New Zealand Navy.
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Recorded: Jun 18 2019 48 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Jun 18 2019 29 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on June 18th, 2019 at 01:00 pm ACT to uncover all the tricks of the trade! Register Now!
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Recorded: Jun 18 2019 55 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • Event Processing: Turn your Data into Actions
    Event Processing: Turn your Data into Actions
    Kevin Bohan, Director of Product Marketing, TIBCO Software Recorded: Jun 17 2019 16 mins
    Data is arriving from hundreds of internal and external sources—and it has a shelf life; its value diminishes over time. The ability to process huge amounts of data in real time is imperative to driving business in today’s competitive landscape. TIBCO Cloud™ Events software as a service enables digital businesses to identify meaningful events in time to influence their outcome—whether to mitigate risk or improve the customer experience.

    In this webinar, you will learn how to reduce decision latency by processing events as they occur and responding with the next best action in real time. Discover how you can expose patterns based on correlation between real-time and historical scenarios to understand unusual activities, recognize significant trends, identify risks, or uncover opportunities—and then automate the next course of action.
  • Learn How to Seamlessly Connect Cloud and Hybrid Applications
    Learn How to Seamlessly Connect Cloud and Hybrid Applications
    Paul Varley, Sr. Product Marketing Manager Recorded: Jun 17 2019 18 mins
    TIBCO Cloud™ Integration makes it easy for anyone to integrate business applications. From developers, to IT specialists, to daily business operations participants, everyone is involved with integration. One of the newest additions to TIBCO Cloud Integration is TIBCO Scribe® Software capability.
  • Tap into Your API & Microservice Investments with Low Code Apps
    Tap into Your API & Microservice Investments with Low Code Apps
    TIBCO Recorded: Jun 17 2019 64 mins
    APIs and microservices power today’s digital stack. You want to be able to tap into these APIs to quickly build and deploy new applications to better engage with customers or improve operational excellence. But, if you’re not a developer, how can you take advantage of all these new technologies to help your company accelerate the journey to digital business?

    In this webinar with Constellation Research and TIBCO, learn:
    -How organizations today are helping their business users to capture business opportunities up to 10 times faster through building smart business apps
    -How to create enterprise-ready apps that automate operational processes or improve and unify existing systems
    -How to extend IT reach, scale change and turbocharge innovation
  • APIs, Documentation, & Security in the World of Event-driven Microservices
    APIs, Documentation, & Security in the World of Event-driven Microservices
    Rob Zazueta, Director of Digital Strategy, TIBCO Recorded: Jun 17 2019 35 mins
    Everything was easier when we knew where our code would run. Now, with the advent of microservices, functions as a service, and other massively distributed architectures, the traditional role of API Management—scalability, security, support—is changing.

    Join us for a 20-minute live webinar where TIBCO's Rob Zazueta will explain what these changes look like and how to adapt to them. You want to continue supporting your current architectures, while you begin adopting the brave, new world of massive distribution.
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Pierre-Andre Aeschlimann Jun 19 2019 8:30 am UTC 45 mins
    Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.

    In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
    •Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
    •Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
    •Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
    •Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
  • Embrace the Configuration Data Chaos in DevSecOps
    Embrace the Configuration Data Chaos in DevSecOps
    Benny Van de Sompele, CTO Jun 19 2019 9:00 am UTC 43 mins
    Why configuration data matters - today and tomorrow!

    Configuration data is more important now than ever before, as we get releases into production faster and more frequently. We need new code, the right “settings” for the right environment and the right release which comes down to configuration data.

    You probably already use a distributed source code management (SCM) platform like git or bitbucket? You’ve invested in automated testing of your code? You’ve thought about automating the deployments from DEV to TEST to PRODUCTION?
    But how do you manage, test and validate all the configuration data and settings that go with it?

    Join us for this webinar where Benny Van de Sompele will talk about:

    - The current state of configuration data management and the challenges that come with it.
    - How you can introduce a non-intrusive automated process, which will allow your DevOps teams to release more often and faster, whilst at the same time reducing the risk of failure and service degradations.
    - Real use cases from legacy type environments from pure cloud native architectures and hybrid applications. With the increase of CI/CD automation in the market, comes the risk of rapidly breaking application environments.

    The more we automate the less there is “human validation”, but without rigorous testing and validation sooner or later failure will happen.

    The future is digital – everybody agrees, the cost of failure is now the difference between surviving and thriving.
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Jun 19 2019 9:00 am UTC 56 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • If Developers Own Security Testing in DevOps - What is Security's Role?
    If Developers Own Security Testing in DevOps - What is Security's Role?
    Chris Wysopal, CTO at Veracode Jun 19 2019 10:00 am UTC 45 mins
    Application security is “shifting left.” As the responsibility for ensuring the stability and security of software shifts to developers, what does this mean for security professionals? What does their job look like if developers are responsible for security testing?

    Learn:
    •What the security professional’s role and responsibilities look like in a DevSecOps shop
    •The DevSecOps cultural changes that will affect security
    •The attributes that security tools will need in this new landscape
    •Best practices for security professionals looking to not only survive, but thrive, in a DevSecOps world
  • Securing the Sugar out of Azure DevOps Pipeline
    Securing the Sugar out of Azure DevOps Pipeline
    Colin Domoney DevSecOps Consultant at Veracode Jun 19 2019 11:00 am UTC 43 mins
    This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.

    Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.

    Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
  • Integrating AppSec into Developer Tools and Processes
    Integrating AppSec into Developer Tools and Processes
    Tim Jarrett, Product Management at Veracode Jun 19 2019 12:00 pm UTC 60 mins
    Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.

    Key Takeaways:
    •Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
    •Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
    •How to proactively approach open source code your developers are using.
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Jun 19 2019 12:00 pm UTC 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity Jun 19 2019 12:00 pm UTC 60 mins
    Sounds easy this Digital Transformation thing. Everyone apparently is doing it. Save a bunch of money. Makes customers happy. Our organisation looks good in the press or on the stock market. Hey – we don’t even have to do it as we can outsource everything to someone else! Nirvana!

    Really? I mean REALLY? What percentage of these initiatives do not meet their expectations? What percentage of these initiatives instead make customers unhappy, or cause staff to leave or cost you money because you did not consider what these 2 words REALLY mean?

    Let’s discuss what Digital Transformation can mean to you in what I hope is an interactive session on language, leadership expectations, metrics, basic tools you need, challenges, outcomes and the impact on your people. This is not a technical session. This is a discussion for leaders at any level on how to best engage the new industrial movement of our time best known as Digital Transformation.

    About the speaker:
    Daniel Breston was a technology leader at some level for over 3 decades for large financial services organisations in the USA and UK. Now at Virtual Clarity, Daniel coaches leaders that want to benefit from or lead technology teams to help organisations do better things faster and safer. You can also find Daniel speaking at ITSM, DevOps or local conferences or join him in discussion blogs.
  • Proving the value of DevOps using metrics
    Proving the value of DevOps using metrics
    Jeremy Brown, Director, Red Hat Open Innovation Labs, EMEA Jun 19 2019 2:00 pm UTC 60 mins
    Are you moving from project-based to product-centric teams? How about using agile delivery methods, or, applying DevOps culture with heavy automation? Are you an advocate of these practices, but struggle to articulate the benefits to your wider organization?

    In this session, Jeremy Brown, Red Hat Open Innovation Labs, will introduce a powerful metrics-based process mapping tool that can be used to help teams articulate the benefits, return, and value of DevOps adoption to the wider organization. Jeremy will demonstrate how this metrics-based process mapping tool was used with a European automotive company to reveal a 30x improvement in their key metrics. You will leave with the ability to implement this very simple yet effective tool in your own organizations to begin or accelerate DevOps adoption.
  • How to Deliver Direct Internet Access to Your Global Branches
    How to Deliver Direct Internet Access to Your Global Branches
    Yishay Yovel Jun 19 2019 2:00 pm UTC 22 mins
    How much of your MPLS traffic is actually meant for the cloud? Many of Cato customers managed to offload up to 40% of their MPLS lines while solving latency issues, originated by backhauling traffic across their MPLS.

    Opting for direct Internet access, however, exposes your sites to Internet-borne threats. So how do you deliver direct internet access to the branch without compromising on security and costs?
  • Creating A Winning Digital Transformation Strategy
    Creating A Winning Digital Transformation Strategy
    Art Langer, David Linthicum, EJ Bodner AI, Artificial Intelligence, Internet of Things, Mobile, 5G, IoT Jun 19 2019 2:00 pm UTC 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm David Linthicum and special guest from Nutanix, Dr. Arthur Langer. The discussion will focus on the stepwise process of understanding where you are in employing digital, where you need to go, and the specifics to drive success the first time.

    “Digital transformation” is certainly the buzzword of 2019, but most don’t know what it is, why it is important and how to do it right. By investing in digital experience transformation enterprises can discover valuable customer behavior insights and execute personalized experiences to engage, delight and retain customers.

    In this Webinar, we’ll take the mystery out of what it takes to create and execute on a digital transformation strategy, including what’s important, and what needs to be avoided. This will be a candid discussion with industry experts. We’ll explore what technology to leverage, best practices, and approaches.

    In this 1-hour webinar, you will discover:

    • Reference technical architecture of digital transformation, from 5G to IoT.
    • Social architecture, or how people are important to this transformation strategy.
    • How to sell digital initiatives to the board of directors, and other stakeholders.
    • Core metrics and continuous integration that keep priorities straight.
  • [Panel] DevOps Adoption Challenges and How to Overcome Them
    [Panel] DevOps Adoption Challenges and How to Overcome Them
    Brad Schick, Skytap | Daniel Breston, Virtual Clarity | Jeremy Brown, Red Hat EMEA Jun 19 2019 3:00 pm UTC 45 mins
    To win with DevOps, you need to be aware of potential issues and know how to overcome the challenges so that you can make the most of its benefits.

    With the incredible growth of DevOps in a short space of time comes numerous questions about how best to adopt it. From insights and driving factors of adoption - to dealing with legacy systems and incorporating robust security features - join our panel of experts to hear advice and learnings from those at the forefront of DevOps adoption.

    Panelists:
    Brad Schick, CTO, Skytap
    Jeremy Brown, Director, Red Hat Open Innovation Labs - EMEA, Red Hat
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity
  • The Future: Enterprise Virtualization to Container-Native Virtualization
    The Future: Enterprise Virtualization to Container-Native Virtualization
    Andrew Sullivan, Principal Technical Marketing Manager, Red Hat & Doron Fediuck, Director, Software Engineering, Red Hat Jun 19 2019 3:00 pm UTC 47 mins
    Virtualization has been a staple of datacenter technology for a decade and continues to provide robust capabilities for all types of applications. Today’s Red Hat Virtualization product might not be what you remember. It now provides a fully featured, enterprise-ready hypervisor capable of hosting any workload in the on-premise datacenter. However, datacenter virtualization is evolving, and gaining the ability to integrate and interoperate with cloud-native applications and containers in new ways.

    In this presentation from Red Hat Summit, Andrew Sullivan and Doron Fediuck discuss where Red Hat Virtualization for the enterprise and container-native virtualization fit into Red Hat’s portfolio and strategy. They also provide an overview of the capabilities that you can expect currently and in new functionality coming.

    If you want to simplify your datacenter virtualization and help make digital transformation a reality, Red Hat's virtualization portfolio should be at the top of your list.
  • The State of Open Source and Security: What It Means for You
    The State of Open Source and Security: What It Means for You
    Gordon Haff, Red Hat & Dave Meurer, Synopsys Jun 19 2019 4:00 pm UTC 60 mins
    Development organizations view open source software as not just important but also strategic. That’s just one of the topics we’ll investigate in this joint webinar from Red Hat and Synopsys. Drawing from Red Hat’s “The State of Enterprise Open Source” report, technology evangelist Gordon Haff will explain why IT decision makers value open source so highly.

    At the same time, changing development practices and escalating threats mean that security remains a concern with respect to open source software, as it is for IT more broadly. Dave Meurer of the Synopsys Software Integrity Group will explain findings from the Synopsys “2019 Open Source Security and Risk Analysis” report to offer an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

    We’ll close with some practical advice about getting the most value from open source software while keeping your organization safe.
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    Stowe Boyd, Kevin O'Donnell Jun 19 2019 4:00 pm UTC 53 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm Stowe Boyd and a special guest from Nitro, Kevin O’Donnell, Director of Product. The discussion will focus on the “Frontline-First” approach to improving workflow management.

    Too often, enterprise change initiatives focus on technology, infrastructure, and process without considering the people and workflows that are the foundation of a company’s productivity.

    Those working on the frontline — in close contact with customers and a changing competitive marketplace — are best positioned and most likely to push for new ways to save time and increase efficiency so long as management lowers barriers to making improvements.

    In this 1-hour webinar, you will discover:

    • Benefits of empowering both frontline and back office workers with the tools to improve their paper-based workflows
    • Power of user analytics when attempting to drive measurable and lasting change
    • Success stories powering this new ‘Frontline-First’ approach to workflow improvement
  • How to start and progress with an AI program
    How to start and progress with an AI program
    Carmine Rimi - Ubuntu Product Manager & Al Kari - Manceps Jun 19 2019 4:00 pm UTC 75 mins
    Whether you’re exploring what AI can do for your business and how to get started; have developed machine learning models you’re looking to deploy in production at scale; want to optimise your models for performance, audit your neural network for adversarial attacks or orchestrate your data pipelines, this webinar will provide an overview of what you need to achieve your goals.

    With data often described as the new electricity powering the 4th industrial revolution, and many leading companies falling behind innovative newcomers, we will discuss how you can maximise the value of your data, and where to use transfer learning or find more data when needed to train models for accurate predictions.

    In this webinar you will also learn:

    1. Which AI solutions are ready for production and for which applications.

    2. About open-source state-of-the-art frameworks and pre-trained models ready to be fine-tuned and deployed with minimal effort to realise your intelligent automation objectives.

    3. About current advancements and limitations in a technology moving at an unprecedented pace, powered by big data, advanced algorithms and infinite cloud resources.

    4. How you can manage change and prepare for the impact to your people.
  • LIVE from HPE Discover: Leading the Digital Transformation to SDDC
    LIVE from HPE Discover: Leading the Digital Transformation to SDDC
    Mark Peters, Chief Analyst at Enterprise Strategy Group Jun 19 2019 5:00 pm UTC 60 mins
    Mark Peters, Chief Analyst at Enterprise Strategy Group (ESG), leads a live video panel discussion with technologists from HPE, Intel, Mellanox and Datera, exploring the driving forces behind the digital transformation in IT from system-defined architectures to software-defined everything. Mark asks the big questions around why enterprise moved applications and storage to public cloud, what is cloud operations on-prem, the meaning of composable infrastructure and why so many leading hardware providers are driving investment in software-defined compute, networking and storage.
  • 20-Minute Speed Demo: Orchestrate Application & Infrastructure Security
    20-Minute Speed Demo: Orchestrate Application & Infrastructure Security
    ZeroNorth Team Jun 19 2019 5:00 pm UTC 30 mins
    In just 20 minutes, see how ZeroNorth can help you orchestrate risk management across applications and infrastructure.

    Join us for a quick-hit online demo—In less than half an hour, we’ll show you how ZeroNorth is the only platform that enables you to:

    • Minimize noise by correlating and prioritizing vulnerabilities across apps and infrastructure
    • Reduce costs by consolidating the management of existing scanning tools (e.g., SCA, SAST/DAST, container management, pen testing, network scanning)
    • Implement consistent vulnerability discovery and remediation
    • Gain continuous visibility of risk throughout the software development lifecycle


    We look forward to seeing you on June 19!
  • How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    David Linthicum, Radhesh Menon Jun 19 2019 5:00 pm UTC 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in cloud computing, storage, containers, and hybrid cloud to discuss how Google’s recent hybrid-cloud strategy Anthos announcement at Google Next ’19 changes production outlook for your IT and DevOps teams.

    Featuring GigaOm Analyst, David Linthicum and a special guest from Robin.io, Radhesh Menon, this webinar will explore Google's Hybrid-Cloud strategy Cloud’s Anthos announced at Google Next, and how that technology can change your outlook on both development and ability to modernize Stateful applications.

    Storage for stateful containerized applications is a fundamental building block of applications on hybrid clouds, leveraging containers, container orchestration, and other parts of that emerging ecosystem. While the focus for container-based applications has been stateless, the ability to maintain state both within and between containerized applications has been a core requirement that DevOps and IT. Attend this webinar to take the mystery out of running stateful applications in containers and managing using Kubernetes with Google Cloud can enable hybrid- and multi-cloud strategy through its new solution, Anthos.

    In this 1-hour webinar, attendees will:

    • Better understand the state of the technology, and what container native storage solutions bring to modern IT.
    • Understand Google Hybrid and multi-cloud strategy and explore new solutions that have just been announced, that may change the game in how you build, deploy, and operate containers.
    • Learn how to hide complexity, while providing and maintaining richness of capability.
  • Peer Exchange:  State of North Dakota's Zero Trust Strategy
    Peer Exchange: State of North Dakota's Zero Trust Strategy
    Ryan Kramer, Enterprise Network Architect, State of North Dakota & John Kindervag, Founder of Zero Trust Jun 19 2019 5:00 pm UTC 60 mins
    Automating Cybersecurity While Preventing Untrusted Systems and Cyberthreats From Compromising State Assets

    Zero Trust and the principles of “never trust, always verify” are becoming more widely known across industries as a model for fighting cybercrime, by eliminating “trust” for both external and internal systems and networks. Is it feasible to implement a Zero Trust strategy in government settings, similar to the private sector?

    Watch as Palo Alto Networks® expert and founder of Zero Trust, John Kindervag, discusses the “whys and hows” of extending a Zero Trust architecture to the network and cloud, and Ryan Kramer, Enterprise Network Architect from State of North Dakota, about their successful Zero Trust and cloud-first implementation to enhance agility and efficiency. Ryan will highlight how the State of North Dakota adopted a Zero Trust posture to automatically detect and defuse cyberthreats on networks, endpoints, and clouds to prevent them from infiltrating state-wide operations.
  • How to Gain Control of Complex Apps Central to Your Digital Transformation
    How to Gain Control of Complex Apps Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jun 19 2019 5:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • The Cyber Skills Gap: A Practitioner’s Perspective
    The Cyber Skills Gap: A Practitioner’s Perspective
    Stanley Parret, Principal Consultant, FireEye Managed Defense Jun 19 2019 6:00 pm UTC 60 mins
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • Why you need a MID server
    Why you need a MID server
    Chuck Tomasi, Senior Technical Product Marketing Manager; Kreg Steppe, Services Program Mgr; Stacey Bailey, Program Manager Jun 19 2019 6:00 pm UTC 47 mins
    Accessing resources from inside an organization's physical or cloud firewall can be challenging. A Management, Instrumentation, and Discovery (MID) server offers a direct, secure solution. It's a Java application that runs as a Windows service or UNIX daemon on a server in your local network. You can communicate and move data faster, easier, and more securely between a ServiceNow instance and external applications, data sources, and services.

    Join Chuck Tomasi, Kreg Steppe, and Stacey Bailey of ServiceNow for an introduction to this powerful, versatile tool.

    In the webinar, you'll learn:

    - How a MID server works and its benefits
    - Best practices for setting up a MID server
    - Using a MID server with ServiceNow applications, including Orchestration and IntegrationHub

    Speakers:
    - Chuck Tomasi, Senior Technical Product Marketing Manager, Platform, ServiceNow
    - Kreg Steppe, Services Program Mgr, ServiceNow
    - Stacey Bailey, Program Manager, App Development, Training and Certification, ServiceNow