Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
Winner of "Best Overall Value" three years in a row, Agiloft Help Desk is top rated by users and analysts alike. Streamline your operations to close tickets faster, improve consistency, and gain actionable insights. With a customizable end user portal, full workflow engine, dashboard performance metrics, and more. Automate assignments and improve efficiency across your entire organization. Trusted by 3+ million users. Start today and see how Agiloft can work for you.
Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.
Learn how Avi Networks delivers flexible application services beyond load balancing, including:
• Application analytics and visibility
• Predictive autoscaling
• Automation in private data centers or the public cloud.
A how-to guide to container and DevOps deployment can help you with the necessary architecture to move faster and be more agile. Red Hat and Intel can help you put DevOps, containers, and application platforms to work for your business.
Enjoy this unique conversation with DevOps enthusiast, Gene Kim, author of The Phoenix Project and The DevOps Handbook, and Brian Gracely, Red Hat director of Product Strategy. Learn from Gene Kim's 18+ years of experience studying high-performing IT organizations.
Join us for a discussion on culture, containers, and accelerating DevOps. Topics will include:
- The trends.
- The journey
- The challenges.
- The path to success
Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.
In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
Hybrid cloud is becoming an increasingly common deployment model, where companies utilize both internal cloud environments, as well as public cloud environments (Amazon AWS, Microsoft Azure, Google Cloud, etc). There are many advantages to such an approach, including flexibility, data privacy, and cost.
Avi Networks helps hybrid cloud deployments with cloudbursting via multicloud support and application AutoScale. Avi Vantage has native support for multiple cloud environments from the same controller cluster, allowing for a true single pane of glass view into your load balancing environment, regardless where it lives.
Join Avi Networks in this webinar to learn about:
• Multicloud support
• Application autoscale
In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
The evolution of connectivity, Big Data management, analytics, and the cloud is enabling organizations to converge operational and information technologies – IT leaders are looking to leverage this through responsive applications for line-of-business and industry-specific end-to-end processes.
This expectation is driving new business opportunities for software vendors who can now integrate edge sensor data with real-time data processing and analytics, to go from sensor to business outcome.
Find out how, as an SAP partner in the “build” engagement model, you can pursue this business opportunity by building and distributing rich IoT applications based on the SAP Cloud Platform Internet of Things service and Cloud Foundry services.
Join our Webcast and learn about:
- The new opportunities to create IoT-related software and business models
- The capabilities of the SAP Cloud Platform Internet of Things service and Cloud Foundry services
- The benefits of our open development platforms and technologies
- How software vendors can take advantage of the SAP PartnerEdge program
- How to drive end-to-end digital transformation for your customers
Register now to begin exploring a partnership with SAP, creating new business models, and driving end-to-end digital transformation for your customers.
Relevant SAP partner program: Build engagement model from SAP PartnerEdge
Christian Baader, VP Strategy & Marcom, SAP Global Channels & Platform GTM Ecosystem
Sujit Hemachandran, Product Manager, SAP Cloud Platform, Integration & IoT
Date: Thursday, October 12, 2017
Time: 10:00 a.m. EST
Are you feeling robbed of valuable execution time at month end due to laborious, time-intensive processes and complex tools? Do you rely on Excel during this tedious and stressful time, but find it to be too manual and inefficient? If so, you’re not alone!
Join Excel4apps for a guided tour into a typical Oracle EBS period-end process, its challenges and suggested ways to improve and streamline standard methods. Learn automation techniques and how you can leverage Excel-based tools to cut reporting time in half!
What you will learn:
-Shorten period-end close to improve business KPIs and make finance teams happy again!
-Avoid continual re-work and duplication - never export to Excel again!
-Improve decision-making by having more time to analyse your data
-Remove reliance on IT at this critical time and allow Finance to build reports themselves
-Make adjusting and loading journals less of a headache
-Manage the entire close process from real-time Excel.
If you are a Finance or Accounting Professional wanting to learn more about how you can achieve a faster, smarter and easier period-end process, then don’t miss this webinar!
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
In this webinar, we will learn about image recognition with deep learning. After a brief overview of what deep learning is, and why it matters, we will learn how to classify dogs from cats. That is, how to train a model to recognize dog images from cat images.
We use Keras, an easy to use python deep learning library that sits on top of Tensorflow, and “fine-tuning”, a very important skill for any deep learning practitioner, to train a model to classify the images.
Once we trained our model to classify dogs from cats images with high accuracy, we dig into the details of the trained model and look at its building blocks, i.e., Convolutional Neural Networks (CNN), Fully Connected Block and activation functions to develop an understanding of how the deep learning model works.
Unused or unmonitored SSH keys grant alarming levels of privileged access. If you are not hyper-vigilant, SSH keys can become vulnerable, and even walk out the door with prior employees—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.
Join fellow information security and system admins, managers, directors, architects, and consultants on this webinar to learn:
• The biggest risks facing your SSH inventory
• Strategies for preventing the misuse of SSH keys
• Five actions that will immediately improve SSH security
Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace.
Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise when it comes to your storage solution. Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what storage and infrastructure models are best for your organization.
In light of recent high profile cyberattacks, notably WannaCry, it is now more important than ever for organisations to take stock of their current IT environment and mitigate security risks caused by the ever-changing threat landscape.
In fact, a recent report by iGov found that nearly 76% of participants had experienced a cyber-attack, and 50% were ransomware victims in the last twelve months.
This webinar focuses on how organisations can best meet this challenge and also explored the most common pitfalls faced and offer expert advice to combat this. Stuart Rogers, IT Security and Technical Architecture Manager at Cheshire Constabulary, shares his organisation’s story.
Many of the world’s largest enterprises are replacing their traditional SAP server environments with SAP running in the AWS Cloud. As well as increasing business agility and scalability, our cloud platform significantly reduces SAP infrastructure and support costs, simplifies operations and contributes directly to the bottom line.
In this overview webinar, you will learn about:
• How Fortune 50 companies are migrating their SAP workloads to AWS
• How rapid resource provisioning in the cloud can help enterprises be more agile
• How IT, and specifically SAP running in the cloud, can become a competitive differentiator, not just a cost centre
• Typical SAP solutions and use cases deployed on AWS
• Methods for accelerating SAP HANA:registered: implementations — break barriers and move to SAP HANA in less than 48 hours
Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
Registrati al webinar per saperne di più!
Data warehousing is a critical component for analysing and extracting actionable insights from your data. Amazon Redshift allows you to deploy a scalable data warehouse in a matter minutes and start to analyse your data right away using your existing business intelligence tools. It’s a fast, fully-managed, and cost-effective data warehousing system. You can analyse all your data using standard SQL and your existing Business Intelligence (BI) tools. Amazon Redshift also includes Redshift Spectrum, allowing you to directly run SQL queries against exabytes of unstructured data in Amazon S3. In this, you will learn how to migrate from existing data warehouses, optimise schemas and load data efficiently. We will also cover analytics tools to help you build visualisations, perform ad-hoc analysis and quickly get business insights from your data.
• Discover best practices for building a data warehouse using Amazon Redshift
• Learn to use Amazon QuickSight for Business Intelligence and AWS Glue for ETL.
Three time winner of Editors' Choice Award by PC Magazine and heralded as "the most customizable contract management system on the market", Our agile technology platform makes it quick to setup and easy to use. Agiloft provides a centralized, searchable repository with integrated workflows, email alerts, PDF contract generation and reports that address even the most sophisticated approval processes. Fully audit compliant with support for HIPAA, SOX and CFR21. Start today with a free custom demo.
Data scientists Daniel and Ryan were the only resources on-hand for Crest Financial's increasing predictive analytics workload, making them feel like mere mortals as they faced the ever-increasing challenge of developing and deploying predictive models to boost their business.
Enter the DataRobot machine learning automation platform. With DataRobot's help, Daniel and Ryan are quickly transforming into data science superheroes, now able to tackle more projects with better results -- faster than a speeding bullet! In this on-demand webinar, you'll learn how they are helping Crest Financial make better lending decisions while:
* Completing tasks that once took months -- almost immediately
* Rolling out models through an easy-to-use and robust enterprise-ready framework
* Delivering more accurate results to their colleagues and educating management on results
With HyperScale Clouds reaching their eleventh year of operation, The Cloud is no longer a semi-autonomous shadow-IT playground, but rather the critical component of any Enterprise Transformation strategy. The fear of cloud failure is no longer the deterrent it once was, and modern strategies dictate a multi-cloud architecture allowing for optimized value and simultaneous risk mitigation. This webinar discusses why there is now widespread adoption of a multi-cloud strategy, and how it helps to achieve several business objectives; namely: optimized ROI, superior security, lower latency and higher throughput, greater autonomy, greater availability and resource optimization. Antonio will also dig into the most current emerging trends of the multi-cloud, including immutable infrastructure and the concurrent tools transformation accompanying this paradigm shift.
In this webinar we will talk about practical steps that will help you:
- Reap the benefits of hybrid cloud by adapting to cloud devops
- Deal with the technical and operational pitfalls involved in migrating to native cloud
- Make the right choices for your cloud architectural to achieve lean devops
The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.
We will discuss:
- How agile integration can benefit your organization and make it more responsive to market demands
- Successful agile application integration approaches
- Best practices for implementing an agile application integration environment
The webcast is intended for system architects and application developers.
Increasingly, companies have turned to customer data platforms (CDPs) to help them run more relevant marketing campaigns using the large volume of customer data at their fingertips. Customer-focused software company Atlassian will discuss how they made that decision and the types of complex marketing campaigns that they can now run as a result. Research analyst David Raab will also be on hand to discuss how other companies can use CDPs to harness customer data to increase sales and loyalty.
In this webinar, you will learn:
* Key considerations when deciding to build versus buy a customer data platform
* How companies are taking advantage of CDPs for more relevant communications
* How data science can improve marketing efficacy
* The trends and market factors driving the need for customer data platforms
* Jeff Sinclair, Product Manager, Engagement Platform, Atlassian
* David Raab, Analyst and Founder at The Customer Data Platform Institute
* Jeff Hardison, VP of Marketing at Lytics
* Stewart Rogers, Analyst-at-Large, VentureBeat
Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.
BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.
For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.
Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
Join us for the first in a series of monthly webinars, presented by Greenlight Group, where Micro Focus and Greenlight Group will provide an introductory session of Micro Focus's container orchestrated IT Operations Management platform. In this webinar, Torrey Jones, Greenlight Group Principal Consultant, will talk through the basics of Micro Focus’s cloud native Container Deployment Foundation – a Docker and Kubernetes centric game changing platform for IT Operations Management in the Enterprise. Prior to diving into the topic of the hour, special guest Roy Ritthaler , VP, Marketing, IT Operations Management, will provide a short update of the New, Combined Micro Focus – post merger with HPE Software.
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
You've heard about the many ways CloudCheckr can help keep your cloud in check. Now you can see CloudCheckr in action, including demos of our 500+ Best Practice Checks, our Cost Savings Reports and Right Sizing tools, and our security & compliance features.
In this webinar, you can view and ask questions as Tim Twarog demonstrates popular features of this award-winning platform.
Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.
From this webinar you will learn:
• How to design SQL server infrastructures for optimal performance
• How the software and hardware infrastructure affect database performance
• Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
• Tools and metrics to find current bottlenecks, inside and outside of the database server
• Tools and best practices for monitoring all layers
Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.
PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.
This webinar explains:
· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise
· The key requirements for establishing a cyber threat intelligence function
· Basic cyber threat intelligence workflows
· Resource and training requirements to support a Cyber Threat intelligence function
Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.
Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.
During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.
Imagine you went to a restaurant and ordered fish and your server came back with a Patagonian Toothfish, a pile of random spices and vegetables, a knife and a frying pan and told you to cook it yourself. Hhhmmm, you thought. So you asked for help. The response: a badly photocopied sheet of paper with a website URL to learn the ingredients for a “Chilean Sea Bass” and a few recipes to boot. This is how we build infrastructure today.
VMware vSAN based hyperconverged solutions from Lenovo revolutionize how you can deliver your datacenter infrastructure. The set-up is simpler, it costs less and easier to use than traditional IT solution. It allows you to focus on running your business rather than on building your infrastructure. Join this webinar as VMware and Lenovo introduce the new ThinkAgile VX Series. The result of this offering: ability to focus on the true business value of hyperconvergence. You will see how vSAN ReadyNodes and ThinkAgile VX will help re-engineer Enterprise IT to be flexible and responsive, enabling more time delivering business value rather than integrating IT infrastructure.
The BI industry is shifting from a data-driven approach to an insights-driven one. It’s not about “WHAT happened?” But “WHY did it happen?”.
Automated Insights will transform the way you discover and analyze data – getting you to the Why Faster.
Yellowfin believes in augmenting the analytical experience where machines surface the right information quickly to enable you to make the best decision. As more analysts are now seeking smart BI, we’d like to share new developments.
What you’ll learn:
- How Automated Insights tells you Why something happened, not just What
- How this transforms the way business end users and data analysts interact with data, and how they consume and act on insights
Not everyone can write code – but nearly anyone can solve a problem. Today's businesses are facing an ever increasing set of problems that require innovative digital solutions. Learn how to safely enable a new army of application developers: the citizen developer.
This webinar will examine the use of citizen developers to meet the ever increasing demand for new applications. We will discuss:
• The current challenges with citizen developers and the gap between them and corporate IT
• An new approach to the application development lifecycle to reduce the complexity of software development and empower this new army of developers
• The concept of gadgets and their role in providing functionality in a secure and compliant manner
• Potential areas where citizen developers can quickly build their own applications
The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake news. Indeed, social (digital) media is just an amplifying mirror of ourselves. Hence, the main challenge of search engines and other websites that rely on web data is to assess the quality of such data. However, as all people have their own biases, web content, as well as our web interactions, are tainted with many biases.
Data bias includes redundancy and spam, while interaction bias includes activity and presentation bias. In addition, sometimes algorithms add bias, particularly in the context of search and recommendation systems. As bias generates bias, we stress the importance of de-biasing data as well as using the context and other techniques such as explore & exploit, to break the filter bubble.
The main goal of this talk is to make people aware of the different biases that affect all of us on the Web. Awareness is the first step to be able to fight and reduce the vicious cycle of bias.
Ricardo Baeza-Yates areas of expertise are web search and data mining, information retrieval, data science, and algorithms. He is CTO of NTENT, a semantic search technology company based in California, USA since 2016. Before, he was VP of Research at Yahoo Labs, based first in Barcelona, Spain, and later in Sunnyvale, California, from January 2006 to February 2016. He also is part time Professor at DTIC of the Universitat Pompeu Fabra, in Barcelona, Spain, as well as at DCC of Universidad de Chile in Santiago.
Dealing with Employee Onboarding, Tracking, and Provisioning in the Digital Revolution - or Something Better...
What if you could consumerize the Employee Service experience?
Making onbaording a breeze for new employees, perhaps even increasing your employee satisfaction score? It's a no brainer right?
There are a lot of platforms who promise they have the "right recipe" when it comes to HR delivery. Finding out the truth behind a platform can be just as scary as implementing one!
That's why on Tuesday, October 24th, you should join Adam Mason, VP of Solutions and Innovation, and Tom Sweeney, Bussiness Process Consultant, of Acorio for our October webinar. They'll cover ServiceNow's new product, HR Service Delivery, and help you understand the platform's onboarding experience and what success it can bring to your company's future (and current) employees.
Find out if your onboarding experience is working.
This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
Organisations are rapidly adopting cloud interconnection at colocation facilities. It is an ideal place to provide services that need to be shared by multiple cloud locations, run legacy applications, or deliver application and security services. By deploying application delivery with cloud interconnection services, businesses get the flexibility and scale of the public cloud without sacrificing security, availability, and performance of their applications.
Join Equinix and F5 experts for an informative webinar where you will learn how to:
- Benefit from cloud interconnection services
- Deliver advanced security services: Single sign-on, Cloud federation, Web application firewall, SSL inspection, DDoS protection, DNS, and more
- Leverage cloud gateway services as a central point of control between legacy data centers, colocation, and public, private, or hybrid cloud
- Avoid cloud provider lock-in through direct, private access to multiple public clouds
Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:
- Is there command and control activity?
- Did lateral movement occur?
- What other systems were accessed?
- Et cetera…
This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.
After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.
Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.
In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.
With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.