Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • The digital office webinar series - 5 steps to a balanced business comms diet
    The digital office webinar series - 5 steps to a balanced business comms diet
    Dr Nicola Millard, Principal innovation partner, BT Recorded: Jul 14 2020 24 mins
    Over the years, the boundaries of the 9 to 5 day have been gradually eroded. The problem now is not connection, it is disconnection! It’s this seemingly simple act of switching off that the ‘balanced communications diet for business’ aims to tackle. And like any good diet, the ‘Balanced communications diet for business’ has five steps. Learn how to be productive in a distracting world.
  • Why SASE is the Future of SD-WAN & Security
    Why SASE is the Future of SD-WAN & Security
    Eyal Webber-Zvik, Senior Director of Product Marketing and Business Development Live 35 mins
    Webinar Overview

    If you're like most IT leaders, you're probably looking to reduce your network costs. But before you get swept up in the cost savings promise of SD-WAN, be sure that SD-WAN can meet the broader needs of your company. Recent research on SD-WAN and SASE suggests that most enterprises focus too much on SD-WAN cost savings, undermining their long-term SD-WAN satisfaction.

    To learn more about what leading companies consider when assessing SD-WAN, watch our webinar, "Why SASE is the Future of SD-WAN & Security," as we hear from Eyal Webber-Zvik, Cato's Senior Director of Product Marketing and Business Development.

    Eyal participated in dozens of SD-WAN evaluations with companies around the globe. He'll share his insights into what these companies consider when they assess SD-WAN, as well as key findings from our recent 2020 Networking Survey. The study evaluates the impact digital transformation has on IT's network confidence with enterprises in the Asia-Pacific and worldwide.

    Join us and receive a copy of the survey report, and also learn:

    - What is SASE and how it differs from SD-WAN
    - Why and where SD-WAN fails as a long-term solution
    - The importance of understanding the broader requirements of digital transformation beyond WAN connectivity
  • Why Load balancing is a missed value add opportunity for MSPs
    Why Load balancing is a missed value add opportunity for MSPs
    Richard Tubb, IT Business Growth Expert & Tim Swainson, Cloud & Service Provider Sales Manager, Kemp Live 60 mins
    Ever wondered what exactly load balancing is and how offering clients a load balancing solution can help lower MSPs’ support costs and increase value add?

    In this interactive session, IT Business Growth Expert Richard Tubb will speak to Tim Swainson from Kemp Technologies about the benefits of load balancing, why customers are asking for load balancing solutions more than ever (hint -- everybody is now working remotely!) and why this technology is a real-world value add for next generation solution providers.

    MSPs who haven’t considered load balancing solutions for their business before will walk away from this session with a better understanding of why successful and profitable MSPs are offering Always-On Application Experience (AX) to customers today to differentiate themselves and to meet Service Level Agreements (SLAs) for uptime.

    In this session, we will cover the following:

    - Most relevant feature – functionalities of load balancing, including global server load balancing, reverse proxy, web application firewall etc.
    - Review of the most popular load balancer vendors, from open source technologies to expensive load balancers and guidelines on choosing the right solution
    - Use cases & licensing options that best meet MSPs needs
    - Checklist on how to get started
  • Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Steve Carter | Senior Product Marketing Manager, Nutanix Recorded: Jul 14 2020 45 mins
    Converged infrastructure is several steps up from legacy infrastructure, it loses out when it comes to the cost-saving, application-securing, VM-moving power of hyperconvergence.

    Join us for this webinar where Steve Carter, Senior Product Marketing – Nutanix, will take you through how you can simplify your IT infrastructure.

    In this webinar you will learn:
    • What are the primary benefits of HCI compared to Converged Infrastructure?
    • How WebScale IT infrastructure innovations make HCI possible
    • How HCI enables IT to be agile and cost conscious in the face of business uncertainty
  • Automate and accelerate AWS migrations with CloudChomp and N2WS [EMEA]
    Automate and accelerate AWS migrations with CloudChomp and N2WS [EMEA]
    Anthony Fiore - Solutions Architect (AWS), David Pulasky -CEO (CloudChomp), Sebastian Straub - Solutions Architect (N2WS) Recorded: Jul 14 2020 63 mins
    Ready to move to the cloud? Great! You’ll be in good company. But there’s a lot to think about. Preparing for a cloud migration is just as important as the migration itself. Once you’ve arrived you can look forward to higher productivity, reduced costs and improved resource utilization.

    Careful planning ensures you can meet migration goals, optimize your TCO and benefit from the many AWS services at your fingertips. So, where to start?

    Join the leadership team from AWS, cloud assessment specialists CloudChomp and data protection experts N2WS to learn:
    • How to analyze and prepare your on-prem environment for a successful migration (with you in the driving seat)
    • The essential steps you need to take to get your environment ‘cloud-ready’
    • How to protect your new AWS workloads, optimize storage and manage the data lifecycle
  • Duo Enrollment
    Duo Enrollment
    Pete Baker Recorded: Jul 14 2020 1 min
    Two-factor authentication adds a second layer of security to your logins. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.
  • F5 and Shape join forces to crush fraud and abuse, and defend your applications
    F5 and Shape join forces to crush fraud and abuse, and defend your applications
    Joel Moses, Office of the CTO, F5 Networks & Shuman Ghosemajumder, Global Head of AI, F5 Networks Recorded: Jul 14 2020 57 mins
    In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

    F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

    Watch this informative webinar on the future of application security to learn about:

    • Where are cybercriminals headed next in their attacks on applications
    • How to slash fraud losses, chargebacks, stolen loyalty points, and unauthorized fund transfers
    • How to prevent reputational damage and disruptions to critical online services
    • How your team can reduce appsec complexity and improve application performance
    • How to support real-world multi-cloud environments
  • Best practices for cybersecurity incident management and response
    Best practices for cybersecurity incident management and response
    Dan Saunders, Terrence Lillard Recorded: Jul 14 2020 60 mins
    The NTT Ltd. 2020 Global Threat Intelligence Report reminds us that the threat landscape is continuously changing. In such a dynamic environment, and with absolute security as an impossible goal, businesses must be ready for anything.

    Security Incident Management and Response Services are key to businesses being able to move from crises to continuity following the unexpected.

    In this webinar, our experts share the best practices for effective Incident Management and Response Planning, including:
    • Investigative forensics and root cause identification
    • Risk, vulnerability and weakness identification
    • Processes, tools and techniques for speedy and effective response
    • Detection and preventing reoccurrence
    • Limiting damage, reducing recovery time and minimizing the business impact

    Speakers:
    • Dan Saunders, Senior Digital Forensics and Incident Response Consultant, UK & I, NTT Ltd.
    • Terrence Lillard, Senior Digital Forensics and Incident Response Consultant, Americas, NTT Ltd.
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights
    Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights
    Rick Holland Recorded: Jul 14 2020 21 mins
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • How to Integrate Application Security in Your DevOps Environment
    How to Integrate Application Security in Your DevOps Environment
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks Recorded: Jul 14 2020 66 mins
    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks and keeping pace with the speed of DevOps. It is therefore essential that security is embedded into the entire software development lifecycle, with strong and consistent security controls applied no matter how or where the app is deployed.

    In this webinar, you’ll learn how to:

    • Defend web and mobile apps against a range of application attacks such as man-in-the-browser, denial of service, credential stuffing, and many more
    • Identify and stop malicious bots that help attackers automate their attacks
    • Help integrate security into application development CI/CD pipelines
  • ‘They Come in the Night’ Emerging Ransomware Threat Trends
    ‘They Come in the Night’ Emerging Ransomware Threat Trends
    Jens Monrad, Head of Mandiant Threat Intelligence EMEA & Jay Christiansen Senior Consultant, FireEye Mandiant Recorded: Jul 14 2020 62 mins
    Ransomware is remote digital extortion. Disruptive and costly to address, it affects all kinds of organizations, from space technology firms to global manufacturers and industrial environments.

    FireEye Threat Intelligence research has uncovered an increasing number of common characteristics in ransomware attacks, including new trends in intrusion vectors, dwell time, deployment time of day and the use of additional tactics to increase leverage against victims.

    Join Threat Intelligence expert, Jens Monrad and Mandiant Senior Consultant, Jay Christiansen, to learn about the latest research and ask them critical questions. During this presentation, attendees will hear about:

    • The latest ransomware threats
    • Threat actor tactics
    • Ways to use this intelligence to defend your organization

    Register for the webinar
  • Top Data Challenges Facing Financial Services in 2020 and How to Conquer Them
    Top Data Challenges Facing Financial Services in 2020 and How to Conquer Them
    Andrew Oliver - Director of Product Marketing / Product Evangelism Recorded: Jul 14 2020 25 mins
    Financial institutions are facing disruption from a growing field of challengers who are able to offer personalized products at lower costs and are empowered by their ability to access and harness new forms of data. In order to level the playing field, traditional financial institutions need to adapt new data models, such as non-relational databases, in order to gain flexibility, automation, speed, and the ability to innovate.

    Financial services companies can address their current technology challenges by using a full-stack NoSQL data platform to power the internet-scale experiences their customers expect. In this webinar, you’ll learn:

    How you can increase your ability to innovate and significantly cut costs by migrating from a legacy database to Couchbase’s NoSQL database
    Why top financial institutions like Citi, PayPal, and Wells Fargo run on Couchbase
    What financial solutions and applications you can build using a scalable, schemaless data model
  • VMware Cloud on AWS: A technical overview with popular use cases
    VMware Cloud on AWS: A technical overview with popular use cases
    Ather Beg (Solutions Architect at Rackspace) and Carmen Hostetler (Cloud Solutions Architect at VMware) Recorded: Jul 14 2020 52 mins
    We hope you enjoyed our last webinar on VMware Cloud™ on AWS by Rackspace CTO Lee James and VMware Leader Tim Hearn: Introduction to VMware Cloud on AWS. If you haven’t watched it already, you can find it here (52 min): https://www.brighttalk.com/webcast/11031/372224

    In this follow-up session, Join Ather Beg, Rackspace Enterprise Solutions Architect and Carmen Hostetler, VMware Cloud Solutions Architect in a discussion to learn about the technical steps to consider when implementing your first VMware Cloud on AWS deployment, to full application-level integration with AWS.

    Ather and Carmen will also talk through popular use cases that Rackspace see’s customers commonly asking for, along with a customer case study.

    This session will cover:

    oConsiderations before starting
    oTechnical steps and solution options
    oTips and gotchas!
    oExample use cases
  • OWASP Top 10: The Most Critical Risks Facing Web Applications
    OWASP Top 10: The Most Critical Risks Facing Web Applications
    David Warburton, Senior Threat Research Evangelist EMEA, F5 Networks Recorded: Jul 14 2020 65 mins
    Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar you'll learn:

    • How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against
    • Why OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve
    • What could change with the 2020 OWASP Top 10
  • Wie hat sich die IT-Sicherheits Roadmap für Unternehmen im Jahr 2020 verändert?
    Wie hat sich die IT-Sicherheits Roadmap für Unternehmen im Jahr 2020 verändert?
    Thomas Bier, Umbrella & Athena Brown, Duo Recorded: Jul 14 2020 41 mins
    Cisco Umbrella und Duo - Wie hat sich die IT-Sicherheits Roadmap für Unternehmen im Jahr 2020 verändert?

    In diesem Webinar lernen Sie:

    - Wie man Transparenz und Kontrolle über die Arbeitsumgebung bekommen kann und gleichzeitige eine mobilere Belegschaft ermöglicht
    - Warum die Cloud wichtig ist
    - Warum man eine MFA-Lösung in Betracht ziehen sollte

    Die Mehrheit der Unternehmen musste sich im Jahr 2020 mit mehr Veränderungen auseinandersetzen als in den Vorjahren. Nehmen Sie an unserem Gespräch mit TBC (Cisco DUO) und Thomas Bier (Cisco Umbrella) teil und an die Diskussion wie sich die IT-Sicherheits Roadmap für Unternehmen im Jahr 2020 geändert hat.

    Wir werden uns mit die Herausforderungen die wir in unserer Branche heute bewältigen müssen und was Unternehmen tun, um die Komplexität zu reduzieren, mehr Flexibilität zu bieten und eine konsequentere Durchsetzung zu erreichen, um sich an diese Änderungen anzupassen.

    Duo Security ist ein führende Anbieter von “Trusted Access” Sicherheit und Multi-Faktor Authentifizierung. Mit Duo Beyond, der “Zero Trust” Sicherheitsplattform von Duo, können Unternehmen vertrauenswürdigen Zugriff auf alle wichtigen Anwendungen gewähren - für jeden Benutzer, von überall und mit jedem Gerät.

    Cisco Umbrella ist eine Cloud Sicherheitsplattform, die die erste Verteidigungslinie gegen Bedrohungen im Internet bietet, wo immer Benutzer sind. Umbrella ist das am einfachsten zu implementierende Sicherheitsprodukt und bietet leistungsstarken, effektiven Schutz, da es in die Grundlage des Internets integriert und aus der Cloud bereitgestellt wird.
  • Verbessern Sie Ihre KPIs mit sauberen, vollständigen und konformen Daten
    Verbessern Sie Ihre KPIs mit sauberen, vollständigen und konformen Daten
    Armin Wallrab, Director PreSales Central Europe, Talend Recorded: Jul 14 2020 48 mins
    Gartner* zufolge kosten qualitativ schlechte Daten Unternehmen im Durchschnitt 11,8 Millionen USD pro Jahr. In diesem Webinar zeigen wir Ihnen, wie Sie mit sauberen, vollständigen und konformen Daten geschäftskritische KPIs erfüllen und übertreffen.
  • Nuix and MSAB Integration: Transferring Mobile Data Has Never Been Easier
    Nuix and MSAB Integration: Transferring Mobile Data Has Never Been Easier
    Kai Jessen, Andreas Kleinert (Nuix), Bayram Iriz, Niels Renken (MSAB) Recorded: Jul 14 2020 55 mins
    Nuix and MSAB, experts in mobile device forensic examination, are more closely integrated than ever, making it faster and easier for digital investigators to transfer mobile data from MSAB's XAMN product to Nuix for analysis.

    The session will be hosted by experts from both companies and will include a demonstration of the integration and show how using Nuix Workstation, investigators can search, filter, and analyze mobile data in conjunction with data from many other sources.

    The webinar will end with a Q & A session where you'll have the chance to speak directly to our expert panel and ask any questions you might have about the integration.

    NOTE: This session will be delivered in German.
  • Digitalisation of recruitment and onboarding - Digital Roundtable Series
    Digitalisation of recruitment and onboarding - Digital Roundtable Series
    Michaela Voller, Greg Kockott Recorded: Jul 14 2020 60 mins
    This event will serve as the first breakout session as part of the Digital Roundtable Series events and will center around discussing the topic of digitalisation of recruitment and onboarding in more detail. The session will also be used to showcase some of the technologies and platforms that we’ve been able to utilise to digitalise our own recruitment and onboarding processes.

    Presenters: Michaela Voller – Dimension Data, Greg Kockott – Hello Crowd
    Host: Danielle Barber – Dimension Data
  • Ensuring Network Visibility and Security During Unprecedented Times
    Ensuring Network Visibility and Security During Unprecedented Times
    Bill Coon, Riverbed + Frank Rubio, Gigamon Recorded: Jul 13 2020 33 mins
    Hear from Gigamon and Riverbed experts on how to provide critical visibility for securing the overwhelming demands of a large-scale remote workforce.

    You’ll learn:
    •How to successfully resolve remote access and VPN issues
    •How to secure your network from threats
    •Optimize bandwidth usage and performance

    Presented by:
    Frank Rubio, Strategic Alliances Director at Gigamon
    Bill Coon, Senior Technical Solutions Architect at Riverbed
  • A CFO’s Roadmap for Introducing New Technology to Streamline Financial Processes
    A CFO’s Roadmap for Introducing New Technology to Streamline Financial Processes
    Hamilton Beck, Solution Engineer - insightsoftware, Chris Misel, Director of Financial Business Intelligence - Alliance Data Recorded: Jul 13 2020 60 mins
    Watch our recorded Webinar “A CFO’s Roadmap for Introducing New Technology to Streamline Financial Processes,” where we provide a plan that finance leaders can adopt when they’re ready to explore new financial reporting processes. In addition, you’ll hear from the Director of Business Intelligence at Alliance Data, who will discuss how they went through the process of adopting new technology in order to streamline their financial processes, and how to:

    - Identify your company’s biggest issues with retrieving the proper data to signal how well your company is performing
    - Review the effects these issues have had in your company, and what your company plans to achieve by solving the issues at hand
    - Determine how new financial technology can make your processes more efficient and accurate
    - Create a successful business case for procuring new reporting software solutions
    - Develop a plan of change within your organization that is both collaborative and disciplined
    - Gain instant access when you submit your information in the form.
  • Best Practices that Protect Workstations From Attacks
    Best Practices that Protect Workstations From Attacks
    CyberArk Recorded: Jul 13 2020 40 mins
    Workstation targeted attacks revolve around privilege, whether they are Windows-based or MacOS. As attackers aim for a foothold in your organization, they look to steal credentials, manipulate applications, and move laterally across the network.

    In this session, we will focus on best practices for protecting your organization from these advanced attacks and showcase practical ways to implement the principal of least privilege across all of your Windows and Mac workstations.
  • Scaling the 3 Peaks of IaaS, PaaS & SaaS
    Scaling the 3 Peaks of IaaS, PaaS & SaaS
    Dimitris Finas, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, Sweagle Recorded: Jul 13 2020 29 mins
    Are you considering moving some of your infrastructure from on-prem to IaaS? Maybe you want to re-architect as a platform. Or even keep some things in-house and on-prem.

    Whatever your particular blend of cloud-based trail mix, you need to have a clear map to tackle your specific journey.

    That's why we've put together our Three Peaks Challenge to help you prepare to scale IaaS, PaaS & SaaS.

    Our Three Peaks Challenge covers:

    * Reviewing your legacy as code policy
    * Charting your legacy to cloud journey
    * Setting up a config base camp

    Are you ready to take on the challenge and scale one, two or all three of the Peaks? Join this webinar to understand the considerations you’ll need to factor into your preparations for IaaS, PaaS and SaaS.
  • Best of Both Worlds - The Power of Cloud for On-Premises Workloads
    Best of Both Worlds - The Power of Cloud for On-Premises Workloads
    Varun Verma, Database Solutions Architect - Nutanix | Chris Paap, Solution Marketing Manager - Nutanix Recorded: Jul 13 2020 51 mins
    Enterprises have become data-centered in order to gain a competitive edge and find alignment with their customers. This data focus has put an emphasis on data management, and with most enterprises having a highly varied database portfolio the complexity of managing database operations is continuously growing. Find out how Nutanix DBaaS provides the operational simplicity promised by the cloud in your data center and provides the best of both worlds.

    In this webinar, we will take a deep dive into how Nutanix DBaaS is simplifying and automating the time-consuming activity of database operations with automated provisioning and patching, where one-click simplicity allows you to clone/copy databases that are TBs in size in just a few minutes.
  • Protect against the Fundamental Nature of Ransomware
    Protect against the Fundamental Nature of Ransomware
    David Higgins, EMEA Technical Director at CyberArk Recorded: Jul 13 2020 58 mins
    The Endpoint is more exposed than it ever has been before. As remote working becomes the norm, these devices are now very much outside the perimeter of the office defences. Unfortunately, exploiting the current global crisis, we have seen an increased and focused effort in Ransomware attacks.

    In this session, we review some past approaches to stopping ransomware and the challenges associated with them. Then look at a more holistic approach to securing the endpoint; enforcing security best practices such as Least Privilege and Application Control, and how this can actually protect against the fundamental nature of Ransomware
  • Paving the Path to Passwordless
    Paving the Path to Passwordless
    Wolfgang Goerlich Recorded: Jul 13 2020 49 mins
    In this session, Duo Advisory CISO Wolfgang Goerlich presents "Paving the Path to Passwordless," in which he covers the problems of passwords; discusses alternatives, including biometrics and Duo Push; delves into increasing trust for authentication and optimizing the passwordless toolset; summarizes the five steps of moving to passwordless; and then explains how Duo is contributing to the passwordless ecosystem.

    Following Wolfgang’s presentation, he’s joined by Paul Fisher, Senior Analyst at KuppingerCole. The two discuss task-based authentication, privileged access management, the concern of lost 2FA-enabled devices, the new importance of identity, and finally, digital transformation and enabling the remote workforce.
  • Making MITRE ATT&CK Actionable
    Making MITRE ATT&CK Actionable
    Anthony Perridge, VP, International and Steve Rivers, Technical Director, International Jul 14 2020 3:00 pm UTC 25 mins
    The MITRE ATT&CK framework is becoming increasingly popular with many businesses and organizations. It provides a deeper insight into adversaries including the tactics, tools and techniques that they commonly use. Applying the MITRE ATT&CK framework effectively to your environment can be a challenge. In this webinar, we will show you how the ThreatQ platform makes it easier to apply the MITRE ATT&CK framework within your organization and more importantly, make it actionable.
  • DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ
    DEMO: A Window into Your Apps: Seeing and Solving Problems with BIG-IQ
    Zach Westall, Product Marketing Manager, BIG-IQ, F5 Jul 14 2020 3:00 pm UTC 15 mins
    This demo will take you through how BIG-IQ Centralized Management can help every user keep their finger on the pulse of their app services, inject automation and self-service into their workflows, and quickly and efficiently respond to problems when they occur.
  • IBM & PagerDuty: Driving Real-Time Operations Excellence
    IBM & PagerDuty: Driving Real-Time Operations Excellence
    Rachel Obstler, VP of Product PagerDuty; Kirk Pedersen, Senior IT Manager IBM Jul 14 2020 3:00 pm UTC 40 mins
    It’s not news that the world has gone digital, requiring you to interact with your customers 24×7.

    What may be news is that to be successful, you need to be able to operate in a truly real-time fashion, empowering the individuals and teams that own and operate digital services to better serve customers. The benefits of being effective at real-time work are tangible, with mature companies resolving incidents 2 hours faster on average than less mature peers.

    PagerDuty has been in the business of real-time work for almost a decade, and we’ve developed a maturity model that complements DevOps benchmarks and research such as the DORA State of DevOps report. The model uniquely focuses on real operational practices implemented by best-in-class organizations, including key criteria for success across the domains of culture, knowledge sharing, customer orientation, and technology.

    Join us to learn about the model and how it can be used to help organizations optimize their real-time operations. You’ll learn:

    - What excellence in real-time operations looks like
    - How to determine your team’s maturity in real-time operations work
    - How to implement best practices in incident response and other operations processes
    - What benefits you can expect to see as you grow in operational maturity, based on key findings from our survey of over 600 IT and development professionals
  • Performance vs. Pluggables. Making the Right Coherent Technology Choice.
    Performance vs. Pluggables. Making the Right Coherent Technology Choice.
    Robert Keys & Helen Xenos (Ciena) Jul 14 2020 3:00 pm UTC 60 mins
    Bandwidth demands continue to rise and coherent optics are playing an increasingly important and expanding role in scaling networks and controlling costs. With two distinct, viable technology options to choose from, providers are faced with the dilemma of making the right choice for evolving their networks:

    Do I select performance optics or coherent pluggables?
    Does the application dictate the right solution?
    What are the different factors to consider?
    What are the cost savings associated with better performance?

    Get answers to these questions, and more, in this educational session on architecture evolution that includes case studies performed on real customer networks.

    Speakers:
    Robert Keys, Senior Director, R&D Optical Transmission, Ciena
    Helen Xenos, Sr Director, Portfolio Marketing, Ciena
  • Four Steps to Ensure Software Delivery Success in Today's Environment
    Four Steps to Ensure Software Delivery Success in Today's Environment
    Julian Fish, Director, Product Management and Mark Levy, Director, Product Marketing, Micro Focus Jul 14 2020 3:00 pm UTC 60 mins
    Events and sudden market shifts can dramatically change the business outcomes for many companies. Today's environment is forcing a transition from the physical world to the digital and virtual world. Companies are accelerating their digital transformation initiatives in order to just survive, while IT organizations are being asked to do more with less. Knowing how to quickly, efficiently, and successfully release and deploy software is critical for the business to succeed.

    Come join us as Julian Fish and Mark Levy provide the four key steps you need to implement in order to successfully release and deploy software in today's environment. In this live webinar you will learn:

    • Why delivery velocity alone is not enough
    • Where cost savings can be made without impacting efficiency
    • What successful release governance means to your business – and the risks associated with poor governance
    • How to ensure deliverables are adding significant value to your customers and stakeholders
  • Nordea | How OCR and chatbots enhance the Digital Workforce
    Nordea | How OCR and chatbots enhance the Digital Workforce
    Agnieszka Belowska Goslawska – Head of Robotics, Nordea and Przemyslaw Jarosz – Head of Robotics IT, Nordea Jul 14 2020 3:00 pm UTC 60 mins
    Nordea, the biggest financial group in Northern Europe, has digital transformation and innovation at its core. With the goal to be an efficient, customer friendly bank that operates with great efficiency, connected-RPA has been a tool to realize this goal. Nordea has extended Intelligent Automation across a myriad of business functions globally and has been able to build robust organizational structure for introducing automations, and 175 Digital Workers in production now. Nordea were able to achieve their strong automation goals and adhere to quality and compliance requirements specific to the banking sector.

    Join the team from Nordea as they presents their journey in reaching successful adoption of Intelligent Automation. From OCR and chatbots the team has leveraged these technologies to solving business challenges across the group and driving business innovation.

    In this webinar, you will learn:

    1) How Nordea's processes developed from requirements gathering, to go live, to in production
    2) How Nordea is leveraging automation
    3) How AI such as OCR and chatbots has improved customer service
  • SAP on Azure Transformation: Embrace your journey to Cloud
    SAP on Azure Transformation: Embrace your journey to Cloud
    S Mahadevan, Practice Director, Wipro Limited | Tushar Gupta, Senior CSA – SAP on Azure, Microsoft Jul 14 2020 3:00 pm UTC 60 mins
    Enterprise customers are going through a myriad of issues to stay competitive in a fairly uncertain business environment. The need of the hour for most of these enterprises is to build and operate a scalable, flexible, pay-as-you-go and end-to-end managed platform to host applications. A successful migration to the cloud not only helps organizations reap the benefits of scalability and lower TCO but also enables them to build a digital-ready platform for future innovations leveraging AI/ ML /Blockchain. The webinar will help you get answers from Wipro & Microsoft experts as they elucidate on important business and technical considerations for a seamless cloud migration for various industries.
  • New types of High Density and Dust Insensitive fiber optic connectors
    New types of High Density and Dust Insensitive fiber optic connectors
    Sean Kelly, Rosenberger NA Jul 14 2020 3:00 pm UTC 75 mins
    This webinar will address the new and emerging fiber optic connectivity trends and footprints coming onto the market this year. Aside from general enhancements and vendor unique features, our industry has not seen a new connector footprint in the past 20 years. This year is providing us with not only one new technology or connector footprint, but multiple innovations that increase density, streamline topologies, and simplify installation and maintenance. Join us for this look at the evolution of fiber connectivity and the new and emerging connectivity trends coming to your next project.

    Attendees will earn 1 BICSI CEC
  • Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights
    Podcast: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights
    Rick Holland Jul 14 2020 4:00 pm UTC 21 mins
    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover:
    - Torigon - What was Torigon and how did it fail to survive?
    - Nulledflix - The Nulled-focused streaming service taken down immediately for maintenance
    - BlueLeaks exposing private law enforcement files
    - DevSecOps and how it can be useful to your organization
  • Full Enterprise Visibility In an EDR World
    Full Enterprise Visibility In an EDR World
    Warwick Webb, Director of Detection and Response Services, Rapid7 Jul 14 2020 4:00 pm UTC 60 mins
    In this webinar, we’ll talk about a balanced approach to detection & response that leverages endpoint, network, user, and cloud service visibility to effectively detect & respond to the full range of threats facing enterprises today. We’ll do this through deep dives into 2 different real-world attacks detected and investigated by Rapid7's MDR team.

    Rapid7's Director of Detection and Response Services, Warwick Webb will discuss how logging and monitoring from the endpoint to the cloud helped the Rapid7 MDR team effectively identify these incidents, accurately assess scope and impact, and guide effective containment and eradication actions to eliminate the threat.

    Both attacks are valuable to learn about because:

    1) everyone is a target for ransomware
    2) webshells are multi-purpose and can be difficult to detect.

    Join us for this informative session.
  • How 360 Degree Data Integration Enables the Customer-centric Business
    How 360 Degree Data Integration Enables the Customer-centric Business
    Adnan Sami Khan, Manager of Marketing Communications | Jay Mishra, Chief Operating Officer Jul 14 2020 5:00 pm UTC 75 mins
    Adopting a customer-centric stance for your business is only possible when you have access to the tools required to get a holistic view of your customers. Unfortunately, most customer data today is fragmented and siloed in databases, operational data marts, and legacy systems, which needs to be pieced together for a unified customer view.

    Enter 360-degree data integration. It allows you to use complete, trusted data for accurate forecasting, reporting, and compliance, and develop data-driven strategies to rapidly react to changing market dynamics. With a 360-degree customer view, you will get a better understanding of where your business stands with its customers and how you can improve retention rates.

    In this live webinar, we’ll cover:

    • An end-to-end use case showing how an insurance provider can deploy 360-degree data integration to create a customer-centric business
    • How a holistic view of customer data can improve customer retention and loyalty
    • How 360-degree data integration helps you identify quality leads and improve sales efficiency
    • How Astera Centerprise automates collecting and consolidating business data without the need for dedicated technical resources

    Reserve your spot today to watch our solution experts demonstrate how you can automate 360-degree customer data integration and formulate a comprehensive business framework for lasting ROI.
  • AppSec: Pushing Left, Like A Boss
    AppSec: Pushing Left, Like A Boss
    Tanya Janca, Security Trainer and Coach SheHacksPurple.dev Jul 14 2020 5:00 pm UTC 58 mins
    With incident response and penetration testing currently receiving most of our application security dollars, it would appear that industry has decided to treat the symptom instead of the disease.

    “Pushing left” refers to starting security earlier in the SDLC; addressing the problem throughout the process.

    From scanning your code with a vulnerability scanner to red team exercises, developer education programs and bug bounties, this talk will show you how to ‘push left', like a boss.
  • Maximizing the Impact of Static Analysis
    Maximizing the Impact of Static Analysis
    Meera Rao, Senior Director – Product Management (DevOps Solutions) Jul 14 2020 5:00 pm UTC 60 mins
    Static analysis, also known as white box testing, static application security testing (SAST), or secure code review, finds bugs in application code, back doors, and other code-based vulnerabilities so you can mitigate those risks. But no static analysis tool can effectively address threats to a development environment out of the box. And many users have the misconception that the cost of tool adoption depends primarily on getting the tool working in a build environment.

    Static analysis is the only way to enable developers to automatically identify vulnerabilities as they write code in their integrated development environment (IDE). With SAST, developers can:
    •Run scans in their IDE by using plugins that provide just-in-time security guidance.
    •Review source code before checking it into a version control repository.
    •Remediate identified vulnerabilities.
    •Adopt a preventative mindset.

    Automation is an important part of adopting a SAST tool, as it drives efficiency, consistency, and early detection, enabling organizations to shift left. For a static analysis implementation to be effective, several distinct activities must come together to establish and maximize its impact. This webinar covers some challenges of SAST implementation and provides real solutions to get the most value out of SAST tools.
  • BI leverage at Cloud Scale in Record Time with Smart Database Management
    BI leverage at Cloud Scale in Record Time with Smart Database Management
    Ben White, Domo Sr. Database Engineer and Paige Roberts, Vertica Product Marketing Jul 14 2020 5:00 pm UTC 60 mins
    The complexities of cloud-based data at scale led Domo to use Vertica both to help power their flagship product and to glean metadata to tune and optimize their ecosystem. Their internal system, called “Domo4Domo,” uses a rules-based AI engine, with elements of machine learning, to identify and eliminate conditions that cause poor performance. By achieving close to 100% uptime with this system, the team can confidently deliver on query performance SLAs, as well as adjust capacity, when needed, without increasing management costs. Join Domo Senior Database Engineer Ben White, who will discuss how analytics enables organizations to go bold, go big and go fast and how that, against the backdrop of Covid-19, is more important now, than ever before.
  • Jump-start your network automation, featuring Forrester Research
    Jump-start your network automation, featuring Forrester Research
    Chris Gardner, Principal Analyst at Forrester Research & Pete Lumbis, Director of Technical Marketing & Docs at NVIDIA Jul 14 2020 5:00 pm UTC 44 mins
    Join guest Chris Gardner for thought leadership on modern network automation projects, and Pete Lumbis for a live plug-and-play, open source, end-to-end automated configuration demo.
  • Manage Your Business Operations Without An Ops Team Using Kintone
    Manage Your Business Operations Without An Ops Team Using Kintone
    Isabel D'Andrea, Sales Consultant, Kintone & Michael O'Connor, Sales Consultant, Kintone. Jul 14 2020 6:00 pm UTC 45 mins
    If you’re a small business owner, odds are you’re either running operations yourself or dividing it across your team. If you’re an employee, you’re probably used to managing your own ops on top of your other tasks (the ones you were actually hired to do).

    Either way, the business side of business has to get done. But it’s not always easy.

    Hear how seasoned Sales Consultants Michael O’Connor and Isabel D’Andrea use Kintone to keep their operations effective--and to a time minimum--so they can stay focused on what they do best: selling.

    They’ll cover how Kintone handles:

    Data Management: Mike and Isabel will show how to organize and categorize every kind of data in Kintone for instant recall—meaning no more hours wasted searching for information.

    Team Collaboration: learn how Kintone’s chat tools allow employees to talk with their team and other departments in a way that promotes accountability, results, and less reliance on email.

    Shifting Priorities: what you need from your software today might change tomorrow, and you need applications that can keep up. With Kintone’s business app-building tools, it’s possible to have processes that move just as fast as you.
  • Illuminating the Impact of Microservices and API Management
    Illuminating the Impact of Microservices and API Management
    Liam Crilly, Director Product Management, NGNIX Jul 14 2020 6:00 pm UTC 24 mins
    Microservices have a profound effect on the way applications are developed, deployed, and updated. With APIs at the heart of a microservices architecture, we explore the technical and procedural challenges, and how they put pressure on conventional API gateway and API management solutions.

    This session will also provide an overview of NGINX API architecture and deployment patterns and how they can be optimized for microservices.

    Register Today
  • How IT Infrastructure is Evolving the Meet the Needs of Edge Computing
    How IT Infrastructure is Evolving the Meet the Needs of Edge Computing
    Craig Theriac, Director of Product Management, Scale Computing Jul 14 2020 6:00 pm UTC 60 mins
    The needs for Edge Computing are growing at a fast pace to support the digital technologies that exist outside of the data center. From retail stores to manufacturing sites to ships at sea, there is more need for onsite digital services than ever before.

    Join Craig Theriac, Director of Product Management at Scale Computing to discuss how IT infrastructure is evolving to meet the needs of edge computing. In this webinar you will learn:

    • How smaller computing devices can be better suited both environmentally and financially for edge computing

    • How ease of deployment, ease of management, and ease of maintenance are key to controlling edge computing costs

    • How centralized management is essential to keeping a fleet of edge computing infrastructure devices running and secure
  • Accelerate Your Enterprise AI on Snowflake with H2O.ai
    Accelerate Your Enterprise AI on Snowflake with H2O.ai
    Yves Laurent, H2O.ai, Eric Gudgion, H2O.ai, Chris Pouliot, Snowflake and Isaac Kunen, Snowflake Jul 14 2020 6:00 pm UTC 60 mins
    Organizations are looking to accelerate the adoption of machine learning (ML) by quickly and easily building and deploying models into production. The ML pipeline however can be complex and fraught with many barriers for businesses to take advantage of predictive capabilities. A new approach is needed to bring ML technology to the environment where users are most comfortable working with their data. That’s why Snowflake and H2O.ai provide users with a seamless experience for building and deploying ML models that can be used for scoring data and predictive insights.

    This webinar will cover how the Snowflake cloud data platform can be extended with H2O Driverless AI from within the customer’s Snowflake account. By using SQL commands in Snowflake, users can build and deploy models as a REST service to be used for scoring data and making predictions.

    What you will learn:
    - How Snowflake external functions are used with Driverless AI
    - How you can build and deploy models from within Snowflake
    - How to make predictions on data from your Snowflake account
    - How to integrate predictions in your business applications

    Presenters:
    - Yves Laurent, Dir. Partnerships and Alliances, H2O.ai
    - Eric Gudgion, Sr. Solutions Architect, H2O.ai
    - Chris Pouliot, VP Data Science & Analytics, Snowflake
    - Isaac Kunen, Sr. Product Manager, Snowflake
  • Advanced Integrations for Ansible - ServiceNow
    Advanced Integrations for Ansible - ServiceNow
    Brad Scalio, Solutions Architect, Red Hat Jul 14 2020 6:00 pm UTC 60 mins
    While incident management systems of record are a part of ITIL and Help Desk life, it's not a particularly enjoyable part. The ticket creation and follow-up for a system reboot or routine configuration change often takes up more time than physically logging into the device and performing the actions let alone running a script where it's fully automated. When routine actions turn into complex ones requiring change requests and approvals, the time spent waiting for the process to complete can add risk that automation was meant to solve.

    In this first part of a series on Advanced Integrations for Ansible you will learn how to integrate the components of Red Hat Ansible Automation Platform with ServiceNow to:
    Generate a routine incident record
    Integrate into approval process flows for non-routine change requests
    Create a closed-loop System of Record for self-healing applications
    Integrate and extend into ChatOps for self-service IT
    Provide multiple pathways to consume IT services utilizing the same automation scripts
    And hopefully make process enjoyable again, if it ever was.
  • Privileged Access Management Fundamentals: Secure Your Success
    Privileged Access Management Fundamentals: Secure Your Success
    Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success Jul 14 2020 6:00 pm UTC 60 mins
    In times of crisis, the success of your business depends considerably on operational resilience. So, it is not surprising that cyber security - a key component of such resilience - comes under the spotlight.
    Privileged access represents one of the largest security vulnerabilities you may face today and could certainly become that weak link that cyber attackers are after. Ultimately, most high-profile security breaches start with a stolen privileged credential.
    This webinar will show you how to improve your operational resilience and cyber security posture by focusing where it matters most – securing privileged access. Our presenters will discuss how privileged access can be secured in a convenient, as-as-service way that matches today’s digital reality and business environment.
    Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization?
    These and other important privileged access management questions will be answered during our live webinar featuring CyberArk’s security experts:
    • Nir Gertner, Chief Security Strategist @CyberArk
    • Noam Liran, Director of Customer Success @CyberArk

    You will learn:
    • What privileged access is – where it exists across the organization and why it is under attack;
    • The anatomy of most common attacks on privileged access – existing and evolving attack vectors, privilege escalation, lateral and vertical movement;
    • Top Privileged Access Management use cases;
    • How to get started with a PAM program – key steps and best practices
    • How to deploy a PAM system in a remote environment
  • Automate and accelerate AWS migrations with CloudChomp and N2WS [AMS]
    Automate and accelerate AWS migrations with CloudChomp and N2WS [AMS]
    Anthony Fiore - Solutions Architect (AWS), David Pulasky -CEO (CloudChomp), Sebastian Straub - Solutions Architect (N2WS) Jul 14 2020 6:00 pm UTC 60 mins
    Ready to move to the cloud? Great! You’ll be in good company. But there’s a lot to think about. Preparing for a cloud migration is just as important as the migration itself. Once you’ve arrived you can look forward to higher productivity, reduced costs and improved resource utilization.

    Careful planning ensures you can meet migration goals, optimize your TCO and benefit from the many AWS services at your fingertips. So, where to start?

    Join the leadership team from AWS, cloud assessment specialists CloudChomp and data protection experts N2WS to learn:

    • How to analyze and prepare your on-prem environment for a successful migration (with you in the driving seat)
    • The essential steps you need to take to get your environment ‘cloud-ready’
    • How to protect your new AWS workloads, optimize storage and manage the data lifecycle
  • Secure Your Remote Workforce - A DigiCert Webinar
    Secure Your Remote Workforce - A DigiCert Webinar
    Brian Trzupek, VP of Emerging Markets Product Jul 15 2020 6:30 am UTC 60 mins
    Like many of the world’s companies, DigiCert had to rapidly move its entire workforce to a remote setup as Covid-19 began impacting the cities where its team members lived and worked. And, like many of the world’s companies, the DigiCert IT team encountered challenges that required quick solutions.  

    Now, two of DigiCert's top security experts share thoughts, insights, and solutions for overcoming these challenges. Speakers include: Jason Sabin, CTO, and Brian Trzupek, VP of Emerging Markets Product.

    In this 60-minute webinar, Jason and Brian will discuss: 

    - Authenticating employees to corporate services 
    - Sending signed and encrypted emails 
    - Securely signing important business documents 

    In addition, they’ll draw on more than five decades’ combined experience in PKI to talk about easing the challenges of remote work by protecting your company assets and users with strong security solutions.
  • Преимущества использования решений Pure для Citrix Virtual Apps & Desktops
    Преимущества использования решений Pure для Citrix Virtual Apps & Desktops
    Alexey Averin, SE Team Lead, Pure Storage Jul 15 2020 8:00 am UTC 60 mins
    Citrix и Pure Storage помогают клиентам увеличить производительность VDI инфраструктуры, одновременно устраняя узкие места, снижая сложность и стоимость владения. Совместно разработанная Citrix Ready архитектура обеспечивает низкое время отклика и прозрачное масштабирование среды VDI.
  • Secure Automotive Software Development in the Age of ISO/SAE 21434
    Secure Automotive Software Development in the Age of ISO/SAE 21434
    Dr. Dennis Kengo Oka, Principal Automotive Security Strategist, Synopsys Jul 15 2020 8:30 am UTC 72 mins
    Modern vehicles run on software containing more than 150 million lines of code. As a result of more advanced safety-relevant functionality, such as ADAS and autonomous driving, as well as new communication interfaces, mobile apps, and back-end servers based on connected car use cases, the need for developing secure systems in the automotive industry is higher than ever. A draft of the new cyber security standard ISO/SAE 21434 was recently released to help automotive companies address cyber security for the entire vehicle life cycle.

    This talk presents cyber security activities in the software development process based on ISO/SAE 21434 to help automotive companies develop more secure systems. We’ll provide examples of what is required from a resources and tools perspective to ensure an efficient and practical implementation of the various cyber security steps in the development process.