Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Microservices, Containers, APIs and Integration Day with Red Hat
    Microservices, Containers, APIs and Integration Day with Red Hat Red Hat Recorded: Jul 20 2018 3 mins
    Watch a preview of what to expect at Red Hat's "Transform your Enterprise IT with Microservices, Containers, APIs, and Integration Day" event.
  • [GERMAN] DSGVO - sind Sie bereit?
    [GERMAN] DSGVO - sind Sie bereit? Per Stritich, RVP bei Box Hendrik A. Reese, Senior Manager bei Pricewaterhouse Coopers Recorded: Jul 20 2018 16 mins
    Der Moderator Detlef Korus diskutiert mit Box und PriceWaterhouseCoopers zum Thema DSGVO und Strategien zu deren Umsetzung.
  • I tuoi dati su Office 365 sono protetti?
    I tuoi dati su Office 365 sono protetti? Tristano Ermini, Systems Engineer Recorded: Jul 20 2018 41 mins
    Applicazioni SaaS come Microsoft® Office 365® sono molto apprezzate e sempre più diffuse nelle aziende, ma lo stesso può dirsi delle minacce che si nascondono in queste offerte:

    • Esposizione accidentale dei dati con SharePoint®
    • Uso non controllato di account personali di OneDrive®
    • Violazioni alla sicurezza dei dati in Exchange

    Sì, anche applicazioni SaaS affidabili come Office 365 possono far crescere il rischio di violazioni e problemi di conformità.

    La nostra Security Operating Platform può offrirti supporto. Registrati al webinar e scopri come soddisfare le tue esigenze CASB e proteggere i dati sul cloud da malware ed esposizione accidentale.

    Scopri anche come ottenere visibilità completa e reporting, classificazione dei dati e controllo granulare delle attività per utente, cartella e file, per una protezione efficace dei dati business-critical su Office 365.
  • [GERMAN] Wird AI auch das Content Management revolutionieren?
    [GERMAN] Wird AI auch das Content Management revolutionieren? Edwin Klimkeit, Large Enterprise Account Executive bei Box Recorded: Jul 20 2018 15 mins
    Alle sprechen über AI, aber wo und wie kann AI schon heute eingesetzt werden? In dieser Präsentation wird AI auch im Kontext von intelligentem Content Management beleuchtet.
  • Sysdig & SANS Institute: Forensics and Incident Response in Containers
    Sysdig & SANS Institute: Forensics and Incident Response in Containers Knox Anderson, Sysdig and Jake Williams, SANS Analyst Recorded: Jul 20 2018 61 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Digital Transformation – North American Utility & Power Trends
    Digital Transformation – North American Utility & Power Trends John Villali, Research Director, IDC Energy Insights Recorded: Jul 19 2018 17 mins
    Today's power markets in North America are facing changes and challenges which are driving investment and activity in the industry's digital transformation efforts. This webinar will give an overview of the major drivers, trends and activities where technology investments are being made as the utility and power sector takes on digital transformation.
  • Kubernetes is the Platform. Now what?
    Kubernetes is the Platform. Now what? Brian Gracely, Director of Product Strategy, Red Hat Recorded: Jul 19 2018 63 mins
    In 2017, the industry standardized on Kubernetes on the defacto container scheduler. So what does Kubernetes deliver, and how much more is needed to operate and maintain a container application platform? Learn from Red Hat’s leadership in the Kubernetes community, and many years of OpenShift customer deployments, how to enable an application platform that is built to optimize developer productivity, security and multi-cloud deployments.
  • Modernizing SAP with scriptless testing
    Modernizing SAP with scriptless testing Thomas Koeppner, Micro Focus Recorded: Jul 19 2018 49 mins
    SAP modernization presents a combination of business challenges and technical challenges, both of which must be overcome in order to achieve a successful transformation. For best results, the business experts and the technical experts must work together on the transformation, and in particular, when testing updates to the SAP system. Scriptless testing is the most effective way to bridge the gap between those with an intimate understanding of the business processes, and those more at home with the technical details of SAP.

    This webinar will explore some of the challenges of testing SAP systems, and explain how scriptless test automation, using Micro Focus Business Process Testing (BPT), allows business users to define the processes, flows and data to be tested, while automation engineers implement the automated components that form each test’s building blocks.

    Takeaways
    • Understand the challenges of testing of critical systems such as SAP
    • Discover how scriptless testing can bring technical and business experts together to create effective automated tests
    • Understand how the components underlying scriptless test can be reused across different tests, and maintained with ease
  • 3 Challenges of Distributed Agile Retrospectives & How to Solve Them
    3 Challenges of Distributed Agile Retrospectives & How to Solve Them Michael Ball-Marian, Agile Expert at CA Technologies Recorded: Jul 19 2018 58 mins
    Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.

    Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.

    Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
  • The Value of Blockchain in Media & Entertainment
    The Value of Blockchain in Media & Entertainment Erik Weaver, Global Director Media & Entertainment, Western Digital ; Steve Wong, Dir. Business Development, DXC Technology Recorded: Jul 19 2018 32 mins
    Hollywood business models are built on a centralized trust where most intellectual properties flow through the control of a few studios. This impacts content creators who do not know what, when, and how their content is consumed. Imagine the impact if all stakeholders had visibility and access to the same facts – Guilds, Unions, Studios, Record Labels, Publishers, Distributors, and Viewers.

    Blockchain technology offers this opportunity. In this webinar Erik Weaver speaks with Steve Wong about what blockchain is, and how it can impact Hollywood - enabling accountability in pre-production, production, post-production, distribution, and consumption.
  • The Public Sector Guide to FISMA Accreditation
    The Public Sector Guide to FISMA Accreditation Jeff Valentine, Chief Product Officer, CloudCheckr, and Matt Jordan, VP Corporate Development, JHC Technology Recorded: Jul 19 2018 47 mins
    FISMA is the all-embracing legislative framework for protecting the security, integrity, and availability of federal information and information systems. To meet FISMA compliance requirements, governmental agencies and private contractors that handle federal data must maintain full visibility over their information system inventory.

    Attendees will learn:
    - How to leverage existing documentation
    - Shared responsibility
    - Gaining an ATO without FedRAMP assessed infrastructure
  • Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift
    Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift Tsvi Korren - Chief Solutions Architect at Aqua Security Recorded: Jul 19 2018 48 mins
    One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do.

    With immutability, every attempt to change the runtime environment is interpreted as an anomaly. And, thanks to containers’ simplicity, it is easier to predict their behavior in the application context and create a tight security envelope, allowing them to perform only their required function and preventing behaviors outside that scope.

    In this webinar, Tsvi Korren, Chief Solutions Architect at Aqua Security, will explain and demonstrate how an approach that enforces immutability and least privilege can secure applications in an active container environment.
  • Solving the Jevons Paradox of Performance with Lenovo and Intel Optane
    Solving the Jevons Paradox of Performance with Lenovo and Intel Optane Tony Harvey, Sr. Product Mgr, Lenovo; Vivek Sarathy, Enterprise Architect, Intel; Ori Broit, Sr. Product Mktg Mgr, VMware Recorded: Jul 19 2018 51 mins
    Jevons paradox states that when a resource is used more efficiently, the consumption of that resource actually rises due to the lower prices and/or increased availability of the product. Nowhere in the data center is that more true than when you look at server performance. Storage has always been a bottleneck in compute systems because of the vast performance difference between the storage subsystem and CPU and memory. Together Lenovo, Intel and VMware address the bottleneck of storage performance in Hyperconverged systems with the introduction of Intel Optane technology to Lenovo vSAN ReadyNodes. Join us to hear how these new ReadyNodes from Lenovo will help you to increase the performance of your applications, increase VM density and still improve end-user response times.
  • HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper
    HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper Paul Speciale, CPO, Scality; Stephen Bacon, Director Scale-Out Storage, HPE; Special Guest: Amita Potnis, IDC Recorded: Jul 19 2018 48 mins
    Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 37 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Implementing next-gen PON technologies over existing fiber infrastructure
    Implementing next-gen PON technologies over existing fiber infrastructure Steven Van Den Bergh, Nokia and Guillaume Lavallee, EXFO Recorded: Jul 19 2018 76 mins
    This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
  • Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security
    Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security From CA Technologies: Sanjay Tailor, Mehdi Medjaoui, Robert Lindberg, David Chui Recorded: Jul 19 2018 61 mins
    Whether driven by PSD2 compliance, market demand for mobile apps, or fintech competition, open banking is becoming a top priority for financial businesses. Through exclusive research and customer successes, we determined that building a modern application architecture with APIs, microservices and strong authentication is a key success factor in this space. In fact, our latest report shows that fully digital banks enjoy an estimated 25% cost-to-income ratio, versus 60% for traditional institutions.

    For this webcast, we assembled a panel that includes Mehdi Medjaoui, author of Banking APIs: State of the Market, along with experts in API and security capabilities, to introduce the elements of modern application architecture that all digital banking business leaders should know about – API management, microservices, strong authentication and risk-based security. You’ll learn about:

    * The current state of open banking, and what your peers are doing

    * How to invest in modern application architecture to improve your open banking projects

    * How to align better with IT to accelerate your time-to-market

    All registrants will also benefit from a complimentary copy of our Banking APIs: State of the Market report.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start Robbie Carroll, Account Manager, AWS Recorded: Jul 19 2018 42 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Jul 18 2018 40 mins
    Part 1 - Securing the Boot Process

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Serverless Language Translation On-the-Fly with Microsoft Translator
    Serverless Language Translation On-the-Fly with Microsoft Translator Johnathan Flowers Recorded: Jul 18 2018 22 mins
    Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.

    With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.

    In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Jakarta EE: What does it mean for the future of Java?
    Jakarta EE: What does it mean for the future of Java? Dr. Mark Little, Vice President Engineering, Red Hat Recorded: Jul 18 2018 34 mins
    In case you missed it, Java EE was given a new home at the Eclipse Foundation and on 26th February Jakarta EE was chosen as the new name for Java™ EE. Join this session to gain an understanding where Jakarta EE is heading and how customers and communities can help drive the future of enterprise Java.

    Java EE has been the dominant enterprise Java standard for well over a decade. However, in recent years there has been confusion and concern around its future promoting new efforts such as Eclipse MicroProfile to take just enough Java EE into the world of cloud and microservices. But all of that changed in 2017 when Oracle announced that, working with Red Hat and IBM, they were donating all of Java EE to the Eclipse Foundation and to be rebranded as Jakarta EE. What does this mean for the future of enterprise Java and traditional Java application servers?

    Dr. Mark Little, vice president, Enjgineering, Red Hat
    Mark Little leads the technical direction, research, and development for Red Hat® JBoss® Middleware. Prior to 2008, Mark served as the SOA technical development manager and director of standards. Additionally, he was a chief architect and co-founder at Arjuna Technologies, a spin-off from HP, where he was distinguished engineer. Mark has worked in the area of reliable distributed systems for more than 30 years.

    https://twitter.com/nmcl
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start AWS Recorded: Jul 18 2018 25 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story
    Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story Todd Bernhard, CloudCheckr Product Specialist, Ian Thorton-Trump, Cybersecurity Expert, Laurent Mombel, N2WS System Engineer Recorded: Jul 18 2018 57 mins
    Abracadabra AWS! Presto change Cloud!

    Magic words alone are not enough to deliver the return on investment and cyber security out of your AWS cloud. Join N2WS for a great Webinar Magic Show. We will dispel your business’s fears of cloud migration, demystify cloud compliance and escape from the dunk tank of complexity – especially when it comes to managing backup and ensuring uptime.

    Hosted by cybersecurity expert Ian Thornton-Trump, N2WS System Engineer, Laurent Mombel, and CloudCheckr Product Specialist Todd Bernhard, we will spend an hour brewing up a cauldron of information for you - using the recipe for AWS success:

    - Rapid Recovery
    - Flexible Backup
    - Shrink Downtime
    - Why hybrid is dangerous
    - Benefits for small, medium and large companies
    - Maintain Compliance
    - Ease Auditing

    Alakazam! See you there!
  • Protecting and enabling 21st century industrial networks at scale
    Protecting and enabling 21st century industrial networks at scale Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks Recorded: Jul 18 2018 62 mins
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • Your Office 365 data & apps secured
    Your Office 365 data & apps secured Jason Montgomery, SaaS Security Expert Jul 24 2018 8:30 am UTC 60 mins
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • How to Deploy Your Service Desk Your Way - Seamlessly, Flexibly and Quickly
    How to Deploy Your Service Desk Your Way - Seamlessly, Flexibly and Quickly Nev Ward and Noel Hopkinson, Senior Solutions Architects Jul 24 2018 10:00 am UTC 60 mins
    While ITSM is often delivered via software as a service (SaaS), businesses today are looking for different deployment options. The world is in flux, and strategies evolve. Businesses using SaaS today may need to migrate to a private cloud in the future. Similarly, some companies have strict security and compliance policies around data sovereignty, making on-premises deployment mandatory. That’s why it’s important to factor deployment flexibility into your evaluation of modern ITSM solutions.

    This webinar will cover:
    1.How Flexible Container Technology provides Portability, Faster Time to Value, and Lower TCO
    2.How seamless upgrades can be achieved in conjunction with Codeless Configuration
    3.How you can now consume new and innovative capabilities with equal speed, whether the solution is on premise, in a SaaS model, or in the public cloud.
  • Applying AI to Unstructured Content
    Applying AI to Unstructured Content Anthony Tate, Head of Product Marketing EMEA Box & Mike Schwartz, Senior Product Marketing Manager, Box Jul 24 2018 2:30 pm UTC 60 mins
    AI and machine learning technologies are rapidly maturing and becoming more enterprise ready — but 83% of organisations don't yet know how to leverage AI/ML in their business.

    Join us to learn how the new Box Skills makes all your business-critical unstructured content easier to find, organise, manage and protect by automating mundane processes to get to your most impactful work faster.

    During this live webinar you'll learn how you can:
    - Use Box Skills to manage and tap the potential inside unstructured content like videos, photos, audio and more
    - Reap the value from your unstructured content — without recruiting a team of data scientists to build AI/ML from scratch
    - Apply ML to your content to increase employee productivity, improve customer experience, accelerate or automate business processes, and mitigate risks
  • Containers, Cloud Computing & Continuous Delivery
    Containers, Cloud Computing & Continuous Delivery Scott Willson, Product Marketing Director - Release Automation at CA Technologies Jul 24 2018 3:00 pm UTC 60 mins
    Today, everyone is talking about containers. Like the transformations caused by virtual machines at the turn of the century, containers are changing the way we architect and deploy applications. Kubernetes, for example, is quite popular for managing container clusters, and the Docker file has become the PDF equivalent of application infrastructures. To effectively use containers, it's important to understand the different types that are available and the benefits (and challenges) they bring.

    In this webinar, we will discuss:
    - Current container trends
    - Types of containers on the market
    - The impact containers have on cloud computing
    - Continuous delivery best practices
  • Five Key Cloud Migration Success Factors
    Five Key Cloud Migration Success Factors Justin Vaughan-Brown, Director, Technology Strategy, AppDynamics Jul 24 2018 4:00 pm UTC 30 mins
    The more you understand the numerous cloud migration considerations, the more likely your enterprise will take advantage of its scalability, agility, and cost reduction benefits.

    Register for this 30-minute webinar to learn how to minimize the risks and set yourself up for success.

    You’ll also learn:

    - Which applications to migrate first
    - How to monitor and minimize the impact on users before, during, and after
    - What training your IT staff needs to effectively build and operate cloud environments
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Jul 24 2018 5:00 pm UTC 30 mins
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • 10 Questions on ServiceNow with Acorio Experts
    10 Questions on ServiceNow with Acorio Experts Ajay Gautam, Damian Broccoli, Jared Romaine, Juliet Acuff, Meghan Lockwood, Ryan Dinwiddie, Sean Duhaime Jul 24 2018 5:00 pm UTC 60 mins
    This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
  • Powering Healthcare Transformation with Search & AI-Driven Analytics
    Powering Healthcare Transformation with Search & AI-Driven Analytics Sean Zinsmeister, Head of Product Marketing & Angela Hooper, Senior Systems Engineer, ThoughtSpot Jul 24 2018 5:00 pm UTC 60 mins
    On a daily basis the healthcare industry generates troves of data including everything from insurance claims, hospital operations, electronic medical records to even patient sentiment. Within this data lies answers to crucial questions that can improve financial performance, operational management, and most importantly, patient outcomes.

    Yet for most professionals within the industry, it’s a daily struggle to get access to the information they need fast enough to make a difference. Static reports with stale data aren’t sufficient for making data-driven decisions, especially when they affect patient outcomes.

    Join ThoughtSpot for a conversation and live demo to learn:

    * The biggest disruptions and challenges facing Healthcare analytics
    * The approaches leading Healthcare Providers & Payers are taking to stay competitive
    * How access to data and faster answers improves patient care
  • The Portfolio Driven Organization
    The Portfolio Driven Organization Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Jul 24 2018 5:00 pm UTC 60 mins
    Portfolio management has become more important in recent years, but for most organizations it’s still a tool they use to support other strategic processes. Industry expert Andy Jordan doesn’t think that’s enough, and in this webinar he explains the concept of a portfolio driven organization. This puts portfolio management at the heart of everything the organization does including:

    - Investment planning and management
    - HR and development strategies
    - Technology strategy
    - Organizational capacity and capability planning

    In Andy’s usual upbeat and thought-provoking style, he’ll explain why portfolio management needs to be the hub of all strategic work in progressive organizations, and he’ll provide attendees with practical tools to start evolving their organization. Don’t miss out, register now.
  • Get Started: Security and Compliance in the Cloud
    Get Started: Security and Compliance in the Cloud Todd Bernhard, CloudCheckr Product Marketing Manager Jul 24 2018 6:00 pm UTC 30 mins
    When choosing a Cloud Management Platform (CMP), enterprises should be looking for Security and Compliance capabilities in addition to Cost Management and Cloud Governance. CloudCheckr is a full-service CMP that delivers "all of the above".

    Additionally, enterprises need to understand their role in the Shared Responsibility Model, in order to fully meet security standards like FedRAMP, HIPAA, PCI and more. CloudCheckr's new Total Compliance module can now automatically and continuously monitor your infrastructure for compliance with 37 different standards, such as HIPAA, PCI, and NIST 800-53.

    Join us for a hands-on demonstration of some of the popular security and compliance features CloudCheckr offers.

    Attendees will learn:
    - Best Practice Checks as it relates to cloud usage
    - Our *New* Total Compliance module
    - Automated "Fix Now" capabilities that can save time and effort
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Jul 24 2018 6:30 pm UTC 60 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • Защищены ли ваши данные в Office 365?
    Защищены ли ваши данные в Office 365? Denis Batrankov, Systems Engineer Jul 25 2018 7:00 am UTC 60 mins
    Приложения SaaS, например Microsoft® Office 365®, набирают популярность. Всё больше компаний используют их в своей работе. Однако такая модель предоставления приложений таит в себе определенные угрозы:

    • случайное раскрытие данных через SharePoint®
    • неконтролируемое использование личных учетных записей OneDrive®
    • нарушение безопасности данных в Exchange

    Даже надежные приложения SaaS, такие как Office 365, повышают риск нарушения безопасности и несоблюдения нормативных требований.

    Наша платформа Security Operating Platform поможет избежать таких проблем. Зарегистрируйтесь для участия в вебинаре и узнайте, как обеспечить соответствие требованиям брокеров CASB и защитить облачные данные от вредоносного ПО и случайного раскрытия.

    Вы также узнаете, как обеспечить полную визуализацию, создание отчетов, систематизацию данных и гибкое применение правил для всех пользователей, папок и действий с файлами, чтобы защитить важные для бизнеса данные в Office 365.
  • ¿Están a salvo sus datos en Office 365?
    ¿Están a salvo sus datos en Office 365? Carlos Corbacho, Systems Engineer Jul 25 2018 8:00 am UTC 60 mins
    Las aplicaciones de software como servicio (SaaS), como Microsoft® Office 365®, tienen mucho éxito y cada vez más empresas las utilizan. Sin embargo, también están aumentando los peligros que conllevan, como los siguientes:

    • Revelación accidental de datos con SharePoint®
    • Uso descontrolado de cuentas personales de OneDrive®
    • Violación de la seguridad de la información en Exchange

    Sí, incluso las aplicaciones SaaS de confianza como Office 365 pueden hacer que aumente el riesgo de sufrir fugas de datos y de incumplir las normativas de seguridad.

    Nuestra solución, Security Operating Platform, ayuda a combatir estos peligros. Inscríbase en nuestro seminario web e infórmese sobre el CASB que necesita para proteger sus datos en la nube frente al código dañino y las fugas fortuitas.

    Descubrirá cómo disfrutar de plena visibilidad y completas funciones de elaboración de informes y clasificación de datos, junto con la posibilidad de realizar ajustes detallados a nivel de usuarios, carpetas y operaciones de archivo, todo ello con el objetivo de proteger los datos cruciales alojados en Office 365.
  • PLM and Great Data Make Product Portfolios Profitable
    PLM and Great Data Make Product Portfolios Profitable Chris Knerr, Global Big Data & Analytics Leader, BackOffice Associates Jul 25 2018 3:00 pm UTC 60 mins
    Today's PLM programs are helping companies build new capabilities to improve product portfolio management, sku-level profitability, customer service levels, and regulatory compliance. Data management, migration, and governance are a critical foundation for success, but have added complexity for PLM since much of the data is in "unstructured" sources like PDFs.

    Please join this webinar to hear Chris Knerr, BackOffice Associate's Global Big Data & Analytics Leader, share Life Sciences and CPG best practices for PLM programs.
  • Enabling SSL between Control-M/Enterprise Manager and Control-M/Server
    Enabling SSL between Control-M/Enterprise Manager and Control-M/Server Cody Belcher Jul 25 2018 3:00 pm UTC 45 mins
    Join us at our next Connect With Control-M technical webinar for Part 3 of "Securing Control-M 9.0.18: Enabling SSL between Control-M/Enterprise Manager and Control-M/Server".

    This webinar will cover:
    •Control-M SSL certificate requirements
    •Implementation and validation of SSL between Enterprise Manager and Control-M/Server
    •Troubleshooting most common Control-M SSL implementation issues

    You can find the previous webinars in this series below:
    •Part 1: Securing Control-M/Enterprise Manager 9.0.18 Client Connectivity - https://youtu.be/MJBjE8-FsNU

    •Part 2: Securing communication between Control-M/Server and Agents in Control-M 9.0.18 - https://youtu.be/58FJWi4w7IM

    Our next Connect with Control-M live webinar will be on Wednesday July 25th, where Cody Belcher will explain and demonstrate the above. We’ll conclude with a live Q&A session.

    Register Now!!

    Target Audience: Control-M Administrators.
    Topic Area: Security
    Level: Medium

    IMPORTANT: Each registration ID can only be used by one person. Please have all interested participants register individually.
  • Virtualized & Accelerated Cloud Infrastructure for Big Data workloads
    Virtualized & Accelerated Cloud Infrastructure for Big Data workloads Taufik Ma, CEO, Co-founder Attala Systems; & Colin Cunningham, Data Scientist, Intel Jul 25 2018 3:00 pm UTC 60 mins
    Whether for private clouds, public clouds or a multi-user environment, IT operators require an infrastructure solution that can instantly spin-up data-intensive workloads and that can scale to support multiple big data workloads or tenants. Attala Systems and Intel have partnered to create a solution that delivers composable storage with local NVMe performance for big data workloads like Apache Hadoop and Spark. The performance available to direct-attached PCIe flash is welcome, but cloud total cost of ownership (TCO) is better when storage is shared to many hosts while offering the elasticity to meet dynamic tenant demands. The maturing of the NVMe over Fabrics (NVMe-oF) specification enables local NVMe performance over a network. With remote direct memory access (RDMA), NVMe actions and data can be transported over a fabric such as Ethernet. This brief illustrates how a complex big data analytics workload is well served by Attala Composable Storage with Intel® 3D NAND SSDs. This workload—which once struggled to scale to support concurrent customers when serviced by an iSCSI appliance or enterprise storage area network (SAN), is shown to match local NVMe performance and scale independently for two customers with no degradation in application runtime when using the NVMe-oF target.
  • Targeted Defense: The Future of Defending Applications in Production
    Targeted Defense: The Future of Defending Applications in Production Mahesh Babu, General manager, Runtime Protection, at Contrast Security Jul 25 2018 5:00 pm UTC 60 mins
    Raise your hand if this is you:

    - Our development teams have a massive security backlog and can’t fix everything in code
    - We need to protect legacy applications with no build pipeline or no dev team support them
    - Struts 2 made us realize we need better production controls and faster zero-day response
    - Our SOC has alert fatigue and has no visibility or context regarding production applications
    - RASP is interesting technology – we are curious to see how we would use it

    At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.

    Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:

    - Intelligent, multi-technique detection
    - Advanced attack response that goes beyond monitoring and blocking
    - Language agnostic protection
    - Simple deployment
  • Top 3 steps to accelerate and improve your Continuous Delivery Pipeline Flow
    Top 3 steps to accelerate and improve your Continuous Delivery Pipeline Flow Mark Levy, DevOps Product Marketing Mgr and Julian Fish, Director, Product Manager for Application Lifecycle solutions Jul 25 2018 5:00 pm UTC 60 mins
    DevOps accelerates more than application delivery. It transforms business ideas into customer value by automating and orchestrating continuous delivery pipelines, to securely deliver quality software and services faster. Teams are often spread across the globe supporting both traditional and hybrid IT environments. How do you streamline the delivery pipeline while ensuring collaboration? Join us to hear ways to successfully improve your delivery pipelines across large enterprise organizations, from our experts Julian Fish and Mark Levy.

    This webinar will cover how to:
    • Map and manage value streams
    • Address common constraints in the delivery pipeline flow
    • Accelerate and improve the delivery pipeline flow across the entire value stream
  • TechTALK: Chatbots - More Accessible (and Powerful) Than Ever Before
    TechTALK: Chatbots - More Accessible (and Powerful) Than Ever Before Simon Jones, CMO, PubNub Jul 25 2018 5:00 pm UTC 45 mins
    The latest trend dominating the chat space is chatbots: artificial intelligence-driven systems that can have natural language conversations with humans despite being no more than code—and whose capabilities continue to grow.
    And the good news is, they’re easier to integrate than ever before. How come? Powerful cognitive services, delivered through accessible APIs.
    In this webinar, we’ll walk you through the chatbot economy, and show you how to low-friction implementation is for your business. We’ll also share the benefits of chatbots for your engagement, and your bottom line.
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Jul 25 2018 6:00 pm UTC 45 mins
    Part 1 Enrollment Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Modernizing the Employee Experience Through IT Service Management
    Modernizing the Employee Experience Through IT Service Management Kyle Shepard, Matt Cox, Joseph Brown Jul 25 2018 6:00 pm UTC 45 mins
    Organizations are looking to access services in a completely different way. In the past, technology leaders have had to deal with multiple softwares or solutions for individual lines of business, now they have the opportunity to take all of the services within an organization and measure them through one service platform. In this panel discussion, we’ll go through the tenants of customer service and how those are now applied through IT service management best practices to make this the era of employee services.
  • Time-Series in Driverless AI
    Time-Series in Driverless AI Marios Michailidis Jul 25 2018 6:00 pm UTC 45 mins
    Driverless AI is H2O.ai's latest flagship product for automatic machine learning. It fully automates some of the most challenging and productive tasks in applied data science such as feature engineering, model tuning, model ensembling and model deployment. Driverless AI turns Kaggle-winning grandmaster recipes into production-ready code, and is specifically designed to avoid common mistakes such as under- or overfitting, data leakage or improper model validation, some of the hardest challenges in data science. Avoiding these pitfalls alone can save weeks or more for each model, and is necessary to achieve high modeling accuracy.

    Driverless AI is now equipped with time-series functionality. Time series helps forecast sales, predict industrial machine failure and more. With the time series capability in Driverless AI, H2O.ai directly addresses some of the most pressing concerns of organizations across industries for use cases such as transactional data in capital markets, in retail to track in-store and online sales, and in manufacturing with sensor data to improve supply chain or predictive maintenance.
  • Crossing the IT/OT chasm
    Crossing the IT/OT chasm Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, Palo Alto Networks Jul 26 2018 12:00 pm UTC 45 mins
    IT meets OT.

    In modern asset-based businesses, data is key to making smart, real-time decisions and creating a foundation for the innovative new products and services that will allow you to greater serve customers in the future. As a result, Information Technology (IT) and Operational Technology (OT) systems must be converged to truly enable data driven businesses.

    This direction of travel directly challenges the traditional ‘Air Gap’ security models that have existed between IT and OT systems for decades. Not only does this approach hinder the required flow of telemetry data between sensory networks, data lakes and machine learning environments, but as a trusted construct it also introduces new and unknown risks from insider threat.

    This presentation provides an example of the types of threats targeting such environments together with examples of how they are delivered and spread through compromised networks as well as how they perform their actions on objective against the targets. Building upon the information and indicators shared by the US CERT in their TA18-074A alert, Unit 42 shares insights into how this attack operated.
  • Industrial IoT: What is Missing and What is Next?
    Industrial IoT: What is Missing and What is Next? Ian Hughes, Senior Analyst IoT, and Emily Wentworth, Research Associate Jul 26 2018 3:00 pm UTC 60 mins
    451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.

    During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.

    The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
  • Better Customer Engagement Through Integrated Collaboration Tools
    Better Customer Engagement Through Integrated Collaboration Tools Robin Gareiss, Nemertes Research Jul 26 2018 3:00 pm UTC 60 mins
    Join Nemertes Research President Robin Gareiss, and learn how organizations are leveraging their UCC capabilities to improve the customer engagement. During this data-backed webinar, we’ll cover the following:
    > The measurable business benefits of leveraging collaboration apps for customer engagement inc. real-life case studies.
    > How organizations architect and manage UCC solutions best practices.
    > The pitfalls of hybrid UCC deployments and how can you hedge against them
    > The key actions that will ensure the lowest operational costs