Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Using Ansible to Modernize and Automate Workflows
    Using Ansible to Modernize and Automate Workflows
    Luke Short, Cloud Consultant, Automation Practice, RHCE Recorded: Jul 19 2019 46 mins
    As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their datacenters. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.

    In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:

    •Develop an automation strategy that includes network discovery and configuration auditing.
    •Adopt a holistic approach to configuration and workload management.
    •Automate new network device provisioning.
    •Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
    •Provide a better way for teams to deploy and manage their own workloads.
  • Cracking the cloud - Expanding your cloud with containers for quick, responsive
    Cracking the cloud - Expanding your cloud with containers for quick, responsive
    Brent Roskos, Principal Cloud Architect, Red Hat Recorded: Jul 19 2019 38 mins
    Increasingly, more organizations are looking to easily build cloud-native applications, deploy them, and manage workloads across a hybrid cloud without sacrificing existing investments. The promise of deploying containers to a hybrid cloud is great—delivering a scalable and workload-driven IT platform with installation integration points that facilitate quick, responsive innovation.

    In this webinar, we’ll discuss how you can accelerate your journey to hybrid cloud and get the most value from open source technology platforms. We'll cover:

    •How using Red Hat OpenShift Container Platform can expand the flexibility of Red Hat OpenStack Platform to take full advantage of your cloud infrastructure.
    •Integration points, such as load balancers, node scale-out, avoiding double encapsulation, support for containerized development, persistent object and block storage, autoscaling for virtual machines, and bare metal as a potential service for physical servers.
    •How Red Hat Consulting can help you more quickly make these components work with a well-rounded adoption program to speed up your journey to hybrid cloud.
  • Get a Credible, Comprehensive Asset Inventory
    Get a Credible, Comprehensive Asset Inventory
    Nathan Burke, CMO @ Axonius Recorded: Jul 19 2019 4 mins
    By connecting to the management and security tools that customers already use and the network infrastructure, Axonius gives customers a credible, comprehensive asset inventory. From laptops & desktops, servers and VMs, cloud instances and mobile devices, to IoT and OT, if an asset is part of your environment it can be discovered.

    Providing customers with a true, always up-to-date inventory of assets is the first step in uncovering security gaps and enforcing policies to take automated actions like enriching CMBD data and creating incidents when any asset is not in line with the overall security policy.
  • How AppsFlyer Automates Security Policy Validation with Axonius
    How AppsFlyer Automates Security Policy Validation with Axonius
    Guy Fletcher, CISO @ AppsFlyer Recorded: Jul 19 2019 2 mins
    With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.

    “Asset management and what Axonius provides is a core element. You can’t build a house without having a solid foundation. Asset management and understanding what you have is basic.” -- Guy Fletcher, CISO @ AppsFlyer
  • Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Dean Sysman, CEO & Co-Founder @ Axonius Recorded: Jul 19 2019 4 mins
    A security teams job is so difficult today - but they’re still spending time figuring out where things are and what they are. The more solutions you have the harder it is to understand where something is, who owns it, and does it actually fit your security policy.

    Asset management isn’t sexy - but at the end of the day, everything you’re doing in your security program relies on a foundation of knowing what your assets are and if they’re fitting that security policy.
  • Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Red Hat & Helevetia Recorded: Jul 19 2019 32 mins
    Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.

    In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:

    • Prometheus to gather the metrics for the platform.
    • AWS CloudWatch to gather metrics for additional components/services.
    • Grafana to centralize from multiple sources and visualize all of the cluster metrics.
    • Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
    • Slack to notify the operations team.
    • Dynatrace for application and end-to-end monitoring.
  • Developing and Deploying Applications in a Multisite Hybrid Cloud
    Developing and Deploying Applications in a Multisite Hybrid Cloud
    Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery Service Recorded: Jul 19 2019 46 mins
    You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.

    In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.

    We’ll cover:

    •The Red Hat IT standard development and deployment pattern.
    •How to automate your CI/CD delivery pipeline, from merge request to release.
    •How to implement basic supply chain security to support application integrity.
    •How we deal with security and change management requirements.
    •The tools and processes needed to implement this model.

    This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
  • Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Nathan Burke, CMO Recorded: Jul 19 2019 2 mins
    How many assets are in your environment? Most security teams don’t know. Asset management is a huge, nagging problem that is only getting worse. With the increase in the number and types of devices in today’s corporate environment, compounded by trends like BYOD, Cloud and IoT, it’s nearly impossible to understand how many devices are on our networks, what’s on them and whether they comply with the overall security policy. Until now.

    Enter Axonius, a simple solution with a unique approach. By aggregating existing business data from over 130 management and security solutions, the Axonius Cybersecurity Asset Management Platform provides actionable visibility and automated security policy enforcement for every asset and user.

    Let us prove it - check out our 2 minute demo.
  • Ask an Expert: Ansible Network Automation
    Ask an Expert: Ansible Network Automation
    Ajay Chenampara, Senior Specialist Solutions Architect, Ansible Network Automation, Red Hat & Andrius Benokraitis, Principal Recorded: Jul 19 2019 54 mins
    Check out this webinar if you're interested in the latest questions around network automation. Want more? Visit our Github Community for Network Automation (https://github.com/network-automation). Want to join the Github Community? Have a question? Email us at ansible-network@redhat.com. Register for an upcoming Ask an Expert webinar. Any question - from beginner to advanced - is welcome, and will be addressed in an open forum with Ansible staff.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Dirk Thelen und Dirk Schüler Recorded: Jul 19 2019 49 mins
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • Smart Incident Management with AI-Powered Analytics & NLP Topic Clustering
    Smart Incident Management with AI-Powered Analytics & NLP Topic Clustering
    Joe Foley, Director of Business Analytics at Numerify Recorded: Jul 18 2019 34 mins
    There is a treasure trove of insights in the text descriptions entered into your incident tickets regarding common symptoms, root causes, and resolutions. However, with thousands of incidents generated weekly, it can be hard to manually extract these insights and make them available to your Incident teams.

    How can you leverage Natural Language Processing (NLP) techniques to make sense of the human-generated incident data?

    Join Joe Foley, Director of Business Analytics at Numerify, to learn how organizations like yours:
    - Achieve Smart Incident Management with AI-Powered Analytics
    - Leverage NLP to help make sense of large volumes of unstructured text descriptions
    - Identify related incidents using Incident Topic Clustering
    - Benefit from using Topic Clustering for Smart Incident Management
  • Manufacturing Intelligence: Keep Your Processes Under Control
    Manufacturing Intelligence: Keep Your Processes Under Control
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. Danny Stout, Sr. Solutions Consultant, TIBCO Softwar Recorded: Jul 18 2019 8 mins
    The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products.

    Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs.

    What You Will Learn:

    Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes
    How multi-variate statistical process control can help to detect deviations from a baseline
    How to monitor in real time the OEE and produce a 360 view of your factory
    The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models.
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Recorded: Jul 18 2019 61 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red Hat Recorded: Jul 18 2019 44 mins
    The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?

    Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.

    In this webinar, we’ll cover:

    •Challenges of brownfield migrations.
    •Common pitfalls.
    •Things to consider before, during, and after migration.
    •Phases of the example migration.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jul 18 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Banking on Digitally Enabled Risk
    Banking on Digitally Enabled Risk
    Conrad Chuang, Director of Product Marketing; Cormac Reidy, SAE - FSI; Ian Pestell, Senior Data Scientist Recorded: Jul 18 2019 49 mins
    Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning.

    You are invited to join TIBCO as we take a step beyond first generation data governance towards unified data and analytics across the enterprise. We’ll present how to achieve a digitally enabled risk function for credit, operation and accounting risk.

    In this session we will cover:
    ▪ How CROs are mastering regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics
    ▪ An overview of the key market challenges for delivering a unified data management and governance model
    ▪ Real-world case studies from G-SIBs focused on Data Governance, Master Data/Reference Data, Data Virtualization, and Data Science

    Speakers:
    Conrad Chuang, Director of Product Marketing, TIBCO
    Cormac Reidy, Senior Account Executive - FSI, TIBCO
    Ian Pestell, Senior Data Scientist, TIBCO
  • Building a Culture of Secure Programming in your Organisation
    Building a Culture of Secure Programming in your Organisation
    Amanvir Sangha, Consultant, Synopsys Recorded: Jul 18 2019 69 mins
    We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.

    Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
  • IoT Security: Prevent Your Devices from Becoming Attack Vectors
    IoT Security: Prevent Your Devices from Becoming Attack Vectors
    Amir Kashani, VP, Cloud Native Development at Onica Recorded: Jul 18 2019 43 mins
    The Internet of Things is enabling new and existing businesses to build better products, provide new services and improve business outcomes through a more connected world. However, the same connectivity provides malicious actors billions of new targets to steal data, control systems or otherwise wreak havoc. In this webinar, we’ll cover key threats to be aware of when building an IoT device or platform and ways to mitigate the risks.

    WHAT WE'LL COVER:
    - The importance of IoT security
    - An overview of AWS IoT
    - The implications of physical security and cloud security
    - Tips to protect your IoT devices
  • Optimizing Application Delivery: Point and Click Traffic Management Strategy
    Optimizing Application Delivery: Point and Click Traffic Management Strategy
    Monica Miller, Solution Expert Recorded: Jul 18 2019 29 mins
    Say goodbye to manual updates, and time-consuming code to manage your traffic. On July 18th, NS1 Product Manager, Emily Pali and Solution Expert, Monica Miller give a deep dive on how to leverage NS1’s Pulsar Active Traffic Steering.

    Customers tell us with Pulsar Active Traffic Steering they:
    - Enhance End User Application Experience
    - Ensure Business Reliability
    - Improve Efficiency & Modernize their CDN Infrastructures
  • Five steps to achieve GRC Maturity using ServiceNow?
    Five steps to achieve GRC Maturity using ServiceNow?
    Clara Abraham, GRC Consultant; Vignesh Mohan, ServiceNow Specialist; Kaviarasan S, ServiceNow Evangelist. Recorded: Jul 18 2019 47 mins
    ServiceNow has released its GRC product to help businesses respond to threats and risks in real time, and transform their inefficient processes to improve the overall security. In this webinar series, we are aiming to help businesses understand the importance of GRC and how to take baby steps in implementing GRC and achieve maturity. Here are the desired profiles who would benefit from this webinar series: Audit Committee, Compliance officers, Risk officers, IT Steering Committee, Directors of IT and ITSM, ServiceNow Owners and GRC consultants.

    Key takeaways from this session include:

    · Demystifying GRC complexities - Automation and Simplification

    · Building blocks of GRC in ServiceNow

    · Stages of GRC maturity

    · Semi-automated GRC/IRM processes using ServiceNow

    · Use case demo
  • Identity is a Game Changing Model for Cloud Security - So What is it?
    Identity is a Game Changing Model for Cloud Security - So What is it?
    Mark Jimenez, Technical Marketing Engineer, Aporeto Recorded: Jul 18 2019 63 mins
    Migrating workloads to the cloud can be a daunting task for many enterprise organizations. This is especially challenging when trying to combine an on-prem static environment that relies on IP addresses for security with the dynamic nature of the cloud, where IP addresses are ephemeral by design and any unsecured endpoint can leave your business exposed. Have you been thinking, if only there was an easier way to make security uniform across my entire cloud/hybrid environment, is backward compatible, future built, easily scales, infrastructure agnostic and provides end-to-end visibility all within a single tool? The answer is YES! The solution is Identity!


    Aporeto uses rich identity (not IP addresses) to eliminate the constraints from traditional Firewalls, VPNs, Cloud Security Groups, SDNs, and virtual appliances. Aporeto fingerprints servers, services, and workloads to generate actual application identity. Application identity enables stronger security because it only allows sanctioned whitelist communications. Security policies remain portable and persistent. Aporeto enables distributed workload protection with centralized visibility and control.

    In this webinar you will learn:
    •How Aporeto uses identity context, vulnerability data, threat monitoring and behavior analysis to build and enforce authentication, authorization and encryption policies for applications.

    •How Aporeto auto-generates a unique workload “fingerprint” by combining workload metadata from any available system and user identity data from OIDC-compliant providers.

    •How Aporeto allows you to microsegment and secures your network across heterogeneous infrastructures that include: containers, Kubernetes, serverless, service mesh, and VM architectures for a Zero Trust security posture.

    Presenter:
    Mark Jimenez, Technical Marketing Engineer, Aporeto
  • Get the Most Out of App-Aware Network Visibility
    Get the Most Out of App-Aware Network Visibility
    Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, Gigamon Recorded: Jul 18 2019 59 mins
    Got apps? Most companies run hundreds. Application experience can make or break a digital enterprise. That’s why true application-level visibility is a must-have in today’s network operations. While achieving it with legacy solutions is difficult, the benefits of becoming app-aware are more than worth it.

    What the heck is application-aware networking? It’s a cool new way to boost network performance and get the most out of your tools. You can now instantly see all applications running in your network, and manage traffic flow not by packets, but by applications.

    Join EMA Research Director, Shamus McGillicuddy, and Gigamon VP, Product and Technical Marketing, Bassam Khan, for this interactive webinar where they will discuss key topics including:

    •Protect your operations from oversubscription
    •Interrogate and identify unknown apps
    •Protect critical applications from bandwidth hogs

    Best of all, you’ll see a live demo of how Gigamon, an application-aware network packet broker, delivers true application visibility to your organization.

    Register now to see it in action!
  • What's Your Digital Game Plan? A Playbook For Success
    What's Your Digital Game Plan? A Playbook For Success
    Jesse DeMesa, Partner, Momenta Partners Advisory Recorded: Jul 18 2019 58 mins
    There is no one-size-fits-all-strategy for implementing digital innovation, but there are best practices and experiences you can leverage to enable your firm's road to change in the 21st century. Momenta Partners has created a playbook gleaned from practitioner's perspectives on how to best navigate digital transformation, and we'll share our insights with you in this webinar. This webinar is for CEOs and leadership teams seeking insights and actionable intelligence by example.

    We will take a look at:

    - The steps of a firm's digital transformation journey
    - The best approaches to beginning your transformation journey
    - Getting your team to embrace digital transformation
    - Building a playbook to help you achieve your transformation goals
    - Best practices for adoption
  • MAAS at the edge - The importance of bare metal provisioning in edge computing
    MAAS at the edge - The importance of bare metal provisioning in edge computing
    Andres Rodriguez - MAAS Engineering Manager Recorded: Jul 18 2019 40 mins
    Wide area networks, when managed inefficiently can prove costly for businesses as both hardware and the provisioning of geographically distributed devices can represent a hard cost.

    Edge deployment costs can be measured in:

    Capital and operational expenses
    Power usage
    Dissipated heat
    Real estate occupied

    For businesses looking to set up servers in remote locations with remote site footprint constraints, MAAS provides a compelling model.

    MAAS provides a solution to provision hardware and set-up servers remotely, quickly and with limited human intervention. By deploying MAAS businesses can reduce friction in small footprint environments as well as providing an open API-driven way to provision and repurpose nodes in every remote location enabling fast and efficient server provisioning.

    In this webinar join Ubuntu MAAS Product Manager, Andres Rodriguez to discuss use cases and how MAAS could benefit your business.
  • Discover a Better Way to Work with Citrix
    Discover a Better Way to Work with Citrix
    Calvin Hsu, VP of Product Marketing at Citrix Recorded: Jul 18 2019 45 mins
    Let’s face it -- today, work is more complicated than ever. We rely on too many apps, spend too much time searching for information and navigate complex apps to accomplish what should be simple tasks. All of this degrades the user experience. Meanwhile, transitioning to the cloud compounds the problem by adding network complexity and security challenges. The result is staggering: most employees aren’t engaged in the work they’re doing. That means they aren’t productive. Ultimately this impacts every aspect of business. At Synergy 2019 in May, Citrix unveiled new Citrix Workspace intelligent features along with advancements in Citrix Networking and Citrix Analytics.
    -Discover how Citrix Workspace helps organize, guide and automate work.
    -See a demo of new intelligent workspace capabilities: personalized notifications and automated workflows that reduce distractions and improve user productivity
    -Learn how Citrix Networking improves the user experience with unified control, performance and security for every user, location and cloud.
    -Discover how Citrix Analytics delivers a single view of actionable insights and offers proactive resolutions for security, performance and productivity issues.
  • Data Interaction is Driving the Next Generation Data Center
    Data Interaction is Driving the Next Generation Data Center
    Clay Ryder, Data Center Systems Marketing Jul 22 2019 4:00 pm UTC 35 mins
    As organizations do their best to gain value from their unique data assets and unlock critical information, the way data interacts is changing. Nowhere is this revolution having a greater impact than in the data center.

    Join IDG and Western Digital for this exclusive webinar to learn why Open, Scalable, Disaggregated and Extensible are the keywords for the next-gen data center.
  • Modernize Your Network Operations with Network Functions Virtualization
    Modernize Your Network Operations with Network Functions Virtualization
    Pano Xinos, Global Telco Marketing Lead, Red Hat Jul 22 2019 6:00 pm UTC 15 mins
    This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.

    In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.

    OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
  • SD-WAN Confessions: My 3-month Onboarding Experience
    SD-WAN Confessions: My 3-month Onboarding Experience
    Lars Norling, ADB SAFEGAT; Joost van der Struijk, Videns; Eyal Webber-Zvik, Cato Networks Jul 23 2019 9:00 am UTC 31 mins
    Learn how ADB SAFEGATE, together with Videns IT Services, had successfully migrated 24 global sites from MPLS to SD-WAN. Join us as we uncover the challenges, and offer a walkthrough for a successful global SD-WAN project - sharing insights and tips on how to avoid common pitfalls.
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Jul 23 2019 10:00 am UTC 60 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jul 23 2019 12:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    • Identify and extract traffic from over 3,000 applications
    • Detect and manage shadow IT and rogue apps
    • Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • Put Intelligence In Your Continuous Testing
    Put Intelligence In Your Continuous Testing
    Diego Lo Giudice and Antony Edwards Jul 23 2019 2:00 pm UTC 60 mins
    Agile, DevOps, Micro-services and Cloud are already changing the way we test in an attempt to accelerate development of great digital experiences. What's next? While the change in testing is happening, it’s very slow. Your business wants more, better, and faster. Can AI and Machine Learning be the turbo chargers for continuous intelligent test automation? Our guest speaker from Forrester, Diego Lo Giudice, will discuss the latest findings from his research and a custom study conducted by Forrester Consulting on behalf of Eggplant.
  • Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Jig Ruparel (Principal Strategic Architect) & David Ginsburg (VP, Product and Solutions Marketing) Jul 23 2019 2:00 pm UTC 45 mins
    Are you executing upon your WAN transformation, but are running blind as to whether SD-WAN performance problems are due to the network or your applications? An end-to-end managed SD-WAN service can facilitate an integrated approach to visibility that will help you better understand how your WAN is performing. By offering a unified view into both network and application performance, it enables more effective problem identification and resolution. In addition, a sophisticated customer and partner portal, combined with the SD-WAN service’s back-end orchestration, will remove visibility silos, ultimately increasing productivity and saving you time and money.

    In this webinar, you will learn:

    * How SD-WAN deployments can create visibility islands and their impacts on ensuring application performance

    * How an end-to-end managed SD-WAN service can eliminate these gaps

    * What elements of an SD-WAN service you need to monitor and why

    * What tools are available to integrate network and application visibility, and how they can make the most of your SD-WAN investment

    * Advanced networking analytics guidance
  • Successful compliance and governance in a cloud-first world
    Successful compliance and governance in a cloud-first world
    Alex Hilton, CEO, Cloud Industry Forum and Sean Roberts, General Manager, Public Cloud, Ensono Jul 23 2019 2:00 pm UTC 30 mins
    Every organization is moving to the public cloud in order to scale and innovate. With that comes challenges in securing and monitoring environments as you continue to grow.

    Wherever you are in your cloud journey, if compliance and governance is a concern to you, then participating in this webinar is vital.

    Learn from cloud experts Alex Hilton, CEO, Cloud Industry Forum and Sean Roberts, General Manager, Public Cloud, Ensono on:
    •What does cloud governance truly mean and why it is so important
    •The 3 steps you need to take to make yourself secure and compliant in the public cloud
    •.How can customers effectively brace new cloud technologies to drive innovation
    and more!
  • Demo: Information Steward Accelerator (ISA) for Data Quality
    Demo: Information Steward Accelerator (ISA) for Data Quality
    Scott Wenzel, Sr. Value Engineer & Matt Creason Sr. Value Engineer at Syniti Jul 23 2019 3:00 pm UTC 60 mins
    The demonstration is a follow up to our Webinar “Get your business frictionless with clean data” and will focus on our SAP Solution Extension – Information Steward Accelerator. In this demo, you will see how this application covers all phases of a data quality project and adds value to your data governance needs by giving you a web-based platform that bridges the gap between IT and business users as well as increases your overall visibility into the quality of your data.
  • Managing High-Severity Issues in Support
    Managing High-Severity Issues in Support
    Luke Kanter, Senior Product Manager, Business Operations, FanDuel; Lauren Wang, Director of Solutions Marketing, PagerDuty Jul 23 2019 3:00 pm UTC 31 mins
    Availability is a must for leading daily fantasy sports site FanDuel, so its millions of users can play games during live sporting events. But the majority of these happen after working hours, so what happens if there’s a high-severity issue and you’re in Support?

    With FanDuel’s technical teams five time zones away, how do you mobilize the right resources, especially during peak traffic and usage times? In this session, learn how FanDuel addresses these challenges using PagerDuty for SupportOps.
  • Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Eliminating SD-WAN Blind Spots - Top Insights for End-to-End Visibility
    Jig Ruparel (Principal Strategic Architect) & David Ginsburg (VP, Product and Solutions Marketing) Jul 23 2019 5:00 pm UTC 45 mins
    Are you executing upon your WAN transformation, but are running blind as to whether SD-WAN performance problems are due to the network or your applications? An end-to-end managed SD-WAN service can facilitate an integrated approach to visibility that will help you better understand how your WAN is performing. By offering a unified view into both network and application performance, it enables more effective problem identification and resolution. In addition, a sophisticated customer and partner portal, combined with the SD-WAN service’s back-end orchestration, will remove visibility silos, ultimately increasing productivity and saving you time and money.

    In this webinar, you will learn:

    * How SD-WAN deployments can create visibility islands and their impacts on ensuring application performance

    * How an end-to-end managed SD-WAN service can eliminate these gaps

    * What elements of an SD-WAN service you need to monitor and why

    * What tools are available to integrate network and application visibility, and how they can make the most of your SD-WAN investment

    * Advanced networking analytics guidance
  • Ansible Best Practices: Roles and Modules
    Ansible Best Practices: Roles and Modules
    Tim Appnel, Ansible Senior Product Manager, Red Hat Jul 23 2019 5:00 pm UTC 64 mins
    This webinar is based on Tim Appnel's talk from AnsibleFest Austin 2018, which was a followup to Ansible Best Practices: The Essentials. It delves into the topic of developing roles and modules to extend the power of Ansible automation while maintaining readability and simplicity. Based on actual experiences helping Ansible users, we show you what to do (and what not to do) to create the most reliable, resilient, and easy-to-manage automation solutions.
  • Top 10 Security Best Practices for Azure
    Top 10 Security Best Practices for Azure
    Jigar Shah Jul 23 2019 5:00 pm UTC 60 mins
    As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.

    In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
    Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
    Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
    Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented

    Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
  • Breaking Bad: Why Legacy AppSec Tools Can’t Assess Threats in Today's Web Apps
    Breaking Bad: Why Legacy AppSec Tools Can’t Assess Threats in Today's Web Apps
    David Howe, Lead Application Security Specialist, Rapid7 Jul 23 2019 6:00 pm UTC 45 mins
    Modern web applications are rising to the challenge of satisfying user expectations. New versions can be deployed at a moment’s notice, bug fixes can be pushed several times a day, and user behavior can help guide the thought processes behind the next big feature. While cloud hosting can guarantee uptime and automatically scale as demand increases, this shift in application development and delivery has also introduced a whole new category of risk.

    Join Dave Howe, Lead Application Security Specialist, as he lays out the complexity of securing modern web applications and key considerations for organizations wanting to address web application risk exposure. Dave will cover:

    1. The evolution of traditional web applications into the modern ones we build and use today
    2. The hidden vulnerabilities that come with today’s web apps, and why legacy application scanning tools overlook them
    3. How InsightAppSec, Rapid7’s cloud-powered dynamic application security testing (DAST) tool, can address the issues and risk associated with today’s modern web apps.
  • Top 10 Security Changes in Red Hat Enterprise Linux 8
    Top 10 Security Changes in Red Hat Enterprise Linux 8
    Mark Thacker, Principal Technology Product Manager, Red Hat Jul 23 2019 6:30 pm UTC 23 mins
    Do you know how to improve the entire cryptographic policy on a system with one command? How about being able to record exactly what an admin typed in the system - and what happened as a result?

    In this webinar, we'll provide an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
  • How AI and Automation Can Improve Your Service Desk
    How AI and Automation Can Improve Your Service Desk
    Noel Hopkinson, SMAX Specialist and Solutions Architect, Micro Focus Jul 24 2019 10:00 am UTC 45 mins
    Join our webinar and learn how AI and automation can transform your service desk.

    In this 45-minute webinar with our service management expert, Noel Hopkinson, you will learn how AI, automation, and machine learning can transform your traditional ITSM solution into an Enterprise Service Management (ESM) tool that delivers innovative, enterprise-wide services.

    Get ready to see real-world applications that demonstrate how:

    •AI and machine learning can improve IT efficiency.
    •Automation improves service levels and speeds up time to
    resolution.
    •Efficiencies driven by automated support can be implemented by
    other departments.
    •“Bots” can deliver a self-service catalogue for user-led resolution.
    •All of the above can be implemented seamlessly with Micro Focus
    Service Management Automation X (SMAX).

    Register now to gain greater insights into the latest technologies reshaping service management today.
  • Softphones for the Call Center of the Future
    Softphones for the Call Center of the Future
    Todd Carothers, CounterPath Executive Vice President of Sales, Marketing and Product Jul 24 2019 2:00 pm UTC 45 mins
    As the call center industry continues to undergo significant transformation, there is an increasing demand to move to the cloud for operational efficiencies, agent versatility, and increased flexibility. Your organization should know and be ready to realize substantial benefits moving into the future. But how do you do this with your current solution already in place? Can you extend the value of your Aspect, Asterisk, Avaya, BroadSoft, Cisco, Genesys, or cloud-platform?

    Join us for an overview of the CounterPath Bria call center solution and how you can increase agent productivity and reduce administrator and manager headaches. Hear from Todd Carothers, CounterPath’s Executive Vice President of Sales, Marketing and Product, where he will dive into where our call center solution is used today, and the roadmap for the future.

    In this webinar, you will learn about:
    •How to mitigate and take advantage of technology changes for call centers
    •Increasing agent productivity with powerful UC tools
    •Reducing IT and administrator headaches deploying or managing a call center solution
    •CounterPath’s off the shelf and custom solutions for call centers
    •How a BYOC call center with 700 remote agents was able to leverage Bria softphones to dramatically decrease operating costs and support issues
  • Software Defined Perimeter in Real Life
    Software Defined Perimeter in Real Life
    Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T Jul 24 2019 2:00 pm UTC 41 mins
    The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world?

    Hear Safe-T’s Eitan Bremler and Chief Security Architect of Alight Solutions Yabing Wang as they explored:

    The Software Defined Perimeter architecture
    How to address and prevent insider threats with Safe-T’s Telepath Behavioral Analytics
    Real life SDP applications and two SDP customer success stories
  • Red Hat Enterprise Linux 8 Container Tools
    Red Hat Enterprise Linux 8 Container Tools
    Scott McCarty, Principal Product Manager, Red Hat and Dan Walsh, Senior Distinguished Engineer, Red Hat Jul 24 2019 2:00 pm UTC 48 mins
    When building and managing container-based applications, it's important to consider every element of the proposed deployment, from selecting a base image on which to build, to understanding the security, scalability, and ease of use of the deployment platform.

    With the introduction of the Red Hat container tools suite, comprising podman, buildah and skopeo and the availability of base images and container runtimes based on Red Hat Enterprise Linux, developers and users alike have a comprehensive set of tools at their disposal. In this webinar, we'll demonstrate how to replace Docker with podman and demonstrate podman.

    We'll also demonstrate additional new features like management of pods, and better security features available in podman.
  • It’s Time for Time Series – Built-in Analytics in Vertica
    It’s Time for Time Series – Built-in Analytics in Vertica
    Maurizio Felici and Jeff Healey, Vertica Jul 24 2019 3:00 pm UTC 60 mins
    Time series databases have become one of the fastest growing speciality database platforms in our industry. Why? Well, time series data consists of sequences of measures over time and those measurements are becoming ubiquitous, particularly with the Internet of Things. Just think about daily daily stock prices, sensors measuring temperature or air quality, electrocardiograms -- all of them are time series examples. Analyzing time series requires unique preparation steps and specific functions.

    Join us for this webcast and you will learn how to use advanced Vertica Time Series Analytics to quickly analyze large volumes of data – all without investing in yet another database. You will also see how easily to extend Vertica’s Time Series built-in functionality to forecast and correlate time series.
  • How to Save 80% of Your Automation Implementation Time
    How to Save 80% of Your Automation Implementation Time
    Daniel Peled, VP Global Advisories and Digital Transformation Kryon Jul 24 2019 3:00 pm UTC 41 mins
    Digital transformation in financial and insurance industries requires unprecedented levels of speed, intelligence, agility and cost efficiency.
    Reliance on repetitive manual processes is costly and inefficient, while high human error rates, regulatory and compliance pressure and back office inadequacies mean that institutions must address the legacy way they currently work to achieve best-in-class digital workforce solutions.

    In this session you’ll learn about:

    - How to accelerate and scale up your automation journey with Process Discovery
    - AIG Insurance (Israel) and how they saved 83 monthly work hours by automating a single process
    - A major bank increased compliance and minimized non-compliance costs
    - Practical tips for a successful RPA journey
  • Integration - the path to cloud-native architecture
    Integration - the path to cloud-native architecture
    Ken Johnson Senior Director of product management, Middleware, Red Hat Jul 24 2019 3:00 pm UTC 20 mins
    The adoption of public and private clouds is driving changes in application architecture, development and delivery. This in turn requires new practices and IT architecture. All this change presents great opportunity to deliver new solutions at greater speed and agility than before. However these new apps and services need to operate along with your existing IT assets: databases, Software-as-a-Service offerings, packaged/legacy applications to deliver value to your stakeholders.

    This session will show how the path to cloud adoption and cloud-native architecture is facilitated through the use of integration, APIs, containerization and agile integration architecture.
  • Container-native and Cloud-based Enterprise Integration
    Container-native and Cloud-based Enterprise Integration
    Dinuksha Ishwari, Software Engineer, WSO2 and Dileesha Rajapakse, Software Engineer, WSO2 Jul 24 2019 4:00 pm UTC 35 mins
    Companies across all industries adopt docker to enable a hybrid cloud strategy for their mission-critical legacy applications. WSO2 Cloud has the capability of deploying to integrate applications into the cloud with seamless effort. This webinar will explain the DevOps experience with WSO2 Enterprise Integrator tooling.
    Discussion topics include:
    * Docker Image generation and deployment
    * Deploying an application to Integration Cloud
    * Deploying a new version of an application that is currently deployed in Integration Cloud
  • API Gateways: Why You Should Use Them in Microservices Development
    API Gateways: Why You Should Use Them in Microservices Development
    Charles Pretzer, Technical Architect, NGINX Jul 24 2019 4:00 pm UTC 63 mins
    The use of an API gateway and the move to microservices are two of the most important trends in application development. But are they similar, or different; complementary, or contradictory? In this webinar we discuss the advantages of an API gateway, the advantages of microservices development, and how and when they can work together.

    Join this webinar to learn:
    - More about the advantages of an API gateway
    - More about the advantages of microservices
    - Whether an API gateway approach works with different microservices network architectures, including service mesh
    - How to reduce rework if your application needs to move from one network architecture to another
  • Unlocking TimeSeries Data with Redis
    Unlocking TimeSeries Data with Redis
    Kyle Davis, Head of Developer Advocacy, at Redis Labs Jul 24 2019 4:00 pm UTC 40 mins
    Data indexed over a time is very common, however unless modeled correctly, this data can be locked up in ways that prevent both useful analysis and high performance query and ingest.

    In this webinar, we will go over common time series problems and then examine how to solve them with the Redis TimeSeries module. You will see examples of the commands and how they can be used for analysis, query and ingest.