Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:
• Learn differences between Smart Load Balancers and Legacy Load Balancers.
• Understand the value of Smart Load Balancers in traditional and modern use cases.
• See a live demonstration of Avi Networks’ Smart Load Balancer in action.
Businesses waste millions of dollars annually on employees participating in ineffective meetings. Yet, the waste continues to fly under the radar of executive leadership teams despite losses in operating expenses and productivity.
In this webinar we will present a framework for running highly productive, effective meetings that any organization can adopt. Specifically, we'll take a closer look at what are generally referred to as “issue clearing” meetings.
These meetings (usually recurring) typically involve 5 to 20 people who work on a shared goal, product or project. These meetings focus on solving problems, making decisions, and aligning individuals and teams. Examples might include: executive leadership, engineering leadership team, product council, project council, weekly team meeting, portfolio council, etc.
We will have short Q&A sessions and interactivity throughout the session.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.
But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.
In this webinar, attendees will learn:
- The state of play in regards to monitoring in the enterprise
- How Application Performance Monitoring (APM) tools improve ITSM processes
- Key APM capabilities and how they apply to Service Transition and Operation
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.
In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:
- Identify malicious activity and gain key context to help prevent similar threats
- Apply methods to help improve accuracy and further mitigate risk
- Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats
Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
2017 marked the 10-year anniversary of Amazon’s AWS, and with it a decade of mainstream awareness of the concept of the public cloud. As we begin the year, the trends that will drive the technology industry through 2018 are becoming apparent. Among these trends is a greater maturity surrounding discussions about cloud computing.
In this webinar attendees will learn how 2018 will be a year where the importance of robust multi-cloud management capabilities becomes clear. Organizations of all sizes will seek out solutions that transcend any individual public cloud provider while still providing visibility and management of their own on-premises environments.
Protecting student and district data, privacy, and safety with their limited IT resources is a tall order for K-12 institutions. This no-cost webinar is for districts and their consultants considering the E-rate program for funding firewall services. Join our education and E-rate experts to learn:
•About Palo Alto Networks and how we uniquely protect students, data, and networks
•How your peers have successfully leveraged E-rate funding to create safe learning environments
•Which Palo Alto Networks products are eligible
•Where to find E-rate resources
David Cumbow is a Systems Engineering Manager with Palo Alto Networks. Prior to coming to Palo Alto Networks, David spent 13 years in the public sector working for the third-largest K-12 school district in Riverside County. Having worked jobs from Database Administration to Virtualization, David found a passion for Networking and Security. With eight years in the security field, David has led many K-12 Districts in California to a better security posture through guidance and peer-to-peer consulting. David holds a Bachelor of Science in Computer Science from California State University.
Greg Herbold is Director of the U.S. State/Local Government and Education (SLED) segment at Palo Alto Networks, where he is responsible for creating solutions and programs to protect our way of life in the digital age by preventing successful cyberattacks. In this capacity, he leads strategy and planning, marketing, solution development, sales programs, channel partner development, contracts, compliance and industry relations for the segment. Greg holds a Master of Arts from Georgetown University and an HP-Stanford Innovation and Entrepreneurship Certificate from the Stanford Graduate School of Business.
DDS Technical Overview Series - Part IV: The OMG Data Distribution Service provides a diverse set of Quality of Service policies. Strategic use of these QoS policies enables intelligent behavior in middleware and allows the application developer to focus on the domain. In this webinar, we examine one application in detail and explore how it uses DDS QoS policies to address several non-functional requirements. We'll also cover the trade-offs involved in different design choices involving DDS QoS and other DDS features. This webinar builds on the Part I and Part II webinars by examining certain QoS policies in more depth and taking a deep dive into a single application as it evolves from simple data transfer to taking full advantage of the Data-Centric Publish/Subscribe model of DDS.
Join us at this webinar to learn how to deliver best practice dashboards and achieve higher user adoption.
Dashboards were rated as the most important analytics technology for implementing business-driven BI and analytics in TDWI’s best practices report, Business-Driven Business Intelligence and Analytics.
But, data visualization expert, Stephen Few, has declared that the majority of today’s analytics dashboards fail.
At this webinar you’ll learn how to learn how to:
Design dashboards that provide instant insight (and nothing more!)
Deliver the right dashboards, to the right people, at the right time, to drive faster and better fact-based decision-making
Maximise your usage of dashboard features, design and layout tips
Who should attend?
Data Analysts and Content Builders who build reports and dashboards for internal or external stakeholders.
Make your dashboards achieve higher adoption today
Every organization undergoes different pain points during their agile transformation.
We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join CA's Senior Director of Agile Management, Doug Dockery, agile coach and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, January 16, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.
Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.
“SIM providers are going away. It’s just a matter of when.”
—Drew Johnson, VP Engineering & Operations, Aeris
“Automotive transformation via the IoT will become mainstream.”
—Michelle Avary, VP, Automotive Strategy, Aeris
“With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
—Dr. Rishi Mohan Bhatnagar, President, Aeris India
“Security will have to up its game as IoT delivers huge volumes of data.”
—Syed “Z” Hosain, Chief Technology Officer, Aeris
My prediction: This will be the only IoT futuristic view you will need to attend this year!
Sign up now for this futuristic view into the future of IoT.
Pressure to deliver faster, better and more economical services is driving IT modernization across state and local government. But a recent survey from the Center for Digital Government indicates that CIOs are approaching modernization with a growing emphasis on value -- respondents said “budget, cost control and fiscal management” dominate their attention, discussions and strategic planning activities. So how do government leaders approach modernization in an environment where value and fiscal responsibility are paramount?
This hour-long, panel-style webinar will:
• Uncover additional CDG survey findings on technology, planning and procurement priorities
• Offer best practices around modernizing legacy systems, consolidating IT environments, strengthening data and analytics capabilities, adopting cloud services, and improving security and risk management
• Discuss how commercially supported open source technologies can drive better performance at lower cost
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
Machine learning advancements by VMware, new heterogeneous data integration technologies and an innovative hybrid cloud management platform have put predictive analytics in reach for nearly every VMware customer. Hear from Blue Medora Chief Solution Architect, Craig Lee, discuss the tools you’ll need to help you accelerate time to remediate critical components of your IT Stack through root cause analysis.
CloudCheckr is a robust cloud management platform (CMP) that offers a variety of features to help enterprises, resellers, and public sector organizations optimize their public cloud ecosystems. While most competing platforms only offer cost optimization or security, CloudCheckr offers both. The added functionality is great for customers, but it also means more menus to navigate. To make it easier, we have revamped the user interface.
In this webinar, attendees will see a more responsive, user-friendly interface for CloudCheckr that offers complete control of your cloud, while keeping the navigation minimal and effective so you can focus on your job.
Akshaya Gaur, Mashreqbank's ex CIO opens up about how cloud technology can really help banks in the digital banking era for millennials. Cloud Computing brings cost-efficiency, speed to market and quality – critical factors for banks operating in a highly competitive market where margins are under constant pressure. Also, Cloud Computing allows quick and efficient scalability of infrastructure. Considering the rapid advancement of technology trends, IT infrastructure needs are becoming less and less predictable. Also, once technology is purchased, the company is stuck with it – despite technology advancements or changes in company growth – and increasing annual maintenance costs.
How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just application and user based security policies. In this webinar, we will share the 10 capabilities to test before you buy your next-generation firewall, and the top 5 mistakes to avoid.
Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments.
During this webcast, you will learn:
- How to make application deployment and operations at scale simple and reliable
- How to make it easy to create “cloud-native” applications in the first place
- Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
Version 3.0 of Security for Cloud Computing: Ten Steps to Ensure Success has just been released for publication. As organizations consider a move to cloud computing, it is important to weigh the potential security benefits and risks involved and set realistic expectations with cloud service providers. The aim of this guide to help enterprise information technology (IT) and business decision makers analyze the security implications of cloud computing on their business.
In this webinar, authors of the paper will discuss:
• Security, privacy and data residency challenges relevant to cloud computing
• Considerations that organizations should weigh when migrating data, applications, and infrastructure to a cloud computing environment
• Threats, technology risks, and safeguards for cloud computing environments
• A cloud security assessment to help customers assess the security capabilities of cloud service providers
In this webinar, we’ll highlight the advantages of using an end-to-end digital mortgage solution to manage the full spectrum of mortgage processes – from signature to notarization through to the secure vaulting and registration of the mortgage note in the MERS eRegistry.
-How and where the industry is adopting eMortgage technology
-Legal and regulatory requirements
-E-apps, e-disclosures, e-closings, e-vaulting… where you should start
-Implementation options for a phased transition
-A live demonstration
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.
Here’s a sampling of some of the predictions our cybersecurity experts will review:
•Ransomware Prevention more important than ever
•The Internet of Things blurs the line between personal and corporate security
•The era of Software Supply-Chain attacks has begun
•The Cloud will accelerate channel partner migration to next-generation security innovators
•Advances in Machine Learning will improve both patient care and cybersecurity
•Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
Learn the pragmatic and simple approach to deal with GDPR
Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.
Attend this event to understand:
- New cybersecurity legislation and the main elements of the GDPR
- What’s in the GDPR and what’s not
- Security-specific recitals and articles
- The U.K. Data Protection Bill and modifications to the GDPR
- How Palo Alto Networks can help you become GDPR-compliant
We do hope you can join us for this exclusive webinar.
Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.
In this webinar you will learn how:
- To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry
- To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service
- A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies
- We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.
Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.
Enterprises are transitioning from on-premise, monolithic applications to highly dynamic, polyglot environments using microservices and cloud computing. During this transition, organizations are often left wondering what to do with existing investments in legacy platforms and application development frameworks that are running the business of today but are quickly becoming obsolete in the face of the ongoing digital revolution.
In this webcast, we'll explore how organizations can meet the challenges of modern business using existing applications while at the same time driving new innovation using modern application development technologies like microservices, containers, and hybrid cloud. These techniques can help deliver market innovation faster and with more reliability while minimizing the risk of introducing new technology too quickly.
SAP implementations are getting increasingly complex, while applications are under constant pressure to perform on various business metrics. Organizations are increasingly looking to optimize cost and improve agility through cloud computing approaches. We are pleased to invite you for a webinar on “Cloud migration– SAP on Azure” with Microsoft and Wipro experts where participants will have a unique opportunity to interact with cloud experts from Wipro and Microsoft who will offer candid insights into important business and technical considerations for a seamless cloud migration.
No two Agile adoptions are ever the same, but there are a number of common areas that can cause problems. Join industry expert and Projectmanagement.com contributor Andy Jordan as he highlights 7 challenges organizations often face.
In his usual upbeat style Andy will:
-Help you plan to prevent the challenges from affecting you
-Identify the early warning signs that things may be going wrong
-Give you tools to prevent thing getting worse and help you learn from the experience
As Agile becomes ever more critical to business success you can’t afford to fall into expensive traps on your Agile journey. Sign up for this webinar today and learn how to give your organization a path to success.
It’s been a busy year for Apple. From unveiling new products and operating systems to forming new enterprise relationships, Apple continues to evolve its capabilities and best practices for managing Mac, iPad, iPhone and Apple TV devices. Before you finalize your IT plans for next year, join us for a look back at major Apple milestones and enjoy a glimpse at where Apple may be headed in the future.
In our webinar, Apple IT Trends for 2018, we’ll examine the strategic moves made by Apple and explain what they mean for you in the new year.
•Apple IT accomplishments in 2017
•Predictions for Apple IT trends in 2018
•IT initiatives to consider and provide examples of organizations already implementing them
Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones. Load Balancing offers different types of load balancers that all feature the high availability, automatic scaling, and robust security necessary to make your applications fault tolerant.
-Understand how Load Balancers can help optimize your cloud resource utilization and reduce costs
-Identify the security implications of Load Balancers
-Look at why monitoring Load Balancer deployments is so important
Everyone has data. Everyone has insight. But are you able to act on critical insights at the speed of your market? Find out how you can capitalize on your data and gain the speed-to-insight you need to propel your business forward. Join Yellowfin and guest speakers from Forrester to understand how the next generation of analytics goes beyond dashboards, visualizations and storytelling to provide driven meaningful business results.
* What your teams need to be doing now to build an organization of insight
* The Business and BI Agility practices that will propel your company forward
* How Yellowfin is delivering speed-to-insight at the speed of your market
Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.
But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.
Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.
Michael Collins from ASG Technologies will address details like:
- How to close the gap between the needs of the enterprise and personalization
- Why it is important to include employees in the planning of their workplace at an early stage;
- How to implement the right mix of standardization and individualization and:
- Why more flexibility & agility for employees leads to higher productivity.
In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
Learn how organizations can take control of the security incident detection & response lifecycle. Know Wipro’s approach to accelerate the pace with which one can become proactive in managing security incidents and hunt for threats in their environment. Get a real-time view of the security posture or exposure with complete contextualization of incident and respond specific to a threat with examples.
This webinar will highlight:
•How NetApp and Commvault’s innovative data management capabilities allow you to get the most out of your Next Generation Data Center while ensuring your data is protected
•Commvault IntelliSnap integration with NetApp SolidFire and NetApp HCI (Element OS) along with the NetApp product portfolio
•Seamless Application Integration
Speakers will be Erik Kemp, Technical Marketing Engineer, NetApp and Charlie Patterson, Alliance Architect, CommVault.
Looking for a way to get the most of your data stored in Hadoop? During this 45mins demo you will learn how you can use Vertica to analyze your data in place on HDFS or S3 storage and avoid moving and reloading. Vertica SQL on Hadoop is platform agnostic and will integrate with any distribution of Hadoop. In addition, a comprehensive set of in-database Machine Learning functions built-in to Vertica allow analysis in place without sampling or movement of large datasets. Join us to see it in action!
While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.
Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:
-How does behavioral security differ from existing security solutions like image scanning?
-How does Falco work?
-What can it detect?
-How to build and customize rules.
-How to extend with alerting options.
Who should attend?
If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
In today’s fast paced modern business management environment the need for the right project portfolio management or PPM software solution has never been more important. However, many companies are still not viewing these platforms as part of the strategic infrastructure that drives success, and that’s a big problem. Join industry expert Andy Jordan and CA’s own Jim Tisch as they discuss the issues including:
•Why decisions must be driven from the top down
•Why cost alone is an irrelevant and misleading factor in choosing a solution
•The role IT does – and doesn’t, have in the decision-making process
•The importance of a partner over a vendor
•Measuring and managing the return on your PPM investment
An organization won’t succeed simply because they choose the right tool, but they may well fail if they commit to the wrong one. Don’t miss this thought provoking webinar and give yourself a significant advantage in the battle to deliver consistent success.
When you’re responsible for the care and feeding of packaged business applications, it can be quite challenging if not impossible to make meaningful changes that improve responsiveness, especially when the underlying database is struggling to keep up.
Watch this webinar to learn:
- What could be the root of the problems you are experiencing
- Ways to identify your problems
- Simple solutions you can implement without anyone else’s help
Today, IT organizations have many options for development technology tools, and the number of choices can be daunting. As modern application requirements become more complex, it’s apparent that one runtime, one framework, or one architectural style is no longer a feasible strategy. Organizations must figure out how to manage the complexity of distributed app development with diverse technologies, a lack of skilled resources, and siloed processes.
Red Hat OpenShift Application Runtimes
Join Red Hat to learn about Red Hat’s solution for optimized cloud-native development: Red Hat® OpenShift Application Runtimes. A suite of containerized runtimes that simplifies cloud-native development, Red Hat OpenShift Application Runtimes provides a highly productive and prescriptive developer experience and delivers strategic flexibility without limiting development, testing, deployment, and modernization preferences. The discussion will cover:
Cloud, containers, DevOps, and the open source Cambrian explosion.
Migrating existing apps: rehost, replatform, or refactor.
One size does not fit all: polyglot and developer choice.
Cloud-native deployment techniques.
Future development: Istio service mesh, Kubernetes, and serverless architectures.
There are quite a few Docker security tools in the ecosystem; how do they compare?
Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/
We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.
Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:
-How to secure Docker containers and what are the best practices
-Why you need to both static and dynamic (run-time) scanning for your images
-What other container security measures and policies are necessary in production
Demo: Comparing and implementing docker security basics with the most popular container security tools
Can you reach the full potential of the cloud using the tools provided by the major cloud platforms? Take a closer look at the various tools built into Amazon AWS and Microsoft Azure platforms, including advantages and shortcomings.
In this webinar attendees will learn:
-The strengths and weaknesses of platform native tools.
-Understand the shortcomings of those tools to see where additional third-party tools are needed.
While the CIO's dilemma of optimizing the existing environment while growing new capabilities hasn't
changed, the playing field has—dramatically. New, speedy ways to develop applications and deliver them, such as with microservices, are now creating chasms where once there were gaps in your digital
effort. Enter APIs—the answer to how and where to start.
Modernizing with APIs provides a smooth modernization path for government agencies—from establishing API use, to extending legacy systems with them, to ultimately transitioning to modern
architectures with them.
Join this webinar to learn about:
• The practice of APIs in government agencies.
• How APIs extend the benefit and ROI of legacy systems.
• Reference architectural approaches to bridging old and new architectures.
• Some technologies to help you implement this approach.