Hi [[ session.user.profile.firstName ]]

Information Technology

  • Career Conversations with Kausar Kenning
    Career Conversations with Kausar Kenning
    Elena Steinke WSC Founding Board Member Live 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Kausar Kenning

    Kausar Kenning is the VP of Cybersecurity/Fraud Analytics and AI at E*Trade. Kausar has designed and leads the Insider Threat program, Metrics program, CyberFraud analytics, and the AWS Data Strategy.

    She has 14 years of experience in the data analytics space with a focus on cybersecurity and fraud. Kausar’s methodology leverages data analytics to turn data into actionable information that can be used to make meaningful business decisions. Using a risk-based approach, Kausar has enabled data-driven decisions to solve for key risks in the companies she has worked for.

    Kausar holds an M.S. in Data Analytics and has earned her PMP and CISA certifications and has a very strong skill set in analytics, data science, audit, and data management for both cybersecurity and fraud.

    She is very involved in the Atlanta CISO community and is currently serving on several different advisory boards.
  • Bosch Power Tools Enables Real-time Analytics on IoT Event Streams
    Bosch Power Tools Enables Real-time Analytics on IoT Event Streams
    Ralph Debusmann, IoT Solution Architect, Bosch Power Tools + Jeff Bean, Confluent + Igor Canadi, Rockset Recorded: Feb 27 2020 44 mins
    Bosch Power Tools, a division of The Bosch Group, is among the world’s leading providers of power tools, power tool accessories, and measuring tools. To accelerate its IoT initiatives, Bosch uses event streaming with manufacturing data from IoT sensor devices to monitor and respond to inefficiencies in the production system, changes in the supply chain, and product quality reports in the field. In this online talk, Bosch’s Ralph Debusmann outlines their architectural vision for bringing many data streams into a single platform, surrounded by databases that can power complex real-time analytics.
  • Ultimate Guide for Deploying Microsoft Office for Mac​
    Ultimate Guide for Deploying Microsoft Office for Mac​
    Paul Bowden & Katie English Recorded: Feb 27 2020 38 mins
    Microsoft Office is the global standard for productivity and collaboration, empowering countless organizations and end users. It’s no wonder IT admins prioritize supporting it across device types. Luckily, with continuous innovation and powerful new features, it’s never been easier to deploy, manage and maintain Office across all your Apple devices, ensuring seamless workflows no matter where you are.

    In our webinar, Ultimate Guide for Deploying Microsoft Office for Mac, Paul Bowden of Microsoft and Katie English of Jamf cover everything you need to know about successfully deploying and managing Microsoft Office for Mac.

    We will cover:

    - Deployment best practices for Microsoft Office for Mac
    - Recommended workflows to configure settings
    - Keeping software up-to-date with patch management
  • Global Women of IT Leadership Program
    Global Women of IT Leadership Program
    Dawn Khan Recorded: Feb 27 2020 107 mins
    Silicon Valley ITSMF is hosting a global Women if IT Webinar Series This kickoff is an online global webinar. A series of profiles, tips and topics around elevating the Women in IT Service Management. Kickoff is at the end of February, and will continue with a series of women in IT leadership programming and activities. Focus awareness and illustrating why women in leadership is simple, user experience is incomplete without a complete representation of men and women’s use of technology. The diversity of experience , use and mindset fuels innovation. Women are leading, they are just not making it to the sufficient board room levels. We can do so much leveraging the successes that exist and producing more. Kick off with profiles in excellence, tips and career resources For advancing Women in IT Leadership
  • Build and Scale Applications with Confidence using Azure Red Hat OpenShift
    Build and Scale Applications with Confidence using Azure Red Hat OpenShift
    Shawn Purtell, Principal Technical Marketing Manager, Red Hat Ahmed Sabbour, Product Marketing Manager, Microsoft Recorded: Feb 27 2020 38 mins
    Red Hat® OpenShift® Container Platform, based on Kubernetes, helps organizations develop, deploy, and manage container-based applications seamlessly across physical, virtual, and public cloud infrastructures. Combined with the power of the Microsoft Cloud via Azure, organizations can quickly move existing applications to the cloud, get new products to market, and deliver innovation to customers.

    Marketing managers from Microsoft and Red Hat will discuss both OpenShift Container Platform on Azure as well as Azure Red Hat OpenShift, a fully managed OpenShift service on Azure. Jointly engineered, operated, and supported service by Microsoft and Red Hat, Microsoft Azure Red Hat OpenShift enables you to quickly build and run your apps on a trusted enterprise Kubernetes platform. Empower developers to innovate with a consistent experience, built-in continuous integration/continuous delivery (CI/CD) pipelines, and a wide range of supported technologies and streamlined workflows.

    In this webinar we will cover how to:
    • Create fully managed Red Hat OpenShift clusters in minutes with self-service deployment.

    • Easily add or remove nodes to match resource demand.
    • Use Azure Active Directory integration allows control access to your cluster through an integrated sign-on experience.
  • Protecting Financial Services Mobile Apps Against Bad Bots
    Protecting Financial Services Mobile Apps Against Bad Bots
    Greg Maudsley, Director Product Marketing, F5 Networks | Jan Sysman, Head of Marketing, Appdome Recorded: Feb 27 2020 25 mins
    Financial Services mobile apps are highly valued targets for hackers and other malicious organizations. Gaining access to these apps provides hackers with the ability to launch attacks aimed at crippling access to financial information for individuals and enterprise organizations, as well as, stealing financial information.

    F5 and Appdome have partnered together making it easier to add Bot Protection to any Android and iOS mobile app in seconds without code or coding.

    F5’s Advanced WAF customers who add bot protection to their servers with the F5 Anti-Bot service, also need to add the F5 Anti-Bot SDK to any mobile app that wants to access information on protected servers.

    Through the partnership with Appdome, F5 makes adding the Anti-Bot SDK fast and easy.

    What You'll Learn:

    - Why bot protection is important

    - How F5 makes bot protection easy with the F5 Anti-Bot service

    - How with Appdome for F5 Anti-Bot you can add the Anti-Bot SDK to any mobile app in seconds without code or coding
  • [Podcast] Musings with Marc & Mary: Post Legalweek 2020 Wrap-Up
    [Podcast] Musings with Marc & Mary: Post Legalweek 2020 Wrap-Up
    Marc Zamsky, COO, Compliance Discovery Solutions and Mary Mack, CEO, Chief Legal Technologist, EDRM Recorded: Feb 27 2020 20 mins
    Marc and Mary muse over top Legalweek Takeaways, Highlights, what the buzz was, cool tech and more! Come and join in the discussion!
  • Migrating VDI to Google Cloud? Protect it with Backup-as-a-Service.
    Migrating VDI to Google Cloud? Protect it with Backup-as-a-Service.
    Shiva Raja, Product Marketing, HYCU; Juan Medina, Account Executive, Itopia Recorded: Feb 27 2020 32 mins
    Modernizing your on-premises VDI workloads has never been easier, especially for Google Cloud users. As one of the widest-reaching, most secure hyper-scale networks, Google Cloud is quickly becoming a de facto leader for hosting Windows virtual desktops. However, with all key enterprise workloads, a robust backup solution is essential to maintaining business continuity.

    Join itopia & HYCU for a lively discussion and learn how Desktop-as-a-Service paired with Backup-as-a-Service provides the perfect match for cost reduction and scalability your organization needs now and well into the future.

    In this webinar, you’ll learn how to orchestrate your VDI environment on Google Cloud, automate and auto-scale user provisioning with custom Windows images, and ensure your cloud environment is backed up continuously with no limitations.
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Recorded: Feb 27 2020 55 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Cloud-Native Development in a Hybrid Business World
    Cloud-Native Development in a Hybrid Business World
    Brian Gracely, Director of Product Strategy, Red Hat Recorded: Feb 27 2020 38 mins
    It's been nearly a decade since software began eating the world and developers became the new kingmakers. But app makers are still frustrated that they can't build fast enough, deploy fast enough, and not worry about other layers of the stack.

    In this keynote, we'll talk about the reasons why companies are faced with hybrid opportunities and challenges at the business level, and how this impacts app makers. We'll also highlight how Red Hat is bringing together technology, innovation and culture to help remove the friction for app makers in ways that will help them success with existing and future applications.
  • Metrics that Matter: Productivity
    Metrics that Matter: Productivity
    Jeff Rumburg, Managing Partner at MetricNet Recorded: Feb 27 2020 36 mins
    Agent salaries and benefits represent more than half of all service delivery costs. As a result, if agent utilization is high, cost will be correspondingly low. Conversely, when agent utilization is low, agent costs, and hence cost per contact or cost per ticket, will be correspondingly high.

    Just as world-class service delivery organizations are obsessive about maintaining high customer satisfaction levels, they are equally committed to keeping their costs in check. They do this primarily by maintaining tight control over agent utilization. This has the effect of minimizing cost per contact and cost per ticket. That said, extremely high agent utilization can actually increase your costs by driving agent turnover and absenteeism higher. Whenever agent utilization rates approach 60–70 percent, a service desk will experience relatively high agent turnover because they are pushing the agents too hard. Extremely high utilization leads to burnout, higher turnover, higher absenteeism, and lower morale in the service desk.

    Learn how to capture and calculate agent utilization in this new MetricNet webcast! Additionally, Jeff Rumburg will reveal why this KPI is so important, share the key drivers of agent utilization, and provide benchmarking ranges for this critical KPI.
  • Economical Storage: Data Insight, Data Movement and Storage Options
    Economical Storage: Data Insight, Data Movement and Storage Options
    StorageDNA CEO Tridib (TC) Chakravarty, Caringo Principal Solutions Architect Ryan Meek & VP Marketing Adrian J Herrera Recorded: Feb 27 2020 32 mins
    There are many ways organizations, analysts and vendors categorize storage. Once you get past the techno-babble, the lowest common denominators amongst storage methods lead to 3 categories:
    1) frequently accessed data
    2) moderately accessed data
    3) infrequently accessed data.

    In this second episode of Brews & Bytes, we will take a closer look at categories 2 and 3, which we are calling “economical” storage.

    This conversation goes beyond just talking $/GB. Our guests Tridib Chakravarty (aka TC), the CEO of Storage DNA, and Ryan Meek, Caringo’s Principal Solutions Architect, will discuss challenges organizations are facing finding economical storage, how they are determining what data can be moved to different tiers of storage, and the pros and cons of different types of economical storage options.
  • The Rise of DevSecOps
    The Rise of DevSecOps
    Michelle McLean (StackRox), Alex Peay (SaltStack), Matthew Rose (Checkmarx) & Brian Soldato, ReversingLabs Recorded: Feb 27 2020 42 mins
    As CISOs are """"moving left"""" and integrating DevSecOps technologies into the daily routine of developers, testing and securing their own code is becoming the new normal. Educating software developers into better practices is key, especially in the context of securing applications.
    Join this panel of industry experts and leaders to learn more about:
    - The evolution of DevOps and DevSecOps
    - Why security testing should be a part of the DevOps process
    - How DevOps and security teams can get along better
    - Dynamic tools to monitor applications and scan for vulnerabilities
    - The future of DevOps and security
    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Michelle McLean, Vice President of Product Marketing, StackRox
    Matthew Rose, Global Director Application Security Strategy, Checkmarx
    Brian Soldato, Director of Sales Engineering, ReversingLabs
    Alex Peay, Senior Vice President of Product, SaltStack
  • The Evolution of eForms
    The Evolution of eForms
    Luke Richardson and Ana Zelenkov Recorded: Feb 27 2020 40 mins
    As business needs are evolving, it’s important to ensure that technology is keeping up with your requirements and enabling you to achieve more.

    Watch a webinar to discover how our Nintex Forms capabilities, when coupled with our industry-leading process management and automation platform, provides our customers with the top solution to replace InfoPath and other legacy forms products.

    You will learn:

    - Why out-of-date legacy form solutions are holding businesses back
    - How organisations can optimise their workflow and form usage to transform their businesses into workplaces of the future
    - How easy it is to implement the no-code Nintex Process Platform in your business
  • Modernizing IT with Cloud and On-Premises Infrastructure
    Modernizing IT with Cloud and On-Premises Infrastructure
    Seamus Jones, Dell EMC and Angelia McFarland, Dell EMC Recorded: Feb 27 2020 24 mins
    This webinar addresses some of the key considerations IT decision makers have when moving to a hybrid IT model vs. keeping all workloads on-premises. The webinar segments will address cost, security, app availability, end-user experience, and other topics while demonstrating the continuous value of on-premises compute with PowerEdge servers + Intel when deploying emerging workloads.

    Corporate Participants:

    Seamus Jones
    Dell EMC – Senior Consultant, Server Portfolio Solutions

    Angelia McFarland
    Dell EMC PowerEdge Servers – Product Marketing Manager

    Erin Williams
    New Belgium Brewing – Senior Systems Engineer

    Travis Morrison
    New Belgium Brewing – IT Director

    Ray Matthews
    New Belgium Brewing – Automation Engineer

    Adam Little
    New Belgium Brewing – Senior Systems Administrator
  • Why Auto-Scaling Isn’t Enough
    Why Auto-Scaling Isn’t Enough
    Amir Sharif, VP of Product & Marketing & Chris Li, Senior Engineer Recorded: Feb 27 2020 20 mins
    In this webinar, Amir Sharif (VP of Product & Marketing), will be sitting down to talk to Chris Li (Senior Engineer), to discuss a common question we get from our customers, “why isn’t auto-scaling enough?” Chris and Amir will be focusing on horizontal auto-scaling for Kubernetes and will cover the following topics around this:

    - What is horizontal auto-scaling?
    - What does auto-scaling do well? And when should you be using it?
    - How is traditional auto-scaling not enough to help your company’s success?
    - What can you be doing to be even more efficient in the cloud?
  • How Bishop Lynch Cut the Risk of Ransomware & Reduced RTO & RPO to Minutes
    How Bishop Lynch Cut the Risk of Ransomware & Reduced RTO & RPO to Minutes
    Gray Huggins, Director of Technology at Bishop Lynch High School & Ankur Agarwal, Sr. Director of Product Marketing, Datrium Recorded: Feb 27 2020 48 mins
    Is ransomware one of the most significant threats to your business? You're not alone. In the State of Enterprise Data Resiliency and Disaster Recovery report, more than 70% of the surveyed IT professionals agreed.

    IT teams often rely on prevention tools and faith in their customers, partners, and employees to prevent ransomware attacks. But Bishop Lynch High School chose Datrium Disaster Recovery as a Service (DRaaS) with VMware Cloud on AWS to guarantee recovery from ransomware attacks.

    In this webinar, Ankur Agarwal, Senior Director of Product Marketing at Datrium, and Gray Huggins, Director of Technology at Bishop Lynch, will tell you how Bishop Lynch evaluated different options and decided to adopt Datrium DRaaS. You'll hear about the deployment process and how they cut their RTO and RPO from days to minutes to accelerate recovery from disaster-related outages.

    Ankur will conclude the session with an overview of DRaaS with VMware Cloud on AWS.
  • Malware in 2020: Recent Trends and What Is Coming Next
    Malware in 2020: Recent Trends and What Is Coming Next
    Arna Magnúsardóttir, Lead Analyst – Global Threat Detection, Cyren Recorded: Feb 27 2020 32 mins
    Malware authors continue to evolve distribution and coding techniques to get their software past your security. In this webinar, Arna Magûsardóttir, Cyren’s lead analyst for Global Threat Detection, will explain key malware trends from 2019 and provide analysis of representative malware techniques, as well as an outline what we might expect to see from malware developers (and what security teams should prepare for) during 2020.
  • Panel: Developers Do Security
    Panel: Developers Do Security
    Shiri Ivtsan, Senior Product Manager Recorded: Feb 27 2020 35 mins
    Amid all the talk of shifting left, mingling the DevOps and Security tribes and how can we do code better, faster and with more quality a funny thing happened. Security vendors are developing security tools for devs and DevOps. The security team still pays for them, but they won't buy them without Dev and DevOps buy in. What does this mean for 2020? Will we see better "quality (codeword for security)" in our apps? What should security teams be doing to make this happen? What should Devs and DevOps teams do to adopt these new developer-friendly tools? Is 2020 the year DevSecOps makes a difference?
  • Transforming Compliance with Artificial Intelligence
    Transforming Compliance with Artificial Intelligence
    Elliot Burgess, Head of Product, CUBE Recorded: Feb 27 2020 49 mins
    Join our live webinar to learn which elements of AI are driving value for risk and compliance? (i.e. ML, NLP, RPA). Also learn about AI in practice - how regulated financial institutions are utilizing AI today, why
    why AI is the only answer to addressing big data compliance challenges, at scale. We will also go over what happened when RegTech met SupTech – how are regulators are applying AI to ease and accelerate compliance processes.
  • SaaS ERP Solution Leverages AIOps to Improve Performance and Cost Management
    SaaS ERP Solution Leverages AIOps to Improve Performance and Cost Management
    John Gentry, CTO, Virtana & Todd Weeks, Group VP Cloud Computing, PLEX Recorded: Feb 27 2020 38 mins
    PLEX is a leader in cloud-based manufacturing ERP and MES software for a variety of industries. Their software is distributed across four data centers holding several petabytes of Hitachi and EMC storage connected via Cisco switches, serving approximately 600 customers across 2,000 facilities in more than 20 countries.

    Plex was looking for a solution that would provide real-time monitoring, data collection and analysis of hybrid infrastructure performance—including availability, throughput, response time, and resource utilization.

    In this webinar John Gentry, CTO, Virtana joins Todd Weeks of Plex to discuss the joint collaboration between the two organizations to align goals with the following:

    •Enhanced mission-critical cloud service
    •Proactive issue and challenge assessment
    •Performance-related problem resolution
    •Real-time infrastructure monitoring

    Virtana is currently deployed in all four of Plex’s data centers. As Plex grows, the company will continue to rely on Virtana solutions to improve performance and availability for their customers and integrate with interdependencies across infrastructure.
    Comcast Business Recorded: Feb 27 2020 57 mins
    Businesses requirements for bandwidth and private network solutions are exploding. Data costs are falling, making access to advanced connectivity solutions easier than ever. In fact, according to a recent Internet & Television Association report, data cost was $9.01 per Mbps in 2008 vs. $0.76 in 2018. With scalability so inexpensive, investments will undoubtedly grow. But where should the priority lie? Is it about network optimization or application optimization? Or is it both?
    Taken together, underlying dedicated and shared point-to-point, point-to-multi-point, and meshed technologies, along with the WAN technologies such as SD-WAN, IPsec VPN, and MPLS VPN, can all have a positive impact on your network and your business. They are all part of a strategic approach to optimizing the network and supporting and balancing the demands of multiple applications.
    Join us on February 27 at 1 p.m. for “Network and Application Optimization: Taking a Deeper Dive,” a webinar from Comcast Business. Our expert panelists will discuss the value of these underlying network technologies working individually and in concert.

    Participants will discover how hybrid networks:
    • Optimize resource allocation, detect and respond to service degradation and support application routing
    • Maximize always-on, real-time network monitoring
    • Handle increasing network traffic and low-latency applications
    • Spur actionable insights
    • Manage end-point traffic and application routing
    • Operate in a range of use cases, including high-availability architectures and connectivity to private and public clouds

    Our panelists:

    • Jody Hagemann, Senior Director of Product Management, ActiveCore
    Lifecycle, Comcast Business.
    • Michael Fratto, Senior Analyst, Applied Infrastructure and Dev Ops,
    451 Research.
  • Breaking the Insights Obsession with Augmented Analytics and Data Storytelling
    Breaking the Insights Obsession with Augmented Analytics and Data Storytelling
    Steve Remington, Principal Consultant and Founder, Minerra and Ivan Seow, Global Product Marketing Manager, Yellowfin Recorded: Feb 27 2020 27 mins
    The analytics profession has a problem: It is obsessed with insight creation and obsessed in doing so with the traditional dashboard. In the past, this was not a major problem because manually finding and communicating insights was a core task for analytics professionals. The analytics technology landscape is, however, rapidly changing with new augmented analytics technologies like signal detection to automate ever-increasing parts of the insight creation process, and data storytelling to provide the narrative and context to drive decision support.

    Join us on 27th February to understand how and why augmented analytics and data storytelling transform the way we consume relevant insights and make informed decisions.
  • How to Use Intelligent Site Search to Increase Conversions
    How to Use Intelligent Site Search to Increase Conversions
    Jon Rossman & Mark Floisand Recorded: Feb 27 2020 55 mins
    Your customers don’t have time to browse all over your site. They want to search for – and find – what they need quickly and easily through personalized experiences. And with site search users being up to 5 times more likely to convert, the stakes for relevant results and recommendations are higher than ever before.

    In this webinar, you will learn how Motorola Solutions is adapting its digital strategy to the changing expectations of their customers. Jon Rossman, Solutions Digital Experience Manager at Motorola will share his experience and lessons learned from creating a more relevant, unified and personalized website experience. You’ll hear practical tips to increase website traffic and conversion, and strengthen the relationships with your brand. Additionally, you will learn:

    · Motorola’s strategy and roadmap to create relevant experiences at scale
    · Simple site design and functionality changes that can have a big impact on search
    · How artificial intelligence can help you deliver the most relevant search results
    · How to leverage analytics from the search experience to evolve your web strategy
  • Breaking RPA’s Glass Ceiling - The Future of Automation
    Breaking RPA’s Glass Ceiling - The Future of Automation
    Daniel Peled, VP Global Advisories and Digital Transformation Kryon Feb 28 2020 3:00 am UTC 17 mins
    RPA is one of the most innovative global industries driving operational transformation today, delivering unprecedented levels of speed, personalization, agility and cost-efficiency. However, RPA projects are often held back by scalability issues.

    Join us to for insider's insight on:
    ● What are the reasons for this?
    ● How can it be prevented?
    ● What is the RPA revolution?
    ● How will AI impact RPA?
  • An Essential Guide to Using Credit Reference Agencies
    An Essential Guide to Using Credit Reference Agencies
    Ben Houlihan, Senior Risk Product Manager, Dun & Bradstreet Feb 28 2020 9:00 am UTC 6 mins
    This short video covers:

    - An introduction to using credit reference agencies in your credit management practices
    - The top three things to consider when assessing the risk profile of a new customer
    - Best practice in ongoing portfolio management to identify risk exposure
  • Defeat Phishing with Inbox Detection & Response
    Defeat Phishing with Inbox Detection & Response
    Pete Starr, Global Director of Sales Engineering at Cyren Feb 28 2020 10:00 am UTC 40 mins
    Phishing is evading email defences and reaching users’ inboxes. If your email security gateway later discovers a threat it has delivered, it is too late. Inbox Detection & Response (IDR), referred to in a recent paper by Gartner as Cloud Email Security Supplements is a new way of thinking about email security. It deploys directly into the inbox where it can continuously monitor emails and when a new threat is discovered it can automate response and remediation across every mailbox.
    Join security industry veteran, Pete Starr, to learn how IDR:
    • Creates an email defence-in-depth architecture to protect from evasive phishing attacks
    • Engages users at the point of risk by providing simple threat indicators and on-request scans
    • Automates response and remediation with M-SOAR, to remove the burden on your security analysts

    Want to find out more before registering? Read the IDR Vision Paper

  • Save the planet – effizienter Ressourceneinsatz mit IoT und SAP HANA
    Save the planet – effizienter Ressourceneinsatz mit IoT und SAP HANA
    Matthias Ort, Thomas Reith Feb 28 2020 10:00 am UTC 60 mins
    Fridays for Future Demonstrationen, Weltklimakonferenz, Klimawandel – sie alle zeigen uns, dass die Menschheit mehr dafür tun muss, um die Erde nicht weiter auszubeuten. Dazu gehört nicht zuletzt auch eine optimierte Beschaffung und ein effizienter Einsatz von Ressourcen in sämtlichen Produktionsprozessen. Erfahren Sie, wie Sie durch den Einsatz von Sensoren in Ihrer Produktion verschiedenste Messdaten sammeln und dank SAP HANA optimal auswerten können, um so die größtmögliche Effizienz zu erreichen. Am Beispiel des gemeinsamen Referenzkunden Gerolsteiner zeigen Ihnen unsere Experten auf, wie Sie mit der integrierten Lösung aus aktuellsten Produkten des IoT-Portfolios von Dell Technologies, der Ressourcen-Effizienz-Lösung von Intense und Ihrer SAP HANA Umgebung völlig neue Erkenntnisse über Ihre Produktionsprozesse erzielen.
    Thomas Reith von Dell Technologies und Matthias Ort von Intense werden Sie durch dieses Webinar führen und freuen sich auf Ihre Fragen!
  • Why Private Cloud and How to Build One
    Why Private Cloud and How to Build One
    Krishnan Badrinarayanan - Director, Product Marketing, Nutanix Feb 28 2020 2:00 pm UTC 23 mins
    As companies digitise at an increasing rate, IT organisations are pressured to deliver a wider range of software experiences and data services across a variety of platforms.

    Traditional infrastructure is complex and holds these teams back from moving fast, while the public cloud is not suited for all types of use cases. IT organisations need a combination of both private and public clouds, a.k.a, hybrid cloud, and the first step towards achieving this is to adopt and excel in a private cloud practice.

    Join us to understand, the critical criteria required to building a private cloud, before extending to hosted and public clouds to achieve hybrid cloud operations.

    What you’ll learn:
    • Why a private cloud must be on your IT architecture roadmap
    • The critical elements that define a private cloud
    • How a private cloud prepares your organisation for public and hybrid cloud
  • Dell EMC Midrange Primary Storage
    Dell EMC Midrange Primary Storage
    Brian Summers - Storage Field Marketing Manager, Dell EMC Feb 28 2020 5:00 pm UTC 31 mins
    We will briefly discuss the evolution of storage to understand how the industry has arrived at the modern storage solutions we see today. Then we will take a close look at Dell EMC midrange storage offerings to better understand where these products fit in the overall Dell EMC storage portfolio.

    Presented by: Brian Summers - Storage Field Marketing Manager, Dell EMC
  • Data Protector zum Wochenstart: Disaster Recovery für Windows und Linux
    Data Protector zum Wochenstart: Disaster Recovery für Windows und Linux
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Mar 2 2020 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • SD-WAN Projekte erfolgreich umsetzen
    SD-WAN Projekte erfolgreich umsetzen
    Kai Radschun, Sales Executive und Svetlana Klinkow, Channel Manager Mar 2 2020 2:00 pm UTC 60 mins
    Wir unterstützen die digitale Transformation großer Marken weltweit mit einer ganzheitlichen, sicheren, Cloud-nativen SASE-Plattform und einem 24x7-Support durch erfahrene Ingenieure. Unsere Servicequalität und operative Exzellenz führen zu höchster Kundenzufriedenheit in der Branche mit einer Kundenbindung von 98%.

    In diesem Webinar zeigen wir Ihnen auf, wie Sie Ihre SD-WAN Projekte mit Open Systems erfolgreich umsetzten. Melden Sie sich heute an und erhalten Sie wertvolle Impulse aus der Praxis anhand unserer Kundenprojekte Claas, Altana oder Gategroup.

    Weiteres in diesem Webinar
    -Auswirkungen des digitalen Wandels auf Netzwerk- und Sicherheitsarchitektur
    -Projekte identifizieren – den richtigen Kunden finden
  • Driving E-commerce Recommendations in Real-time - What's Needed
    Driving E-commerce Recommendations in Real-time - What's Needed
    Sandeep Nawathe, Head of Engineering at Adobe and Sheryl Kingstone, Analyst at 451 Research Mar 2 2020 5:00 pm UTC 53 mins
    Better e-commerce isn’t exclusive to a faster web or mobile site: it’s about delivering contextual, personalized, relevant experiences in real-time. The challenge is collecting transactional information and combining it with historic and interactional data. These sources can range from CRM, ERP, and marketing technology systems. The experiences need to be delivered in real-time from these disparate sources for any channel. At the heart of unforgettable experiences that increase customer loyalty is a real-time customer profile that aggregates every identity fragment created by an application or system. Additionally, these real-time profiles need to scale to deliver insights for the next best actions from not terabytes but petabytes of data in the Experience Era.

    In this webinar, guest presenter Sheryl Kingston, Research Vice President and General Manager for 451 Research, and Sandeep Nawathe, Senior Director of Engineering for Adobe Experience Platform, will discuss:

    - E-commerce trends from both traditional retailers moving more online and from upstarts.
    - What infrastructure requirements are to support real-time customer experience and recommendations at the edge.
    - How to take the right action at the right time across any channel.
  • Tech Tips: Host Systems Inventory and Analysis
    Tech Tips: Host Systems Inventory and Analysis
    Dorian Hugues, Product Manager and Lior Kimmel, Software Engineer, Host Connectivity, Micro Focus Mar 3 2020 9:00 am UTC 52 mins
    Attend this webinar to see how you can gain insights into how well internal policies are followed through inventory and analysis of your mainframe and host systems. These capabilities allow you to get an accurate view of software deployment and usage. You will also get a clear vision on user configurations across the organization. This information will help you plan infrastructure changes or monitor for non-standard end user configuration activity. Join us to learn more!
  • Simplifying App Access with F5 and Microsoft Azure Active Directory
    Simplifying App Access with F5 and Microsoft Azure Active Directory
    Matthieu Dierick - Solution Architect EMEA, F5 Networks Mar 3 2020 9:00 am UTC 57 mins
    You may have already moved many of your workloads and applications to the cloud. However, like most organisations, you are likely to have apps that you have yet to move to the cloud or replace with SaaS apps. Many of these may be mission-critical, legacy applications that do not support modern authentication protocols, single sign-on, or multi-factor authentication. Attend this webinar and learn how you can:

    • Simplify user access and improve security for all applications, regardless of location
    • Bridge the identity gap between cloud-based, SaaS, and on-premises applications
    • Allow legacy applications to work with Azure Active Directory

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz Mar 3 2020 9:00 am UTC 60 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

  • Comprehensive data protection for Microsoft 365 & Office 365
    Comprehensive data protection for Microsoft 365 & Office 365
    Dino Santarsiero Mar 3 2020 9:00 am UTC 48 mins
    Durante il webinar verrà descritto come Commvault protegge Office365
  • EMEA: Anatomy of a Hack: Perception vs. Reality
    EMEA: Anatomy of a Hack: Perception vs. Reality
    Chris Owen, Director of Product Management, Centrify. Mar 3 2020 10:00 am UTC 60 mins
    Join this webinar to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:

    •Enforcing MFA
    •Using host-based auditing
    •Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
  • How Adobe Document Cloud can help you achieve a paperless office
    How Adobe Document Cloud can help you achieve a paperless office
    Steve Walker, Solutions Consultant, Adobe Mar 3 2020 10:00 am UTC 24 mins
    Join us in our virtual, animated studio for this video webinar to discover how Adobe Document Cloud can help you unlock the power of digital document workflows. You’ll learn how to do the following:

    • Obtain accountability and tracking capabilities for every document
    • Give your teams the power to deliver paperless experiences to customers on any device
    • Create forms in Adobe Acrobat and Microsoft Office
    • Automate the storage of documents in Microsoft SharePoint
    • Build intelligent document workflows using Adobe Sign and Microsoft Flow
    • Ensure better security, collaboration, and organisation within your company.

    There will be live Q&A session at the end of the webinar.
  • Migration von VMware zu OpenStack
    Migration von VMware zu OpenStack
    Alyson Richens & Alice Cambridge Mar 3 2020 10:00 am UTC 60 mins
    Während des verangenen Jahrzehnts haben Unternehmen begonnen, Ihre IT Workloads zu virtualisieren und aus vorhandenen, monolithischen Systemen in Cloud-Umgebungen zu migrieren. Viele haben sich für VMware als Anbieter Ihrer virtualisieren Infrastruktur entschieden. Allerdings gelang es ihnen aufgrund der Kosten für VMware Lizenzen, Support und Beratung oft nicht, ihr primäres Ziel - deutlich niedrigere Gesamtkosten - zu erreichen. Auf der Suche nach Alternativen betrachten deshalb immer mehr Unternehmen andere Plattformen wie OpenStack genauer.

    In diesem Webinar zeigen wir Ihnen die wichtigsten Ähnlichkeiten und Unterschiede zwischen den Virtualisierungsangeboten von VMware und Charmed OpenStack. Außerdem liefern wir eine detaillierte Kostenanalyse, die die Einsparpotenziale für Unternehmen aufzeigt, die von VMware zu OpenStack migrieren.
  • Windows 7 End-of-Life: What to Do If You Can’t Upgrade Your Systems
    Windows 7 End-of-Life: What to Do If You Can’t Upgrade Your Systems
    Shahar Razon and Aviel Fogel Mar 3 2020 10:00 am UTC 45 mins
    Now that Windows 7 has reached its end-of-life date, you might be wondering if your Windows 7 PCs increase your risk of an attack. The simple answer is yes. Because Windows 7 systems will no longer receive software patches or security updates, any unsupported Windows 7 PCs in your network could become the entry point for a damaging attack.

    Unfortunately, legacy systems lurk in many corporate networks. Extended security update programs can offer a temporary—and costly—stopgap, but security leaders must consider other approaches to protect all their unsupported systems from exploits.

    Join security experts Shahar Razon and Aviel Fogel as they discuss:

    -The top risks for Windows 7 systems
    -Why older operating systems are inherently less secure
    -Strategies to secure legacy systems from exploits and malware
  • Delivering Security, Resilience and Performance in an Agile Cloud World
    Delivering Security, Resilience and Performance in an Agile Cloud World
    Sherelle Farrington, Cloud Security Solutions Architect, Fortinet, and Joeri Van Hoof, Consulting Systems Engineer, Fortinet Mar 3 2020 10:00 am UTC 60 mins
    As you’re embracing cloud to support your organization’s digital strategy, adapting security to an agile, software-defined world is critical to success.

    Join our cloud security experts to decrypt the hype, understand the realities, and set yourself up for success on this cloud journey.

    We’ll walk you through:

    - What’s built-in, what’s covered, what’s not
    - Designing for traditional and microservice architectures, such as containers and Kubernetes
    - Real-world architectures in AWS and Azure
    - What SD-WAN has to do with cloud
    - Automating cloud security, with templates, cloud tools and Infrastructure-as-Code
    - Proactively managing cloud risk and simplifying compliance

    Fortinet is a leader in dynamic cloud security, offering solutions engineered to deliver effective, automated and scalable cloud security.
  • Data at Work - Skills, Part 2
    Data at Work - Skills, Part 2
    Graeme McDermott, Caroline Carruthers and Mark Stubbs Mar 3 2020 10:00 am UTC 24 mins
    Data at Work - Skills, Part 2: Siloed Pockets of Data Expertise. Unearthing Them, Unpacking Them, and Unleashing Their Potential

    In part 2 of our Podcast focusing on Data Skills, our panel of experts discuss how data ops processes are vital to accelerating the provision of data for use by different teams - e.g. Finance or HR, vs traditional environments. Why it's vital to separate the confluence of data and technology. Also covered is how, as well as diversifying in terms of skills, data teams are becoming increasingly diverse in terms of personality and expertise, and why that is important to problem solving. Please note - we recommend that you listen to part 1, before listening to this episode.

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • Making the Switch: A Customer’s Journey to Commvault Data Protection
    Making the Switch: A Customer’s Journey to Commvault Data Protection
    Mike Morgan, Insight and Phil Wandrei, Commvault Mar 3 2020 11:00 am UTC 51 mins
    A Fortune 500 retailer had reached their breaking point with too many data protection products. With three primary, disparate products and several secondary products, their staff and environment were being stretched and service levels were difficult to meet across applications and geographies.

    A change was needed to address:

    - Increased licensing costs and software licensing audits
    - Decreased visibility and reporting across their environment
    - Administration and management complexity and time-consuming tasks
    - Join this webinar to learn how this global retailer with the guidance of Insight went through an evaluation to determine how best to consolidate and streamline their data protection environment by switching to a single platform
  • The evolution and future of supply chain attacks
    The evolution and future of supply chain attacks
    Alexander Liskin, Boris Larin, security researchers at Kaspersky Lab Mar 3 2020 12:00 pm UTC 68 mins
    Kaspersky security researchers will present an overview of the current state of supply chain attacks using technical analysis from the most significant cases, as well as outlining future attack forecasts.

    The webinar will cover the following areas:

    •How to recognize supply chain attacks
    •An overview and technical details of the most prevalent supply chain attack cases:
    -ShadowPad: carried out via popular server management software
    -CCleaner infection: backdoor attack affecting millions of users
    -Operation ShadowHammer: hijacking software updates of a tech giant
    •Supply chain attack techniques from the point of view of security professionals and cybercriminals
    •A history of other significant attack cases
    •The future of supply chain attacks and defence forecasts
  • Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense
    Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint Mar 3 2020 1:00 pm UTC 60 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).

    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Cyber Front Lines Report: Incident Response Insights That Matter for 2020
    Cyber Front Lines Report: Incident Response Insights That Matter for 2020
    Stuart Davis, Director of Incident Response Services, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Mar 3 2020 1:00 pm UTC 60 mins
    The year 2019 ushered in a host of new adversaries, new attack methods and new challenges for the cybersecurity industry. The CrowdStrike® Services team faced these trials head-on, across geographical regions and within public companies, private industries and governmental entities spanning a variety of digital mediums.

    This webcast, drawn from real-life engagements and presented by the experts who investigated them, focuses on the themes and trends observed in the global incidents the Services team responded to and remediated throughout 2019 and what they mean for 2020.

    Join this webcast to learn the following:
    •How business disruption emerged as a main attack objective
    •Why third-party compromises served as a force multiplier for attacks and attackers
    •Why macOS machines are now clearly in the cross-hairs of adversaries
    •Recommendations based on CrowdStrike Services investigations that can help you increase your organisation’s cyber defences
  • How Does Automated Pentesting Fit into a CISO's Strategy?
    How Does Automated Pentesting Fit into a CISO's Strategy?
    Karl Mattson, former CISO, City National Bank Mar 3 2020 1:30 pm UTC
    Karl Mattson, former CISO, City National Bank explains how continuous security through Automated Pentesting fits into a CISO's strategy. Join us for the full interview March 17th!
  • How Nutanix IT Uses Software-Defined Storage for Simplicity and Flexibility
    How Nutanix IT Uses Software-Defined Storage for Simplicity and Flexibility
    Devon Helms, Snr. Product Marketing Manager - Nutanix | David Ta, Director of IT Systems Engineering – Nutanix Mar 3 2020 2:00 pm UTC 34 mins
    Nutanix doesn’t just develop next-generation storage solutions for its customers; we actively use them in our internal system. Ready to achieve the same level of success? Join this webinar to learn how software-defined file and object storage are the key to supporting datacenter-wide simplicity and flexibility.

    You’ll discover best practices and get up-to-date on the technology that enables success in an ever-growing datacenter. The key takeaway? You’ll learn how to merge Nutanix storage services with other innovative solutions to help you achieve your unique business objectives.

    In this webinar you will learn:

    • The ongoing role that different kinds of storage play in your company’s success
    • How a hyperconverged foundation brings storage flexibility to your organisation
    • How different kinds of file services enable different kinds of workloads