As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Hundreds of customers are running millions of virtual desktops on XtremIO today. The new XtremIO X2 platform offers opportunities to start with even smaller configurations and scale more granularly. In this session, we will present a holistic overview of an XtremIO X2-enabled VMware VDI environment. You will also learn about XtremIO X2 sizing and best practices for VMware VDI deployments.
For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.
Attendees will learn:
* A definition of exclusion risk with real-world examples
* Challenges encountered with managing exclusion risk
* Strategies for implementing a consistent, repeatable review process
* Technology's role in streamlining exclusion risk management
Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
Once again, our newest Hub release is packed with features requested by you – our customer! Lead Product Managers for Hub, Hal Hearst and Jeff Michael, will share all the new features. We will dive into:
-Bulk snippet confirmation
-BoM hierarchy tree display
-BoM policy violation comments
-Cross-project BoM difference comparison
-Ability to map Hub projects to external application IDs
Based on IIA's new and updated research on organizing analytics teams, Research Advisor Bob Morison will review the objectives and variables of organizational structure and share examples of how enterprises are adjusting their structures to deploy and develop analysts effectively, incorporate new methods and technologies, address strategic business opportunities, and leverage the analytics ecosystem.
Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.
In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
Is your team stretched too thin? You aren’t alone. 67% of organizations admit that finding qualified cybersecurity professionals is a struggle. At the same time, attacks are escalating at an alarming rate. In 2017, the number of ransomware attacks increased by 30x and the number of breaches increased by 40%.
Join us for a live webinar with Brian Gladstein, Security Market Strategist, Carbon Black, who will share how next-generation endpoint security in the cloud can improve your protection and simplify your operations.
- Learn how cloud-based security platforms are solving 10 common problems IT and security professionals are facing
- Get your questions answered about replacing traditional antivirus with a cloud-based security
- Discover how Cb Defense can help you prevent non-malware attacks and simplify your stack
Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
This webinar will focus on the issues surrounding the “Total Installed Cost” (TIC) of Backbone/Riser fiber cabling. We will explore the contributing factors to variability of TIC, focusing on field termination skill and the impact of permanent link testing on the individual connector PASS/FAIL decision making process (via a mathematical model).
We will also review the development of new tools and novel methods to mitigate errors that estimate Insertion Loss (IL) in field terminated connectors, including new “expert system” technology deployed to test connector IL during the termination sequence.
The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.
This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:
• How phishing and impersonation attacks are evolving.
• How online/email scams develop.
• What the future of impersonation is.
• What has the best chance of winning against these attacks.
• What techniques are used to detect and stop phishing and impersonation attacks.
Attendees will receive the new FireEye report Changes in Email Attack
Tactics: Based on Data from July to December of 2017.
2. How to plan your influencer target profile to decide which influencers to work with
3. How to build an Equal Value Partnership with the influencer so that both sides benefit from engaging with each other
4. How to communicate with influencers in planning a collaboration
We are very lucky to be joined by top Cloud & Social Selling influencer Ian Moyse who is the Sales / Channel Director for Natterbox Limited. Ian was recently awarded Sales Director of the Year (Institute of Sales Management). He is a board member of the Cloud Industry Forum & FAST and a LinkedIn Top 10 Tech Power Profile.
Ian was also identified as the #1 Social Influencer on cloud in 2017, 2016 & 2015 by Onalytica
For companies to realize the full potential of IoT enablement, they need to combine IoT with rapidly-advancing Artificial Intelligence technologies, which enable ‘smart machines’ to simulate intelligent behavior and make well-informed decisions with little or no human intervention.
Join this webcast to learn and discuss the best practices and trends coming for AI in IoT.
About the speaker:
Ahmed Banafa has extensive experience in research, operations and management, with focus on IoT, Blockchain and AI. He is a reviewer and a technical contributor for the publication of several technical books. He served as a faculty at well-known universities and colleges, including the University of California, Berkeley; California State University-East Bay; San Jose State University; and University of Massachusetts. He is the recipient of several awards, including Distinguished Tenured Staff Award of 2013, Instructor of the year for 2013, 2014, and Certificate of Honor from the City and County of San Francisco. He was named as number one tech voice to follow by LinkedIn in 2016, his researches featured in many reputable sites and magazines including Forbes, IEEE and MIT Technology Review, and Interviewed by ABC, CBS, NBC and Fox TV and Radio stations.
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
•Contextual and secure access to applications
•Website and application protection from internal and external threats
•Application and network visibility and intelligent analytics
•Flexibility and performance
Defining Process & Metrics to Demonstrate Policy awareness and adherence.
Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.
Attendees will specifically learn how to:
•Write policies that are clearly understood
•Develop a policy communication and awareness plan
•Demonstrate understanding of policies by individuals
•Enforce policy compliance/adherence
•Measure and monitor effectiveness of policies
Understanding how your IT infrastructure is performing is easy with the right data and analytics.
In this webinar, learn how Barclays use Tableau to visually analyse, report, and monitor their global IT infrastructure data in a few powerful dashboards.
John Hardman - VP of IT Infrastructure at Barclays, will reveal how Barclays escaped Excel reports by using Tableau to integrate all of their IT data from servers, applications, software products, and devices. This has enabled Barclays to identify issues in real-time, and helped them understand their IT infrastructure performance at a global, regional, and business-unit level.
Watch this webinar to learn how Barclays...
*Produce real-time IT infrastructure reports
*Combine all of their data to create one version of the truth
*Visually analyse their data to identify new insights
*Build dashboards that monitor their global IT infrastructure
*Built an analytics culture where management interact with Tableau dashboards
Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.
La messagerie fait partie des services déployés en priorité.
Les clients Office365 sont confrontés à deux soucis majeurs :
1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,
2 Conserver une continuité de service lorsqu’Office 365 est indisponible.
Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :
-Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
-Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
-Donner une visibilité en temps réel des attaques
-Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
With 3rd Platform technologies, hospitals are entering an era when operations, processes, and technology are tightly linked to patients and other providers. Hospital boundaries blur, thereby triggering collaboration between sectors to enable a true integrated and personalized care service delivery model. Hospital managers (CEO, CIO, CMO) are challenged to move their enterprises to the next level — that of digital business transformation — implementing digital solutions, new business models, and innovation initiatives.
But how is it done in real life? The Region of Southern Denmark has an enterprise wide adopted solution that include hospitals, GPs, Municipalities and regional authorities and they are happy to share their knowledge, experience and good ideas with you! During the webinar, the presenters will discuss and analyses:
•What are the steps to be taken to effectively design, acquire and implement a digital collaboration and data integration platform in healthcare?
•What are the challenges you may face in an integrated care and tele medicine project?
•What are the effect and clinical outcomes when data sharing is a reality and not just a vision?
Chris is responsible for technology at reed.co.uk, the UK's largest job board. In this week's podcast he talks about the challenges of being asked to make a business move quicker, why he took this role and the importance of purpose to him, as well as innovation in the sector.
Also on this week's show, two articles. One on being a startup working with enterprise, and one on IBM's Watson AI.
The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.
One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.
Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.
That leads to several questions about FCoE, iSCSI and iSER:
•If we can run various network storage protocols over Ethernet, what
•What are the advantages and disadvantages of FCoE, iSCSI and iSER?
•How are they structured?
•What software and hardware do they require?
•How are they implemented, configured and managed?
•Do they perform differently?
•What do you need to do to take advantage of them in the data center?
•What are the best use cases for each?
Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.
In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.
- What social enhancements are available in the latest release of Sitefinity
- Some useful ideas to increase the social savviness of your website
- How to integrate a social platform into Sitefinty using OAuth
Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
We get recommendations everyday: Facebook recommends people we should connect with; Amazon recommends products we should buy; and Google Maps recommends routes to take. What all these recommendation systems have in common are data science and modern software development.
Recommendation systems are also valuable for companies in industries as diverse as retail, telecommunications, and energy. In a recent engagement, for example, Pivotal data scientists and developers worked with a large energy company to build a machine learning-based product recommendation system to deliver intelligent and targeted product recommendations to customers to increase revenue.
In this webinar, Pivotal data scientist Ambarish Joshi will take you step-by-step through the engagement, explaining how he and his Pivotal colleagues worked with the customer to collect and analyze data, develop predictive models, and operationalize the resulting insights and surface them via APIs to customer-facing applications. In addition, you will learn how to:
- Apply agile practices to data science and analytics.
- Use test-driven development for feature engineering, model scoring, and validating scripts.
- Automate data science pipelines using pyspark scripts to generate recommendations.
- Apply a microservices-based architecture to integrate product recommendations into mobile applications and call center systems.
These and other trending vulnerabilities from our Quarterly Threat Report. Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty.
Join our fourth installment of in-depth threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting System-on-Chip (SoC) devices, fileless malware and -cha-ching! - the mining of digital currency.
For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.
Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.
In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.
In this webinar, we’ll discuss:
-How Amazon EKS makes it easy to run Kubernetes on AWS
-How to leverage additional AWS services with EKS
-Optimizing costs on EKS
-Demo on how to setup your cluster to run on Amazon EKS
-Customer success story
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Making sure everything in the data center is properly protected is a common struggle that all data centers face. The cloud, cloud backup, seems like an answer to all those struggles. But, how exactly does IT make the conversion from on-premises backup to cloud backup? Join experts from Storage Switzerland, Veeam and KeepItSafe and learn; a method to determine if cloud backup is right for your organization and if it is, how to create a plan to begin the transfer to cloud based data protection operations.
You know 81% of hacking-related breaches involve stolen or weak credentials (Verizon Data Breach Investigation Report, Verizon, 2017). You know your users are targeted by more phishing attacks than ever before. You even know Multi-Factor Authentication (MFA) is your best weapon in defending against cybercrime.
But how do you wrap your head around an MFA project at enterprise scale? What product capabilities are essential? And how do you cut down on the time it takes to scope, deploy, and operationalize a solution?
Join Jeffrey Broberg, Sr. Director of Mobile Product Management at OneLogin and Michael Gleason, Sr. Manager, Product Marketing at OneLogin for a webinar where you will learn:
- Why a successful MFA deployment represents the ultimate effort-to-impact security project
- Why choosing an Identity Provider with built-in MFA functionality is the ultimate IT + Security twofer
- How to smash the security vs. productivity paradigm with dynamic authentication
- How to deploy and operationalize in hours or day instead of months by deploying MFA in front of your Single Sign-On (SSO) solution
As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.
You will learn about:
• How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
• What are the key considerations before creating an AI/ML-centric storage infrastructure
• How Vexata's new VX-OS version 3.5 release addresses these challenges
Providence Health Plan has grown organically over the last 30+ years. With the adoption of the Affordable Care Act as well as growth in other lines of business, the organization was at a crossroad. As new applications and vendors were introduced into the ecosystem to respond to the business’s need, system complexity had increased substantially. The result was a data management challenge that would limit ongoing business success if it remained unsolved.
Join Jaydeep Ghosh, Director of Data Services at Providence Health Plan, and Monica Mullen, Principal Solutions Marketing Manager at Informatica, as they discuss the enterprise data roadmap that the organization put together to address the current state, position the health plan for future growth, and address these top challenges:
• Time to business value
• Multiple, but incomplete, versions of the truth
• Overall lack of trust in data
The nature of enterprise data is rapidly changing and existing storage infrastructures can’t keep up. Network Attached Storage (NAS) devices were designed for performance and single-site collaboration but file creation and access is different now. Many turn to the cloud to offload data, however, for rapidly scaling data sets, daily transfer rates and bandwidth constraints are an issue. In addition, some sensitive information can’t leave your data center. Komprise and Caringo have partnered to solve these issues by pairing intelligent data management technology with hassle-free, limitless storage.
Attend this webinar to learn how you can slash TCO for rapidly scaling data sets by identifying data to move from NAS. Then securely transferring it based on value to Caringo Swarm scale-out object storage were it is protected without backups and instantly and securely available internally or externally.
Financial services have always done identity management. It began as the teller or manager knowing each customer. Next came signature matching, passbooks, and – if you had a lock box in a vault – a key. These systems were inflexible and inconvenient on purpose. With the advent of the computer age, these organizations simply adopted the digital analogs of these physical systems: PINs and passwords. These increased flexibility – a customer or employee could access an account at any time from practically anywhere – but sacrificed security for the sake of convenience. To be secure, PINs and passwords need to be long, complex, and changed regularly: Three things customers have no interest in.
Today, identity management is undergoing a revolutionary change as biometrics allow companies to combine the convenience people want with the security that both people and organizations need. Learn how three financial services companies from across the world, a private investment firm, a prominent Swiss bank, and a major trading organization, have deployed a biometric authentication platform as part of their identity and access management strategy. Veridium’s Chief Product Officer, John Spencer, will explore the key factors that make up a secure biometric authentication platform, and Global Head of Sales Engineering, Ross Penny, will discuss the details of deploying within different environments.
In this webinar we’ll discuss:
• Using enterprise-ready solutions to replace passwords with multi-factor biometric authentication – including 4 Fingers TouchlessID, face recognition, and touch recognition – for employee and customer access.
• Maintaining a highly secure-yet-convenient user experience across any channel: ATM, app, and personal computer.
• Providing users with fast, easy, and seamless enrollment and verification.
In today’s world, undisrupted network connectivity is critical to ensuring business continuity. As the adoption of virtual instances and cloud migration accelerates, dependence on high quality, high speed, high bandwidth connections becomes a necessity. Outages have far reaching implications and can be detrimental to a business as the networks of yesterday are ill-prepared for the business of today and the future. SD-WAN is changing this scenario. In this webinar, Myron Steves discusses how its implementation of SD-WAN transformed their entire network and prepares them for future growth.
Rick Rader, IT Director with Myron F Steves
Scott Turner, Director of Sales with Meriplex Communications
David Turner, Principal Technologist with Meriplex Communications
Rosa Lear, Senior Marketing Manager with VeloCloud now part of VMware
The NIST Cybersecurity Framework (CSF) is the chosen path for thousands of organizations. Why? Because resilience is their most critical need in the face of changing threats, ever-present vulnerabilities, and a sprawling attack surface. NIST CSF provides a blueprint for cyber resilience. But turning theory into reality can be a challenge.
In this webinar, you’ll drop in on a conversation between our featured guest, Forrester’s Renee Murphy, Principal Analyst for Security and Risk; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the clear and tangible steps at work within leading organizations pursuing NIST CSF.
You will gather insights and avoid the pitfalls with your rollout of NIST CSF, including how to:
1- Identify endpoint devices: on and off network
2- Validate configurations for optimal data protection
3- Detect compliance drift within your endpoint population
4- Respond to endpoint security incidents
5- Recover from security incidents and iterate for continuous compliance
- Renee Murphy | Principal Analyst for Security and Risk Professionals | Forrester
- Josh Mayfield | Director of Solutions | Absolute
The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:
In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.
Implementing a digital identity strategy can be complicated. Let CA help.
Our presenter, Oriah Longanecker, has over 20 years of experience as an intelligence and cyber warfare officer in the U.S. Air Force! He's lead a variety of intelligence and cyber warfare units for the National Security Agency and other Intelligence Community organizations, as well as U.S. Cyber Command, and currently leads the cybersecurity and threat intelligence efforts for our partner SkOUT Secure Intelligence in the western U.S.
Data breaches have gained attention with the increasing use of digital files and companies and users large reliance on digital data and electronic record keeping.
Fact: only a quarter of organizations are focusing on a digital transformation strategy even though more than 85% of CEOs believe technology will transform their business more than any other global trend.
Join Rajesh Thukral, Director of Digital Business Transformation for our latest webinar as he explores the digital imperative – why every business needs to think “digital” and embrace new ways of working with their customers and employees – or risk being disrupted.
Digital technologies are defining and disrupting how we think and do business.
Come away with industry insights and tools that will let you assess your company’s digital mindset and help chart your own transformation journey.