As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Elena Steinke WSC Founding Board MemberLive60 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Host: Elena Steinke, WSC Founding Board Member
Guest: Kausar Kenning
Kausar Kenning is the VP of Cybersecurity/Fraud Analytics and AI at E*Trade. Kausar has designed and leads the Insider Threat program, Metrics program, CyberFraud analytics, and the AWS Data Strategy.
She has 14 years of experience in the data analytics space with a focus on cybersecurity and fraud. Kausar’s methodology leverages data analytics to turn data into actionable information that can be used to make meaningful business decisions. Using a risk-based approach, Kausar has enabled data-driven decisions to solve for key risks in the companies she has worked for.
Kausar holds an M.S. in Data Analytics and has earned her PMP and CISA certifications and has a very strong skill set in analytics, data science, audit, and data management for both cybersecurity and fraud.
She is very involved in the Atlanta CISO community and is currently serving on several different advisory boards.
Ralph Debusmann, IoT Solution Architect, Bosch Power Tools + Jeff Bean, Confluent + Igor Canadi, RocksetRecorded: Feb 27 202044 mins
Bosch Power Tools, a division of The Bosch Group, is among the world’s leading providers of power tools, power tool accessories, and measuring tools. To accelerate its IoT initiatives, Bosch uses event streaming with manufacturing data from IoT sensor devices to monitor and respond to inefficiencies in the production system, changes in the supply chain, and product quality reports in the field. In this online talk, Bosch’s Ralph Debusmann outlines their architectural vision for bringing many data streams into a single platform, surrounded by databases that can power complex real-time analytics.
Paul Bowden & Katie EnglishRecorded: Feb 27 202038 mins
Microsoft Office is the global standard for productivity and collaboration, empowering countless organizations and end users. It’s no wonder IT admins prioritize supporting it across device types. Luckily, with continuous innovation and powerful new features, it’s never been easier to deploy, manage and maintain Office across all your Apple devices, ensuring seamless workflows no matter where you are.
In our webinar, Ultimate Guide for Deploying Microsoft Office for Mac, Paul Bowden of Microsoft and Katie English of Jamf cover everything you need to know about successfully deploying and managing Microsoft Office for Mac.
We will cover:
- Deployment best practices for Microsoft Office for Mac
- Recommended workflows to configure settings
- Keeping software up-to-date with patch management
Silicon Valley ITSMF is hosting a global Women if IT Webinar Series This kickoff is an online global webinar. A series of profiles, tips and topics around elevating the Women in IT Service Management. Kickoff is at the end of February, and will continue with a series of women in IT leadership programming and activities. Focus awareness and illustrating why women in leadership is simple, user experience is incomplete without a complete representation of men and women’s use of technology. The diversity of experience , use and mindset fuels innovation. Women are leading, they are just not making it to the sufficient board room levels. We can do so much leveraging the successes that exist and producing more. Kick off with profiles in excellence, tips and career resources For advancing Women in IT Leadership
Shawn Purtell, Principal Technical Marketing Manager, Red Hat Ahmed Sabbour, Product Marketing Manager, MicrosoftRecorded: Feb 27 202038 mins
Red Hat® OpenShift® Container Platform, based on Kubernetes, helps organizations develop, deploy, and manage container-based applications seamlessly across physical, virtual, and public cloud infrastructures. Combined with the power of the Microsoft Cloud via Azure, organizations can quickly move existing applications to the cloud, get new products to market, and deliver innovation to customers.
Marketing managers from Microsoft and Red Hat will discuss both OpenShift Container Platform on Azure as well as Azure Red Hat OpenShift, a fully managed OpenShift service on Azure. Jointly engineered, operated, and supported service by Microsoft and Red Hat, Microsoft Azure Red Hat OpenShift enables you to quickly build and run your apps on a trusted enterprise Kubernetes platform. Empower developers to innovate with a consistent experience, built-in continuous integration/continuous delivery (CI/CD) pipelines, and a wide range of supported technologies and streamlined workflows.
In this webinar we will cover how to:
• Create fully managed Red Hat OpenShift clusters in minutes with self-service deployment.
• Easily add or remove nodes to match resource demand.
• Use Azure Active Directory integration allows control access to your cluster through an integrated sign-on experience.
Greg Maudsley, Director Product Marketing, F5 Networks | Jan Sysman, Head of Marketing, AppdomeRecorded: Feb 27 202025 mins
Financial Services mobile apps are highly valued targets for hackers and other malicious organizations. Gaining access to these apps provides hackers with the ability to launch attacks aimed at crippling access to financial information for individuals and enterprise organizations, as well as, stealing financial information.
F5 and Appdome have partnered together making it easier to add Bot Protection to any Android and iOS mobile app in seconds without code or coding.
F5’s Advanced WAF customers who add bot protection to their servers with the F5 Anti-Bot service, also need to add the F5 Anti-Bot SDK to any mobile app that wants to access information on protected servers.
Through the partnership with Appdome, F5 makes adding the Anti-Bot SDK fast and easy.
What You'll Learn:
- Why bot protection is important
- How F5 makes bot protection easy with the F5 Anti-Bot service
- How with Appdome for F5 Anti-Bot you can add the Anti-Bot SDK to any mobile app in seconds without code or coding
Shiva Raja, Product Marketing, HYCU; Juan Medina, Account Executive, ItopiaRecorded: Feb 27 202032 mins
Modernizing your on-premises VDI workloads has never been easier, especially for Google Cloud users. As one of the widest-reaching, most secure hyper-scale networks, Google Cloud is quickly becoming a de facto leader for hosting Windows virtual desktops. However, with all key enterprise workloads, a robust backup solution is essential to maintaining business continuity.
Join itopia & HYCU for a lively discussion and learn how Desktop-as-a-Service paired with Backup-as-a-Service provides the perfect match for cost reduction and scalability your organization needs now and well into the future.
In this webinar, you’ll learn how to orchestrate your VDI environment on Google Cloud, automate and auto-scale user provisioning with custom Windows images, and ensure your cloud environment is backed up continuously with no limitations.
Arno Candel, CTO at H2O.aiRecorded: Feb 27 202055 mins
H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.
Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.
Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
Brian Gracely, Director of Product Strategy, Red HatRecorded: Feb 27 202038 mins
It's been nearly a decade since software began eating the world and developers became the new kingmakers. But app makers are still frustrated that they can't build fast enough, deploy fast enough, and not worry about other layers of the stack.
In this keynote, we'll talk about the reasons why companies are faced with hybrid opportunities and challenges at the business level, and how this impacts app makers. We'll also highlight how Red Hat is bringing together technology, innovation and culture to help remove the friction for app makers in ways that will help them success with existing and future applications.
Jeff Rumburg, Managing Partner at MetricNetRecorded: Feb 27 202036 mins
Agent salaries and benefits represent more than half of all service delivery costs. As a result, if agent utilization is high, cost will be correspondingly low. Conversely, when agent utilization is low, agent costs, and hence cost per contact or cost per ticket, will be correspondingly high.
Just as world-class service delivery organizations are obsessive about maintaining high customer satisfaction levels, they are equally committed to keeping their costs in check. They do this primarily by maintaining tight control over agent utilization. This has the effect of minimizing cost per contact and cost per ticket. That said, extremely high agent utilization can actually increase your costs by driving agent turnover and absenteeism higher. Whenever agent utilization rates approach 60–70 percent, a service desk will experience relatively high agent turnover because they are pushing the agents too hard. Extremely high utilization leads to burnout, higher turnover, higher absenteeism, and lower morale in the service desk.
Learn how to capture and calculate agent utilization in this new MetricNet webcast! Additionally, Jeff Rumburg will reveal why this KPI is so important, share the key drivers of agent utilization, and provide benchmarking ranges for this critical KPI.
StorageDNA CEO Tridib (TC) Chakravarty, Caringo Principal Solutions Architect Ryan Meek & VP Marketing Adrian J HerreraRecorded: Feb 27 202032 mins
There are many ways organizations, analysts and vendors categorize storage. Once you get past the techno-babble, the lowest common denominators amongst storage methods lead to 3 categories:
1) frequently accessed data
2) moderately accessed data
3) infrequently accessed data.
In this second episode of Brews & Bytes, we will take a closer look at categories 2 and 3, which we are calling “economical” storage.
This conversation goes beyond just talking $/GB. Our guests Tridib Chakravarty (aka TC), the CEO of Storage DNA, and Ryan Meek, Caringo’s Principal Solutions Architect, will discuss challenges organizations are facing finding economical storage, how they are determining what data can be moved to different tiers of storage, and the pros and cons of different types of economical storage options.
Michelle McLean (StackRox), Alex Peay (SaltStack), Matthew Rose (Checkmarx) & Brian Soldato, ReversingLabsRecorded: Feb 27 202042 mins
As CISOs are """"moving left"""" and integrating DevSecOps technologies into the daily routine of developers, testing and securing their own code is becoming the new normal. Educating software developers into better practices is key, especially in the context of securing applications.
Join this panel of industry experts and leaders to learn more about:
- The evolution of DevOps and DevSecOps
- Why security testing should be a part of the DevOps process
- How DevOps and security teams can get along better
- Dynamic tools to monitor applications and scan for vulnerabilities
- The future of DevOps and security
This panel will be broadcast LIVE during RSA Conference in San Francisco.
Michelle McLean, Vice President of Product Marketing, StackRox
Matthew Rose, Global Director Application Security Strategy, Checkmarx
Brian Soldato, Director of Sales Engineering, ReversingLabs
Alex Peay, Senior Vice President of Product, SaltStack
Luke Richardson and Ana ZelenkovRecorded: Feb 27 202040 mins
As business needs are evolving, it’s important to ensure that technology is keeping up with your requirements and enabling you to achieve more.
Watch a webinar to discover how our Nintex Forms capabilities, when coupled with our industry-leading process management and automation platform, provides our customers with the top solution to replace InfoPath and other legacy forms products.
You will learn:
- Why out-of-date legacy form solutions are holding businesses back
- How organisations can optimise their workflow and form usage to transform their businesses into workplaces of the future
- How easy it is to implement the no-code Nintex Process Platform in your business
Seamus Jones, Dell EMC and Angelia McFarland, Dell EMCRecorded: Feb 27 202024 mins
This webinar addresses some of the key considerations IT decision makers have when moving to a hybrid IT model vs. keeping all workloads on-premises. The webinar segments will address cost, security, app availability, end-user experience, and other topics while demonstrating the continuous value of on-premises compute with PowerEdge servers + Intel when deploying emerging workloads.
Dell EMC – Senior Consultant, Server Portfolio Solutions
Amir Sharif, VP of Product & Marketing & Chris Li, Senior EngineerRecorded: Feb 27 202020 mins
In this webinar, Amir Sharif (VP of Product & Marketing), will be sitting down to talk to Chris Li (Senior Engineer), to discuss a common question we get from our customers, “why isn’t auto-scaling enough?” Chris and Amir will be focusing on horizontal auto-scaling for Kubernetes and will cover the following topics around this:
- What is horizontal auto-scaling?
- What does auto-scaling do well? And when should you be using it?
- How is traditional auto-scaling not enough to help your company’s success?
- What can you be doing to be even more efficient in the cloud?
Gray Huggins, Director of Technology at Bishop Lynch High School & Ankur Agarwal, Sr. Director of Product Marketing, DatriumRecorded: Feb 27 202048 mins
Is ransomware one of the most significant threats to your business? You're not alone. In the State of Enterprise Data Resiliency and Disaster Recovery report, more than 70% of the surveyed IT professionals agreed.
IT teams often rely on prevention tools and faith in their customers, partners, and employees to prevent ransomware attacks. But Bishop Lynch High School chose Datrium Disaster Recovery as a Service (DRaaS) with VMware Cloud on AWS to guarantee recovery from ransomware attacks.
In this webinar, Ankur Agarwal, Senior Director of Product Marketing at Datrium, and Gray Huggins, Director of Technology at Bishop Lynch, will tell you how Bishop Lynch evaluated different options and decided to adopt Datrium DRaaS. You'll hear about the deployment process and how they cut their RTO and RPO from days to minutes to accelerate recovery from disaster-related outages.
Ankur will conclude the session with an overview of DRaaS with VMware Cloud on AWS.
Arna Magnúsardóttir, Lead Analyst – Global Threat Detection, CyrenRecorded: Feb 27 202032 mins
Malware authors continue to evolve distribution and coding techniques to get their software past your security. In this webinar, Arna Magûsardóttir, Cyren’s lead analyst for Global Threat Detection, will explain key malware trends from 2019 and provide analysis of representative malware techniques, as well as an outline what we might expect to see from malware developers (and what security teams should prepare for) during 2020.
Shiri Ivtsan, Senior Product ManagerRecorded: Feb 27 202035 mins
Amid all the talk of shifting left, mingling the DevOps and Security tribes and how can we do code better, faster and with more quality a funny thing happened. Security vendors are developing security tools for devs and DevOps. The security team still pays for them, but they won't buy them without Dev and DevOps buy in. What does this mean for 2020? Will we see better "quality (codeword for security)" in our apps? What should security teams be doing to make this happen? What should Devs and DevOps teams do to adopt these new developer-friendly tools? Is 2020 the year DevSecOps makes a difference?
Elliot Burgess, Head of Product, CUBERecorded: Feb 27 202049 mins
Join our live webinar to learn which elements of AI are driving value for risk and compliance? (i.e. ML, NLP, RPA). Also learn about AI in practice - how regulated financial institutions are utilizing AI today, why
why AI is the only answer to addressing big data compliance challenges, at scale. We will also go over what happened when RegTech met SupTech – how are regulators are applying AI to ease and accelerate compliance processes.
John Gentry, CTO, Virtana & Todd Weeks, Group VP Cloud Computing, PLEXRecorded: Feb 27 202038 mins
PLEX is a leader in cloud-based manufacturing ERP and MES software for a variety of industries. Their software is distributed across four data centers holding several petabytes of Hitachi and EMC storage connected via Cisco switches, serving approximately 600 customers across 2,000 facilities in more than 20 countries.
Plex was looking for a solution that would provide real-time monitoring, data collection and analysis of hybrid infrastructure performance—including availability, throughput, response time, and resource utilization.
In this webinar John Gentry, CTO, Virtana joins Todd Weeks of Plex to discuss the joint collaboration between the two organizations to align goals with the following:
•Enhanced mission-critical cloud service
•Proactive issue and challenge assessment
•Performance-related problem resolution
•Real-time infrastructure monitoring
Virtana is currently deployed in all four of Plex’s data centers. As Plex grows, the company will continue to rely on Virtana solutions to improve performance and availability for their customers and integrate with interdependencies across infrastructure.
Businesses requirements for bandwidth and private network solutions are exploding. Data costs are falling, making access to advanced connectivity solutions easier than ever. In fact, according to a recent Internet & Television Association report, data cost was $9.01 per Mbps in 2008 vs. $0.76 in 2018. With scalability so inexpensive, investments will undoubtedly grow. But where should the priority lie? Is it about network optimization or application optimization? Or is it both?
Taken together, underlying dedicated and shared point-to-point, point-to-multi-point, and meshed technologies, along with the WAN technologies such as SD-WAN, IPsec VPN, and MPLS VPN, can all have a positive impact on your network and your business. They are all part of a strategic approach to optimizing the network and supporting and balancing the demands of multiple applications.
Join us on February 27 at 1 p.m. for “Network and Application Optimization: Taking a Deeper Dive,” a webinar from Comcast Business. Our expert panelists will discuss the value of these underlying network technologies working individually and in concert.
Participants will discover how hybrid networks:
• Optimize resource allocation, detect and respond to service degradation and support application routing
• Maximize always-on, real-time network monitoring
• Handle increasing network traffic and low-latency applications
• Spur actionable insights
• Manage end-point traffic and application routing
• Operate in a range of use cases, including high-availability architectures and connectivity to private and public clouds
• Jody Hagemann, Senior Director of Product Management, ActiveCore
Lifecycle, Comcast Business.
• Michael Fratto, Senior Analyst, Applied Infrastructure and Dev Ops,
Steve Remington, Principal Consultant and Founder, Minerra and Ivan Seow, Global Product Marketing Manager, YellowfinRecorded: Feb 27 202027 mins
The analytics profession has a problem: It is obsessed with insight creation and obsessed in doing so with the traditional dashboard. In the past, this was not a major problem because manually finding and communicating insights was a core task for analytics professionals. The analytics technology landscape is, however, rapidly changing with new augmented analytics technologies like signal detection to automate ever-increasing parts of the insight creation process, and data storytelling to provide the narrative and context to drive decision support.
Join us on 27th February to understand how and why augmented analytics and data storytelling transform the way we consume relevant insights and make informed decisions.
Jon Rossman & Mark FloisandRecorded: Feb 27 202055 mins
Your customers don’t have time to browse all over your site. They want to search for – and find – what they need quickly and easily through personalized experiences. And with site search users being up to 5 times more likely to convert, the stakes for relevant results and recommendations are higher than ever before.
In this webinar, you will learn how Motorola Solutions is adapting its digital strategy to the changing expectations of their customers. Jon Rossman, Solutions Digital Experience Manager at Motorola will share his experience and lessons learned from creating a more relevant, unified and personalized website experience. You’ll hear practical tips to increase website traffic and conversion, and strengthen the relationships with your brand. Additionally, you will learn:
· Motorola’s strategy and roadmap to create relevant experiences at scale
· Simple site design and functionality changes that can have a big impact on search
· How artificial intelligence can help you deliver the most relevant search results
· How to leverage analytics from the search experience to evolve your web strategy
Daniel Peled, VP Global Advisories and Digital Transformation KryonFeb 28 20203:00 amUTC17 mins
RPA is one of the most innovative global industries driving operational transformation today, delivering unprecedented levels of speed, personalization, agility and cost-efficiency. However, RPA projects are often held back by scalability issues.
Join us to for insider's insight on:
● What are the reasons for this?
● How can it be prevented?
● What is the RPA revolution?
● How will AI impact RPA?
Ben Houlihan, Senior Risk Product Manager, Dun & BradstreetFeb 28 20209:00 amUTC6 mins
This short video covers:
- An introduction to using credit reference agencies in your credit management practices
- The top three things to consider when assessing the risk profile of a new customer
- Best practice in ongoing portfolio management to identify risk exposure
Pete Starr, Global Director of Sales Engineering at CyrenFeb 28 202010:00 amUTC40 mins
Phishing is evading email defences and reaching users’ inboxes. If your email security gateway later discovers a threat it has delivered, it is too late. Inbox Detection & Response (IDR), referred to in a recent paper by Gartner as Cloud Email Security Supplements is a new way of thinking about email security. It deploys directly into the inbox where it can continuously monitor emails and when a new threat is discovered it can automate response and remediation across every mailbox.
Join security industry veteran, Pete Starr, to learn how IDR:
• Creates an email defence-in-depth architecture to protect from evasive phishing attacks
• Engages users at the point of risk by providing simple threat indicators and on-request scans
• Automates response and remediation with M-SOAR, to remove the burden on your security analysts
Want to find out more before registering? Read the IDR Vision Paper
Matthias Ort, Thomas ReithFeb 28 202010:00 amUTC60 mins
Fridays for Future Demonstrationen, Weltklimakonferenz, Klimawandel – sie alle zeigen uns, dass die Menschheit mehr dafür tun muss, um die Erde nicht weiter auszubeuten. Dazu gehört nicht zuletzt auch eine optimierte Beschaffung und ein effizienter Einsatz von Ressourcen in sämtlichen Produktionsprozessen. Erfahren Sie, wie Sie durch den Einsatz von Sensoren in Ihrer Produktion verschiedenste Messdaten sammeln und dank SAP HANA optimal auswerten können, um so die größtmögliche Effizienz zu erreichen. Am Beispiel des gemeinsamen Referenzkunden Gerolsteiner zeigen Ihnen unsere Experten auf, wie Sie mit der integrierten Lösung aus aktuellsten Produkten des IoT-Portfolios von Dell Technologies, der Ressourcen-Effizienz-Lösung von Intense und Ihrer SAP HANA Umgebung völlig neue Erkenntnisse über Ihre Produktionsprozesse erzielen.
Thomas Reith von Dell Technologies und Matthias Ort von Intense werden Sie durch dieses Webinar führen und freuen sich auf Ihre Fragen!
As companies digitise at an increasing rate, IT organisations are pressured to deliver a wider range of software experiences and data services across a variety of platforms.
Traditional infrastructure is complex and holds these teams back from moving fast, while the public cloud is not suited for all types of use cases. IT organisations need a combination of both private and public clouds, a.k.a, hybrid cloud, and the first step towards achieving this is to adopt and excel in a private cloud practice.
Join us to understand, the critical criteria required to building a private cloud, before extending to hosted and public clouds to achieve hybrid cloud operations.
What you’ll learn:
• Why a private cloud must be on your IT architecture roadmap
• The critical elements that define a private cloud
• How a private cloud prepares your organisation for public and hybrid cloud
Brian Summers - Storage Field Marketing Manager, Dell EMCFeb 28 20205:00 pmUTC31 mins
We will briefly discuss the evolution of storage to understand how the industry has arrived at the modern storage solutions we see today. Then we will take a close look at Dell EMC midrange storage offerings to better understand where these products fit in the overall Dell EMC storage portfolio.
Presented by: Brian Summers - Storage Field Marketing Manager, Dell EMC
Sprecher ist ein Technical Consultant mit Spezialisierung auf Data ProtectionMar 2 20208:00 amUTC90 mins
In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.
Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.
Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
Kai Radschun, Sales Executive und Svetlana Klinkow, Channel ManagerMar 2 20202:00 pmUTC60 mins
Wir unterstützen die digitale Transformation großer Marken weltweit mit einer ganzheitlichen, sicheren, Cloud-nativen SASE-Plattform und einem 24x7-Support durch erfahrene Ingenieure. Unsere Servicequalität und operative Exzellenz führen zu höchster Kundenzufriedenheit in der Branche mit einer Kundenbindung von 98%.
In diesem Webinar zeigen wir Ihnen auf, wie Sie Ihre SD-WAN Projekte mit Open Systems erfolgreich umsetzten. Melden Sie sich heute an und erhalten Sie wertvolle Impulse aus der Praxis anhand unserer Kundenprojekte Claas, Altana oder Gategroup.
Weiteres in diesem Webinar
-Auswirkungen des digitalen Wandels auf Netzwerk- und Sicherheitsarchitektur
-Projekte identifizieren – den richtigen Kunden finden
Sandeep Nawathe, Head of Engineering at Adobe and Sheryl Kingstone, Analyst at 451 ResearchMar 2 20205:00 pmUTC53 mins
Better e-commerce isn’t exclusive to a faster web or mobile site: it’s about delivering contextual, personalized, relevant experiences in real-time. The challenge is collecting transactional information and combining it with historic and interactional data. These sources can range from CRM, ERP, and marketing technology systems. The experiences need to be delivered in real-time from these disparate sources for any channel. At the heart of unforgettable experiences that increase customer loyalty is a real-time customer profile that aggregates every identity fragment created by an application or system. Additionally, these real-time profiles need to scale to deliver insights for the next best actions from not terabytes but petabytes of data in the Experience Era.
In this webinar, guest presenter Sheryl Kingston, Research Vice President and General Manager for 451 Research, and Sandeep Nawathe, Senior Director of Engineering for Adobe Experience Platform, will discuss:
- E-commerce trends from both traditional retailers moving more online and from upstarts.
- What infrastructure requirements are to support real-time customer experience and recommendations at the edge.
- How to take the right action at the right time across any channel.
Dorian Hugues, Product Manager and Lior Kimmel, Software Engineer, Host Connectivity, Micro FocusMar 3 20209:00 amUTC52 mins
Attend this webinar to see how you can gain insights into how well internal policies are followed through inventory and analysis of your mainframe and host systems. These capabilities allow you to get an accurate view of software deployment and usage. You will also get a clear vision on user configurations across the organization. This information will help you plan infrastructure changes or monitor for non-standard end user configuration activity. Join us to learn more!
You may have already moved many of your workloads and applications to the cloud. However, like most organisations, you are likely to have apps that you have yet to move to the cloud or replace with SaaS apps. Many of these may be mission-critical, legacy applications that do not support modern authentication protocols, single sign-on, or multi-factor authentication. Attend this webinar and learn how you can:
• Simplify user access and improve security for all applications, regardless of location
• Bridge the identity gap between cloud-based, SaaS, and on-premises applications
• Allow legacy applications to work with Azure Active Directory
By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und SchweizMar 3 20209:00 amUTC60 mins
Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?
In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:
- Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
- Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
- Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
- Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können
Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.
Steve Walker, Solutions Consultant, AdobeMar 3 202010:00 amUTC24 mins
Join us in our virtual, animated studio for this video webinar to discover how Adobe Document Cloud can help you unlock the power of digital document workflows. You’ll learn how to do the following:
• Obtain accountability and tracking capabilities for every document
• Give your teams the power to deliver paperless experiences to customers on any device
• Create forms in Adobe Acrobat and Microsoft Office
• Automate the storage of documents in Microsoft SharePoint
• Build intelligent document workflows using Adobe Sign and Microsoft Flow
• Ensure better security, collaboration, and organisation within your company.
There will be live Q&A session at the end of the webinar.
Alyson Richens & Alice CambridgeMar 3 202010:00 amUTC60 mins
Während des verangenen Jahrzehnts haben Unternehmen begonnen, Ihre IT Workloads zu virtualisieren und aus vorhandenen, monolithischen Systemen in Cloud-Umgebungen zu migrieren. Viele haben sich für VMware als Anbieter Ihrer virtualisieren Infrastruktur entschieden. Allerdings gelang es ihnen aufgrund der Kosten für VMware Lizenzen, Support und Beratung oft nicht, ihr primäres Ziel - deutlich niedrigere Gesamtkosten - zu erreichen. Auf der Suche nach Alternativen betrachten deshalb immer mehr Unternehmen andere Plattformen wie OpenStack genauer.
In diesem Webinar zeigen wir Ihnen die wichtigsten Ähnlichkeiten und Unterschiede zwischen den Virtualisierungsangeboten von VMware und Charmed OpenStack. Außerdem liefern wir eine detaillierte Kostenanalyse, die die Einsparpotenziale für Unternehmen aufzeigt, die von VMware zu OpenStack migrieren.
Shahar Razon and Aviel FogelMar 3 202010:00 amUTC45 mins
Now that Windows 7 has reached its end-of-life date, you might be wondering if your Windows 7 PCs increase your risk of an attack. The simple answer is yes. Because Windows 7 systems will no longer receive software patches or security updates, any unsupported Windows 7 PCs in your network could become the entry point for a damaging attack.
Unfortunately, legacy systems lurk in many corporate networks. Extended security update programs can offer a temporary—and costly—stopgap, but security leaders must consider other approaches to protect all their unsupported systems from exploits.
Join security experts Shahar Razon and Aviel Fogel as they discuss:
-The top risks for Windows 7 systems
-Why older operating systems are inherently less secure
-Strategies to secure legacy systems from exploits and malware
Sherelle Farrington, Cloud Security Solutions Architect, Fortinet, and Joeri Van Hoof, Consulting Systems Engineer, FortinetMar 3 202010:00 amUTC60 mins
As you’re embracing cloud to support your organization’s digital strategy, adapting security to an agile, software-defined world is critical to success.
Join our cloud security experts to decrypt the hype, understand the realities, and set yourself up for success on this cloud journey.
We’ll walk you through:
- What’s built-in, what’s covered, what’s not
- Designing for traditional and microservice architectures, such as containers and Kubernetes
- Real-world architectures in AWS and Azure
- What SD-WAN has to do with cloud
- Automating cloud security, with templates, cloud tools and Infrastructure-as-Code
- Proactively managing cloud risk and simplifying compliance
Fortinet is a leader in dynamic cloud security, offering solutions engineered to deliver effective, automated and scalable cloud security.
Graeme McDermott, Caroline Carruthers and Mark StubbsMar 3 202010:00 amUTC24 mins
Data at Work - Skills, Part 2: Siloed Pockets of Data Expertise. Unearthing Them, Unpacking Them, and Unleashing Their Potential
In part 2 of our Podcast focusing on Data Skills, our panel of experts discuss how data ops processes are vital to accelerating the provision of data for use by different teams - e.g. Finance or HR, vs traditional environments. Why it's vital to separate the confluence of data and technology. Also covered is how, as well as diversifying in terms of skills, data teams are becoming increasingly diverse in terms of personality and expertise, and why that is important to problem solving. Please note - we recommend that you listen to part 1, before listening to this episode.
Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
Mike Morgan, Insight and Phil Wandrei, CommvaultMar 3 202011:00 amUTC51 mins
A Fortune 500 retailer had reached their breaking point with too many data protection products. With three primary, disparate products and several secondary products, their staff and environment were being stretched and service levels were difficult to meet across applications and geographies.
A change was needed to address:
- Increased licensing costs and software licensing audits
- Decreased visibility and reporting across their environment
- Administration and management complexity and time-consuming tasks
- Join this webinar to learn how this global retailer with the guidance of Insight went through an evaluation to determine how best to consolidate and streamline their data protection environment by switching to a single platform
Alexander Liskin, Boris Larin, security researchers at Kaspersky LabMar 3 202012:00 pmUTC68 mins
Kaspersky security researchers will present an overview of the current state of supply chain attacks using technical analysis from the most significant cases, as well as outlining future attack forecasts.
The webinar will cover the following areas:
•How to recognize supply chain attacks
•An overview and technical details of the most prevalent supply chain attack cases:
-ShadowPad: carried out via popular server management software
-CCleaner infection: backdoor attack affecting millions of users
-Operation ShadowHammer: hijacking software updates of a tech giant
•Supply chain attack techniques from the point of view of security professionals and cybercriminals
•A history of other significant attack cases
•The future of supply chain attacks and defence forecasts
Quentin Habert, Expert en cybersécurité, France & région SEMEA, ProofpointMar 3 20201:00 pmUTC60 mins
Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.
D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?
Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.
Dans ce webinaire, vous découvrirez comment :
• évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
• proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
• encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
• automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).
Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.
Stuart Davis, Director of Incident Response Services, CrowdStrike, Brandon Dunlap, Moderator, (ISC)²Mar 3 20201:00 pmUTC60 mins
The year 2019 ushered in a host of new adversaries, new attack methods and new challenges for the cybersecurity industry. The CrowdStrike® Services team faced these trials head-on, across geographical regions and within public companies, private industries and governmental entities spanning a variety of digital mediums.
This webcast, drawn from real-life engagements and presented by the experts who investigated them, focuses on the themes and trends observed in the global incidents the Services team responded to and remediated throughout 2019 and what they mean for 2020.
Join this webcast to learn the following:
•How business disruption emerged as a main attack objective
•Why third-party compromises served as a force multiplier for attacks and attackers
•Why macOS machines are now clearly in the cross-hairs of adversaries
•Recommendations based on CrowdStrike Services investigations that can help you increase your organisation’s cyber defences
Devon Helms, Snr. Product Marketing Manager - Nutanix | David Ta, Director of IT Systems Engineering – NutanixMar 3 20202:00 pmUTC34 mins
Nutanix doesn’t just develop next-generation storage solutions for its customers; we actively use them in our internal system. Ready to achieve the same level of success? Join this webinar to learn how software-defined file and object storage are the key to supporting datacenter-wide simplicity and flexibility.
You’ll discover best practices and get up-to-date on the technology that enables success in an ever-growing datacenter. The key takeaway? You’ll learn how to merge Nutanix storage services with other innovative solutions to help you achieve your unique business objectives.
In this webinar you will learn:
• The ongoing role that different kinds of storage play in your company’s success
• How a hyperconverged foundation brings storage flexibility to your organisation
• How different kinds of file services enable different kinds of workloads