Hi [[ session.user.profile.firstName ]]

Information Technology

  • Best Practices on Operational Efficiency in Network Security Best Practices on Operational Efficiency in Network Security Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Recorded: Oct 26 2016 63 mins
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint

    Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • SD-WAN for Next-Generation Retail Networks SD-WAN for Next-Generation Retail Networks Ciaran Roche, CTO, Coevolve: Kangwarn Chinthammit, Director of Solutions, VeloCloud Recorded: Oct 26 2016 60 mins
    Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands.

    Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.
  • Auto Scaling Next-Gen Firewalls on AWS Auto Scaling Next-Gen Firewalls on AWS Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering Recorded: Oct 25 2016 46 mins
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • Tech Talk: Using Oracle AWR to Evaluate Storage Performance Tech Talk: Using Oracle AWR to Evaluate Storage Performance Bala Chandrasekaran Recorded: Oct 25 2016 46 mins
    Are you unhappy with the database application performance? Let us join us to discuss about database techniques and tools to evaluate if a faster all-flash storage could help.
  • CMDB – When Failure is Not an Option CMDB – When Failure is Not an Option Adam Mason and Terrell Pursley Recorded: Oct 25 2016 33 mins
    Join two of our CMDB experts on Tuesday, October 25th for an exclusive web clinic, and learn our secrets for getting CMDB right the first time.

    You invest significant time and resources on your CMDB, and failure is not an option. Sign up today and learn how to guarantee success.
  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Recorded: Oct 25 2016 55 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • Finding the Holy Grail: Data Security AND Privacy Finding the Holy Grail: Data Security AND Privacy Robert Ball, Global Privacy Officer and Chief Legal Officer at Ionic Security, Inc. Recorded: Oct 25 2016 43 mins
    Privacy vs. security, security vs. privacy… the debate is ongoing. Why can’t we have both? Good news: by leveraging the appropriate mix of policies, procedures and enabling technologies, it is possible to secure data AND control access to it in a way that ensures proper application of privacy policies.
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Recorded: Oct 25 2016 53 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Global Partner Evangelist Recorded: Oct 25 2016 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • Racing Against Nation States on the Automation Continuum Racing Against Nation States on the Automation Continuum CP Morey, VP Products & Marketing at Phantom Cyber Recorded: Oct 25 2016 34 mins
    Both Presidential candidates agree on the need for increased spending on our nation’s infrastructure. While we tend to think first of bridges, roads, and other physical features, cyber is also an area impossible to ignore given the pervasiveness of technology in our lives.

    Without question, the speed, sophistication, and volume of cyber security attacks is constantly changing. In the case of nation states, the motives are also shifting from spying and surveillance to using offensive capabilities to attack critical infrastructure, national security assets, and even the political system itself. It’s no longer just about the money; safety and even lives may be at stake.

    Adversaries are attacking us at an unmanageable scale. For instance, research sponsored by Department of Homeland Security and NSA showed environments with security event traffic of more than 1 billion alerts per day. Even after reducing the load to 1 million alerts per day with correlation and other tools, more than 20,000 human analysts would be needed to respond.

    State-backed adversaries are using automation against us. It’s time we do the same, and projects like Integrated Adaptive Cyber Defense at Johns Hopkins Applied Physics Lab are leading us there.

    Join our webcast to learn how public and private organizations are progressing on the security automation continuum from simple security lifecycle management to predictive response strategies.
  • Grow's UI Update Grow's UI Update Alan Winters Recorded: Oct 25 2016 45 mins
    Get a walkthrough of our newest release to learn how we're improving your ability to consume and act on data in real time.

    Includes live Q&A with Grow's VP of Product.

    Grow.com is the simplest way to access your data and visualize it in a real-time scoreboard. When business performance is measured it can be improved. And teams that know the score, play to win!
  • Rethink Security for SaaS: Power of the Platform Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Recorded: Oct 25 2016 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • How to use AI in designing the customer experience How to use AI in designing the customer experience Stewart Rogers, Dir. of Marketing Technology, VentureBeat Recorded: Oct 25 2016 61 mins
    Smart marketers know that the sweet spot between AI and the org’s branding is where true customer engagement spikes. It’s not enough to give the customers what they want. It’s about giving them what they didn’t realize they wanted. Like how every time you upload a photo to your Facebook account -- its DeepFace artificial intelligence program suggests that you need to tag your friend. Or how Starwood’s bot butler “Botlr” has not only freed up staff time in Aloft properties but also underlined its brand’s enthusiasm for AI and machine learning technologies.

    It’s time to take that AI one step further. We’ll talk about how to build and design the customer experience by using AI and machine learning. We'll show you how successful companies are making tremendous strides in moving the needle toward optimized customer engagement. And what's more, we're going to show you how to get started today by taking the guesswork out of your marketing strategy.

    Join us for this hour long deep dive into using AI and machine learning to design the customer experience.

    After this webinar you'll:

    * Learn how to build a customer engagement strategy from the ground up using artificial intelligence.
    * Hear valuable tips on improving your customer engagement now
    * Get insight from top execs who have been down this road and have the best advice to design the customer experience. In this VB Live curated hour long workshop.

    * Stewart Rogers, Dir. of Marketing Technology, VentureBeat
    * Robert Hoffer, founder, Smarter Child
    * Nick Edwards, CEO, Boomtrain
    * Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Boomtrain
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Recorded: Oct 25 2016 62 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Recorded: Oct 25 2016 61 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • The Goldilocks Budget: Best practices for developing your “just right” budget The Goldilocks Budget: Best practices for developing your “just right” budget Jeff Epstein, Operating Partner, Bessemer Venture Partners Recorded: Oct 25 2016 33 mins
    Getting to a budget that is “just right” for the needs of your organization can prove a painstaking and daunting task. Yet by following a proven approach developed by Jeff Epstein and Byron Deeter of Bessemer Venture Partners, you can establish a transformative budgeting practice that enhances communication and collaboration, better informs planning, and can even help drive growth.

    In this Webinar, you will learn how to:

    Motivate your teams to perform and achieve at their highest levels.
    Invest resources in the highest priority projects.
    Protect the company if things go wrong or unforeseen challenges arise.
  • Attain PCI Compliance without AV Attain PCI Compliance without AV Michael Moshiri Director, Advanced Endpoint Protection Recorded: Oct 25 2016 51 mins
    Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assume it’s required to remain PCI compliant. Join us for this webinar to learn how to achieve and maintain PCI compliance while replacing traditional AV with superior security capabilities, specifically:

    •Which PCI requirements prescribe the use of traditional AV
    •How auditors and Qualified Security Assessors (QSA) interpret those requirements today
    •How Palo Alto Networks customers replace traditional AV with real prevention -- while maintaining PCI compliance

    Read CoalFire PCI DSS Validation of Traps

    Learn More About Traps
  • Accelerate Your Analytics Pipeline with Self-Service Data Prep Accelerate Your Analytics Pipeline with Self-Service Data Prep Scott Holden, CMO, ThoughtSpot; Joe Abbott, Technical Product Marketing, ThoughtSpot Recorded: Oct 25 2016 56 mins
    Join us as we discuss new self-service data prep strategies that will address these challenges. We will take a deep dive into ThoughtSpot’s technology stack and show how within one analytics platform it is possible to simplify and automate the entire analytics pipeline—from data connections to data prep, and then using a simple search interface for analysis. We will also share how customers have used ThoughtSpot to streamline these operations and accelerate time to insight for their business users.
  • Practical Approaches to Interactive Data Discovery & Predictive Analytics Practical Approaches to Interactive Data Discovery & Predictive Analytics Wayne Thompson, Chief Data Scientist SAS & Tapan Patel, Product Marketing Manager SAS Recorded: Oct 25 2016 67 mins
    Successful data science and analytics projects should focus on the explanation and delivery of business impact – this requires strong collaboration between business analysts and data scientists. Preparing rich representative data is important, but data discovery and predictive analytics are equally valuable – they enable team members to quickly evaluate which events are drivers or inhibitors of success, and to predict future outcomes. Throughout the course of a project, how can business analysts stay focused on the most important details? How can data scientists prototype and operationalize models in a quick, productive, and easy-to-use manner?

    In this webcast, we will use SAS Visual Analytics and SAS Visual Statistics to teach you how to:

    • Quickly identify predictive drivers
    • Discover outliers by using interactive tools
    • Use drag-and-drop features to build predictive models
    • Simultaneously build models and process results for each group or segment of data
    • Visually explore your predictive outputs or values
    • Compare your models and apply them to new data