As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Kai Waehner, Confluent + Graham Ganssle, ExperoRecorded: Aug 23 201959 mins
Automating multifaceted, complex workflows requires hybrid solutions like streaming analytics of IoT data, batch analytics like machine learning solutions, and real-time visualizations. Leaders in organizations who are responsible for global supply chain planning are responsible for working with and integrating with data from disparate sources around the world. Many of these data sources output information in real-time, which assists planners in operationalizing plans and interacting with manufacturing output. IoT sensors on manufacturing equipment and inventory control systems feed real-time processing pipelines to match actual production figures against planned schedules to calculate yield efficiency.
Using information from both real-time systems and batch optimization, supply chain managers are able to economize operations and automate tedious inventory and manufacturing accounting processes. Sitting on top of all these systems is a supply chain visualization tool, enabling users' visibility over the global supply chain. If you are responsible for key data integration initiatives, join for a detailed walk through of a customer's use of this system built using Confluent and Expero tools.
WHAT YOU'LL LEARN:
•See different use cases in automation industry and Industrial IoT (IIoT) where an event streaming platform adds business value.
•Understand different architecture options to leverage Apache Kafka and Confluent.
•How to leverage different analytics tools and machine learning frameworks in a flexible and scalable way.
•How real-time visualization ties together streaming and batch analytics for business users, interpreters, and analysts.
•Understand how streaming and batch analytics optimize the supply chain planning workflow.
•Conceptualize the intersection between resource utilization and manufacturing assets with long term planning and supply chain optimization.
Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.
In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.
What you’ll learn:
- How to enable DMARC, SPF, and DKIM
- Common configuration mistakes
- How to best configure DMARC and other defenses to fight phishing
- Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
George Firican, Nicola AskhamRecorded: Aug 23 201945 mins
Are you planning to start a data governance program or have started one and want to know how to evolve it? A data governance maturity model might provide you with solutions. Join this session to gain an understanding into what maturity models are and how they can be used, while understanding their shortcomings and benefits
Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester ResearchRecorded: Aug 23 201932 mins
Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research discusses the importance of agile integration in digital transformation initiatives. Recorded during Red Hat's Microservices, Containers, API's an Integration Day on May 21, 2019 in Chicago, IL.
About the speaker:
Jeffrey helps CIOs and digital leaders succeed by working with them to improve their software delivery capability and by helping them assess the relevance of emerging software technologies. As a 25-plus-year software industry veteran, he's helped clients improve their development shop culture, apply Agile and continuous delivery best practices, and build successful developer ecosystems.
Adam Dagnall, James ClarkRecorded: Aug 23 201931 mins
By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
Cloudian is Part of the Splunk Technology Alliance Program
Lars Kroll, CISM, CISSP - Cyber Strategist Symantec (Deutschland) GmbHRecorded: Aug 23 201934 mins
Cyberangriffe sind raffinierter denn je. Die meisten Menschen kennen großangelegte Hacker-Attacken nur
aus dem Fernsehen. Für Cybersecurity-Experten ist die aggressive Threat-Landschaft von heute aber die tägliche Realität. Ihre Aufgabe? Eine schier endlose Abfolge von Attacken durch professionelle, bestens
ausgestattete, hoch motivierte und erfahrene Angreifer zu stoppen.
Was ist die Reihe „Alarmstufe Rot“?
Die Studien in der Reihe „Alarmstufe Rot“ basieren auf einer Befragung von über 3.000 Cybersecurity-Entscheidern in Frankreich, Deutschland und im Vereinigten Königreich. Die Umfrageergebnisse wurden von Dr. Chris Brauer, Director of Innovation
at Goldsmiths, University of London, ausgewertet und mit den Erfahrungen führender CISOs angereichert. Damit gibt Ihnen die Reihe „Alarmstufe Rot“ einen umfassenden Überblick über die Cybersecurity im Jahr 2019 – und hilft Ihnen, durchgehend die Kontrolle über Ihre IT zu behalten.
Wir werden uns in vier Kapiteln verschiedenen Fragestellungen in der Cybersecurity widmen. Unsere Erkenntnisse, Analysen und Empfehlungen sollen Ihnen helfen, eine tragfähige Cybersecurity für die Cloud Generation zu implementieren. So schützen Sie den guten Ruf Ihres Unternehmens, sichern sich das Vertrauen Ihrer Kunden, vermeiden teure Bußgelder und schöpfen Ihre Budgets und Ressourcen optimal aus. In den kommenden Monaten werden wir uns mit vier Themen auseinandersetzen. In diesem Webcast gehen wir auf die ersten zwei Studienergebnisse ein:
• Alarmstufe Rot Kapitel 1: Die Verkettung unglücklicher Umstände
• Alarmstufe Rot Kapitel 2: Fertigkeiten
in der Krise
Weitere Webcasts zu diesem Thema sind in Vorbereitung:
* Alarmstufe Rot Kapitel 3: Nach dem Angriff
* Alarmstufe Rot Kapitel 4: Die Security-Landschaft der Zukunft
Profitieren Sie von aufschlussreichen neuen Informationen und Analysen – und erfahren Sie, welche Alternative Ihnen Symantec als Marktführer bietet, um die Komplexität Ihrer Security nachhaltig zu reduzieren.
Dorothy Boyer, Director, Competitive & Market Intelligence, Broderick Perelli-Harris, Sr. Dir, Tech Sales EMEARecorded: Aug 22 201958 mins
Digital transformation has propelled a wave of new technological advancement that has arguably enriched people's lives. By the same token, the proliferation of machines - physical, virtual and in the cloud - has posed many security challenges and threats across industries, banking being the most noteworthy. As this "rise of machines" expands the threat vector, most banks and financial institutions are faced with increased pressure to protect their customer data and brand.
In this webinar, we'll explore some of the key trends impacting machine identity protection in the financial sector. We'll look at how managing security risk has taken on a new meaning for the enterprise in today's threat landscape.
Join our webinar and you'll also learn:
- How machine identity protection has evolved within DevOps and in the Cloud
- Ways to enforce a sound, enterprise-wide security policy
- Recent data breaches in the financial sector and the aftermath
- The next stage of machine identity protection
Sree Karuthody, Sr. Manager, Technology Partnerships, Confluent + Jeff Bean, Partner Solution Architect, ConfluentRecorded: Aug 22 201939 mins
Apache Kafka® is the technology behind event streaming which is fast becoming the central nervous system of flexible, scalable, modern data architectures. Customers want to connect their databases, data warehouses, applications, microservices and more, to power the event streaming platform. To connect to Apache Kafka, you need a connector!
This online talk focuses on the key business drivers behind connecting to Kafka and introduces the new Confluent Verified Integrations Program. We’ll discuss what it takes to participate, the process and benefits of the program.
Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice ManagerRecorded: Aug 22 201944 mins
Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.
In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
Ian Breitner - Product Marketing, Dell EMCRecorded: Aug 22 201925 mins
Cloud is the rage – it has been for some time, but organizations are struggling to consume cloud resources whilst ensuring access to the data sets needed in their cloud consumption models, Learn what Dell Technologies can deliver to bring your data to your cloud applications.
IT asset management (ITAM) and IT service management (ITSM) are the perfect partners in crime (so to speak). An organization’s success within each discipline can impact the employee’s experience. In fact, these two areas of IT should live together, fully integrated and compliment each other.
The service desk is the epicenter for employees’ relationships with business technology, and IT asset management holds the data for the technology they use. That means a clear view of asset data and histories can help deliver better incident management and request fulfillment. It can drive successful change, problem, and release management. It can drive automated actions that connect employees to the resources they need, and help manage the risks that you don’t need.
In this presentation, you’ll learn:
- How to build a self-sustaining IT asset management strategy as a main pillar to growing your ITSM strategy
- How to improve your existing incident management process by automatically linking tickets with the underlying assets related to them through asset discovery
- How to analyze the impact of technology changes, and improve tracking and resolutions of employee impacting issues
Patrick Sullivan, Senior Director, Security Technology & Strategy Akamai and Shane Keats, Director of Global Industry Mktg.Recorded: Aug 22 201932 mins
Webinar: Credential stuffing targets media
January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.
During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies.
- Why cheap tools and free tutorials lower the bar of entry for would-be criminals
- How malicious actors turn data breaches into substantial profits on darknet markets
- What businesses can do to detect and prevent credential stuffing attacks
Holly Davis, CEO Komplement Business Development ConsultingRecorded: Aug 22 20192 mins
How to cost-effectively protect K-12 networks.
The E-rate program is critical for K12 organizations that lack the funding to procure appropriate networking and cybersecurity solutions, such as firewalls and wireless security. But understanding the program — as well as confirming your E-rate eligibility — can be daunting.
In this third episode of our E-rate series, expert Holly Davis discusses:
Shamil Turner, Industry Principle, Dropbox & Dror Liwer, CISO & Co-Founder, CoronetRecorded: Aug 22 201930 mins
Data volume has been growing exponentially, dramatically increasing opportunities for theft and accidental disclosure of sensitive information. Companies are looking at Data Loss Prevention (DLP) solutions to help identify, monitor and protect sensitive data.
Watch this Webinar to learn the importance of DLP, and how our products together can help you automate and align to your company’s security strategy.
Coronet and Dropbox will cover how you can provide risk visualizations and implement a remediation strategy without disrupting end user productivity.
In this Webinar, we will cover:
- How to identify and block insider suspicious behavior
- Ways to protect company data and content via DLP rules
- How to protect Dropbox Business from malware and ransomware attacks
Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla NetworksRecorded: Aug 22 201960 mins
Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
1. Defend against Cyberattacks
2. Ensure Privacy Safeguards
4. Minimize Reputational Risk
5. Earn the Trust of your Customers
Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.
Aaron Rothschild, Senior Product Manager of Integrations & John Thompson, Solution ArchitectRecorded: Aug 22 201940 mins
Mattermost reduces friction for development teams who are working together on projects in Jira. Seamless integration allows you to post Jira information to and from multiple channels across your teams for easy collaboration and quick resolution.
Join this webinar to see a live demonstration of how our Jira integration can help your team work together more efficiently, including:
1. Admin configuration and setup
2. Posting notifications from Jira projects into Mattermost channels
3. Creating Jira issues and attaching messages to Jira directly through the user interface
4. Taking action on Jira issues via slash commands
After the live demonstration, we’ll have a Q&A session where we can answer all your questions!
Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation SolutionsRecorded: Aug 22 201944 mins
This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.
Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
Hitesh Parashar and Erik Melander, Astellent Inc.Recorded: Aug 22 201943 mins
Containers, Kubernetes and OpenShift are radically redefining how security and compliance teams work with the product and development teams to secure their businesses. Continuous Integration (CI) and Continuous Delivery (CD) bring amazing agility and innovation to software development organizations but present unprecedented security challenges. Static security policies & checklists no longer suffice and don’t scale for containers in the enterprise. To truly get the business advantages of containers, enterprises need to evolve their approach to security. Security must become a continuous activity. It must be considered at every stage of your application and infrastructure lifecycle.
Continuous Governance (CG) adds to CI/CD a shared model of security where compliance is not an after-thought but woven throughout the product, software engineering, infrastructure, operations, InfoSec and compliance organizations and culture.
With this webinar, learn how containers, Kubernetes, OpenShift and Astellent Sigil (http://astellent.com/sigil) can help add Continuous Governance to your software development processes. Learn how you can maintain the agility and innovation that containers and Kubernetes provide while at the same time controlling and defending your Kubernetes clusters. With this webinar you will learn how to -
Establish a preventative security posture by only running trusted code
Verifiably prove the steps of your software supply chain
Put in place integration with your existing tools to gather metadata for attestations
Build flexible per-cluster policies to allow trusted images and emergency deployments
Simplify governance with a single structured path for code to get from development to production
Who is it for?
Information Security teams
Internal and external IT audit teams
Container adoption teams
Enterprise Architecture teams
Applications and product teams
Arno Candel, CTO at H2O.aiRecorded: Aug 22 201959 mins
H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.
Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.
Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessDataRecorded: Aug 22 201929 mins
When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.
Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
Mike Boudreau, Director of Cloud Optimization at MissionRecorded: Aug 22 201935 mins
There is a lot of information out there about saving money/cost optimization on AWS, but a lot of it comes with a catch. In this webinar, the Director of Cloud Optimization at Mission, Mike Boudreau, will identify these potential snags and how to avoid them, so you can optimize your success in the cloud.
Roni Dover, Director of Sales Innovation & Alex Azrah, Senior EngineerRecorded: Aug 22 201917 mins
DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
Chris Kang, Field Solutions Engineer at Google and Mike Koleno, CTO of Cloud Practice, SolsticeRecorded: Aug 22 201939 mins
Google Cloud's introduction of Anthos promises to bring the best of managed Kubernetes to the cloud infrastructure of your choice, whether you are running private, public or hybrid cloud. This is the first offering of its kind provided by a public cloud provider. We will debunk the myths and provide a real-time look into how Anthos is being deployed and received in the enterprise field today.
In a digital economy, a frictionless customer experience has become the expectation. Given the need to balance agility and speed-to-market against the requirements for data integrity, having the right infrastructure in place is becoming increasingly critical in creating an omnichannel, seamless experience. In fact, a June 2019 Forbes article, “Are You Providing A Frictionless Customer Experience?”, noted that, to succeed, organizations must embrace technologies that reduce or eliminate friction for both customers and employees.
Join us on August 22 at 1 p.m. ET for, "Beating Friction Restriction:Facilitating a Frictionless Customer Experience a webinar from Comcast Business. Our expert panelists will discuss what it takes to build a network geared to a frictionless experience for anyone that interacts with it.
•The technologies that support a frictionless platform
•The tools that can be placed in the hands of customers and employees to create intuitive, simple digital experiences
•Building a frictionless network based on specific enterprise needs and technical abilities and that can change with your market and business
•Controlling the digital experience from anywhere
•Assessing the level of management you need
•Martin Capurro, Vice President, Managed Services, Comcast Business.
•Zeus Kerravala, founder & Principal Analyst, ZK Research, provides a mix of tactical advice to help his clients in the current business climate and long-term strategic advice.
Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro FocusRecorded: Aug 22 201952 mins
Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?
The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.
Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.
Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of XensamAug 26 20195:00 pmUTC44 mins
The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
Michelle Johnson Cobb, Chief Marketing Officer, Skybox SecurityAug 26 20195:00 pmUTC33 mins
For many organizations, the challenge of cloud security isn’t purely a cloud problem. As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks. To effectively protect these hybrid environments, organizations need to take a holistic approach to their security, understand their interconnections and dependencies, and ensure that security and compliance standards are being met anywhere in the network.
Register for the webinar to secure your migration to the cloud and see the benefits of unifying security management across your hybrid environment.
In this webinar, you’ll learn:
-Why breaking down data silos between on-prem and multi-cloud networks is fundamental to good cyber hygiene — not to mention security team sanity
-How data correlation can be used to detect vulnerabilities in cloud environments without an active scan
-How the single-pane-of-glass view of your attack surface to supports secure cloud migrations
-How attack surface modeling and analysis illuminates paths between and within networks, vulnerability exposures, misconfigurations, policy violations and more
-What processes of hybrid security management can be offloaded to automation and what ingredients are needed to make that automation an effective risk-fighting tool
Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.
Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GMAug 27 20194:30 amUTC47 mins
Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?
Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
Philip Griffiths of NetFoundry & Mikko Marttinen of AWSAug 27 20197:00 amUTC30 mins
Modern businesses are migrating towards cloud-first architectures, containerized microservices, and DevOps cultures in order to be innovative and rapidly bring new applications to market.
But there’s a problem: Traditional networking technologies weren’t designed to support today’s complex application development environments. They are inflexible, complicated to manage and open enterprises to a host of new security challenges. The webinar will be delivered by NetFoundry, an Advanced Technology partner for AWS, as well as utilise customer challenges and use cases.
Join this webinar to learn on:
The ‘3rd option’ for connecting to AWS; private network benefits without private network hardware and wires
How application connectivity (or ‘AppWANs’) increase your businesses agility and efficiency
The benefits of app connectivity being integrated into your favourite tools like AWS CloudEndure and CloudFormation
The role of Zero Trust in securing the world of application development
The benefits of automating networking within CI/CD pipelines and workflows
How Connectivity-as-Code based solutions can reshape your DevOps strategy
If you are responsible for the development and deployment of applications, infrastructure or migrations, you won’t want to miss this educational webinar.
Live online Aug 27 09:00 am European Summer, 10:00 am Finnish Summer
Cyber Security Brief podcastAug 27 20198:00 amUTC19 mins
On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.
Jarosław Biniek, SUSE; Jakub Kmiecik, TrecomAug 27 20198:00 amUTC90 mins
Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat trzeciego spotkania to "Jak zaprojektować swój pierwszy klaster Ceph?"
- Co jest nam potrzebne do założenia Software-Defined Storage (software / hardware; minimalna konfiguracja do testów, nody zarządzające, monitorujące i storage
- Rekomendacje odnośnie konfiguracji klastra produkcyjnego
- Jak się zabrać do instalacji – przewodnik krok po kroku (jak założyć konto na SUSE.com, jak pobrać pliki instalacyjne, gdzie znajduje się dokumentacja i na co warto w niej zwrócić uwagę), proces instalacji - na co zwrócić uwagę, potencjalne pułapki; podstawy konfiguracji, jak odwzorować fizyczną infrastrukturę w crush map
- Propozycje zastosowań Software-Defined Storage i pokaz używania SES w praktyce (disk-to-disk backup, obsługa obrazów wirtualnych maszyn, przestrzeń na pliki użytkowników serwerów Windows, serwowanie plików za pośrednictwem Samba).
Peter Silva - Senior Solutions Marketing ManagerAug 27 20198:00 amUTC8 mins
Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.
By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.
Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.
1. Introduction to Health Check and DPS
2. Features and basic setup requirements
3. Uplink health check configurations
4. DPS Policies Configurations
5. DPS policies verification
6. DPS Traffic Verification
7. Flow with routing plus DPS
Kat Garbis, Solutions Architect – JamfAug 27 20191:00 pmUTC32 mins
Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.
In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
Five misconceptions we’ll cover:
1.Deploying and securing devices is the same across all platforms
2.Additional encryption tools are required for Apple
3.Apple IDs are cumbersome and difficult to use
4.Apple's native security features are not enough
5.Binding Mac devices to a network is a must
Ryan Vance, John Abrams and Al Ford, Dell TechnologiesAug 27 20192:00 pmUTC60 mins
We empower U.S. government agencies with the people, process and technology to protect our nation’s digital future. Come learn how our data center solutions can fit any agency’s need for transformation from the edge to core to cloud. In addition, we will also discuss how data analytics provides you with the opportunity to increase your speed to decision as well as accuracy to decision. Our speaker will also share examples in which an intelligence layer is being added to the data or data analytics capabilities, which include: cyber, RPA, inferencing and multi-INT.
Register for this webinar today to learn more!
Click the "Attend" button and select from the "Add to Calendar" options. Open the calendar reminder and click on the link to register through GoToWebinar.
Go to the URL below to test your system.
Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVAAug 27 20193:00 pmUTC60 mins
While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
Krishna Subramanian, COO, Komprise & Chris Tinker, Chief Technologies, Hewlett Packard EnterpriseAug 27 20193:00 pmUTC45 mins
Hewlett Packard Enterprise and Komprise are partnering to transform data management. Komprise analyzes data across all storage, provides visibility into data growth, and transparently moves infrequently accessed data to cost-efficient HPE Scalable Storage. Join HPE and Komprise to learn how to modernize your infrastructure and unleash the full potential of your data.
- Data growth industry trends
- Analyze and move cold data to HPE Scalable Storage
- Modernize Your Data Environment
- Komprise and HPE joint value proposition
Brian Gracely, Director Product Strategy, OpenShift, Red HatAug 27 20193:00 pmUTC55 mins
Successful companies are measuring success from "idea to execution" in weeks and months. Getting there means navigating nearly unlimited technical choices, for both application and operations teams. Learn how leading companies are making the right choices for their Hybrid Cloud, to drive new market opportunities and greater business success.
Brian Gracely (@bgracely) is Director of Product Strategy at Red Hat, focused on OpenShift. He brings 20+ years of experience in Strategy, Product Management, Systems Engineering, Marketing and M&A. He is recognized as an industry thought-leader in Cloud Computing and DevOps, as well as being co-host of the award-winning podcast, The Cloudcast (@thecloudcastnet) and weekly Kubernetes podcast @PodCTL.
Susan Nee, Sr. Value Engineer at SynitiAug 27 20193:00 pmUTC60 mins
The demonstration will focus on Syniti's SAP Solution Extension – SAP Advanced Data Migration for SAP Central Finance. See how to complete and maintain your SAP Central Finance program, allowing you to centralize your financial data and post to the supporting financial source systems. Using Syniti’s proven solutions and agile methodology will result in a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your organization.
Lisa McKenna, Vice President Channels & Business DevelopmentAug 27 20193:00 pmUTC60 mins
If you are a VAD, VAR, MSP, ISV or technology business selling and servicing data management clients - your clients and your bottom line will benefit from this partnership.
Actian Partner Program opens a new, recurring revenue stream while allowing you to offer your clients industry-leading data solutions. Actian Partner Program offers unmatched technology, competitive pricing and industry-leading incentives. Bundled with an all-inclusive set of sales tools and marketing resources plus a comprehensive support package to help you grow your business.
Jeffrey Martin (Director of Product, WhiteSource)Aug 27 20193:00 pmUTC60 mins
DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
Business Espionage & Sabotage Seminar on Building a Corporate Intelligence Agency (CIA)
"Competitors have this time prevented us from knowing enough about them; but we have not prevented them from knowing far too much about us.”
Critical analysis on building an ultra artificial intelligence and quantum computing for business intelligence gathering, internal and external threat assessment, competitive intelligence, customer assessment and actions and more.
Irshad Raihan, Director Product Marketing, Red Hat & Annie Potvin, Sr Manager, Portfolio Programs Product Marketing, Red HatAug 27 20193:30 pmUTC55 mins
Hybrid cloud has become increasingly popular. But what exactly qualifies as a hybrid cloud? What applications can benefit from a hybrid cloud approach? How do application and workload portability impact business agility? What customer successes has Red Hat had through their solutions and consulting portfolio?
Join this session to hear industry experts discuss 5 keys to their open hybrid cloud success.
Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red HatAug 27 20193:30 pmUTC55 mins
Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!
Mike Barret, Director of Product Management, Red Hat
Rob Szumski, Product Manager, Red Hat
Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
Tushar Katari, OpenShift Product Manager, Red Hat