As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?
In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.
What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?
Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.
Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.
Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands.
Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.
Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.
Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.
This webinar will cover
• Auto Scaling the VM-Series architecture
• Auto Scaling and ELB integration details
• Alternative architectures for protecting many VPCs
Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers
1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
Privacy vs. security, security vs. privacy… the debate is ongoing. Why can’t we have both? Good news: by leveraging the appropriate mix of policies, procedures and enabling technologies, it is possible to secure data AND control access to it in a way that ensures proper application of privacy policies.
Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.
But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?
This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
•General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
•Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
•How object based systems like S3 have blurred the lines between them and traditional file based solutions.
This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.
Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.
Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.
In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.
Join us to learn about:
- What’s new in InSpec 1.0
- InSpec enhancements for Microsoft Windows systems
- Integration between InSpec and Chef Automate
Who should attend:
Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
Both Presidential candidates agree on the need for increased spending on our nation’s infrastructure. While we tend to think first of bridges, roads, and other physical features, cyber is also an area impossible to ignore given the pervasiveness of technology in our lives.
Without question, the speed, sophistication, and volume of cyber security attacks is constantly changing. In the case of nation states, the motives are also shifting from spying and surveillance to using offensive capabilities to attack critical infrastructure, national security assets, and even the political system itself. It’s no longer just about the money; safety and even lives may be at stake.
Adversaries are attacking us at an unmanageable scale. For instance, research sponsored by Department of Homeland Security and NSA showed environments with security event traffic of more than 1 billion alerts per day. Even after reducing the load to 1 million alerts per day with correlation and other tools, more than 20,000 human analysts would be needed to respond.
State-backed adversaries are using automation against us. It’s time we do the same, and projects like Integrated Adaptive Cyber Defense at Johns Hopkins Applied Physics Lab are leading us there.
Join our webcast to learn how public and private organizations are progressing on the security automation continuum from simple security lifecycle management to predictive response strategies.
The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.
Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:
* Gain visibility and granular, context-based control of SaaS applications
* Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
*Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
Smart marketers know that the sweet spot between AI and the org’s branding is where true customer engagement spikes. It’s not enough to give the customers what they want. It’s about giving them what they didn’t realize they wanted. Like how every time you upload a photo to your Facebook account -- its DeepFace artificial intelligence program suggests that you need to tag your friend. Or how Starwood’s bot butler “Botlr” has not only freed up staff time in Aloft properties but also underlined its brand’s enthusiasm for AI and machine learning technologies.
It’s time to take that AI one step further. We’ll talk about how to build and design the customer experience by using AI and machine learning. We'll show you how successful companies are making tremendous strides in moving the needle toward optimized customer engagement. And what's more, we're going to show you how to get started today by taking the guesswork out of your marketing strategy.
Join us for this hour long deep dive into using AI and machine learning to design the customer experience.
After this webinar you'll:
* Learn how to build a customer engagement strategy from the ground up using artificial intelligence.
* Hear valuable tips on improving your customer engagement now
* Get insight from top execs who have been down this road and have the best advice to design the customer experience. In this VB Live curated hour long workshop.
* Stewart Rogers, Dir. of Marketing Technology, VentureBeat
* Robert Hoffer, founder, Smarter Child
* Nick Edwards, CEO, Boomtrain
* Wendy Schuchart, Moderator, VentureBeat
Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.
In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.
Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:
1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management
2) Role of this industry leading technology in delivering unparalleled end user experience.
3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
Getting to a budget that is “just right” for the needs of your organization can prove a painstaking and daunting task. Yet by following a proven approach developed by Jeff Epstein and Byron Deeter of Bessemer Venture Partners, you can establish a transformative budgeting practice that enhances communication and collaboration, better informs planning, and can even help drive growth.
In this Webinar, you will learn how to:
Motivate your teams to perform and achieve at their highest levels.
Invest resources in the highest priority projects.
Protect the company if things go wrong or unforeseen challenges arise.
Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assume it’s required to remain PCI compliant. Join us for this webinar to learn how to achieve and maintain PCI compliance while replacing traditional AV with superior security capabilities, specifically:
•Which PCI requirements prescribe the use of traditional AV
•How auditors and Qualified Security Assessors (QSA) interpret those requirements today
•How Palo Alto Networks customers replace traditional AV with real prevention -- while maintaining PCI compliance
Read CoalFire PCI DSS Validation of Traps
Learn More About Traps
Join us as we discuss new self-service data prep strategies that will address these challenges. We will take a deep dive into ThoughtSpot’s technology stack and show how within one analytics platform it is possible to simplify and automate the entire analytics pipeline—from data connections to data prep, and then using a simple search interface for analysis. We will also share how customers have used ThoughtSpot to streamline these operations and accelerate time to insight for their business users.
Successful data science and analytics projects should focus on the explanation and delivery of business impact – this requires strong collaboration between business analysts and data scientists. Preparing rich representative data is important, but data discovery and predictive analytics are equally valuable – they enable team members to quickly evaluate which events are drivers or inhibitors of success, and to predict future outcomes. Throughout the course of a project, how can business analysts stay focused on the most important details? How can data scientists prototype and operationalize models in a quick, productive, and easy-to-use manner?
In this webcast, we will use SAS Visual Analytics and SAS Visual Statistics to teach you how to:
• Quickly identify predictive drivers
• Discover outliers by using interactive tools
• Use drag-and-drop features to build predictive models
• Simultaneously build models and process results for each group or segment of data
• Visually explore your predictive outputs or values
• Compare your models and apply them to new data
Comment les entreprises gèrent la croissance des volumes et la variété des données sans augmenter les coûts ?
Est-ce que votre architecture de données est capable de gérer les nouveaux défis du Big Data ?
Rejoignez-nous pour ce webinar pour apprendre comment optimiser votre architecture de données et réduire ses coûts avec Hadoop.
Particulièrement, nous allons traiter les sujets suivants :
- Réduire les coûts de stockage en déplaçant les données vers Hadoop
- Optimiser les traitements type ETL et en les exécutant sur Hadoop
- Faciliter la collecte et l’ingestion de différentes sources de données via NiFi
There is no such thing as a "secure" system - we do our level best to design them as well as we can, to put controls and measures in place - but, at the end of the day, things can and do go awry. Today we are going to talk about Forensics, and how it is the opposite side of the coin from security. What can we do in advance to aid in forensic investigation? What do we do at the point of a compromise to allow us to preserve as much evidence as is possible? And, ultimately, how to we take a forensic analysis and learn from it to create a better system the next time?
There are three pillars to understanding the customer experience that your communications technology delivers – do you know what they are? With almost infinite amounts of data available about your customers, it can be difficult to fit all of the pieces together. Join IR’s Mike Burke as he discusses the different methods you can use to measure your customers’ experience, and how to start thinking like a customer.
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.
Join this webinar to hear how Turkcell, the GSM-based mobile communications organization based in Turkey, has improved network efficiency with faster incident resolution and saved 250 man hours per week.
HPE Operations Orchestration ensures faster fixes and more efficient use of resource. Integrating with your IT environment with minimal impact on current procedures and tools while fully utilizing your existing IT investments.
So you can:
•Reduce operational costs by automating manual, repetitive and error-prone tasks so IT staff can refocus on strategic initiatives.
•Improve service quality by reducing escalations and mean time to repair (MTTR) by automating event and incident triage, diagnosis and resolution.
Dr Gareth Owenson is the course leader for the Forensic Computing programme at the University of Portsmouth. He teaches extensively in forensics, cryptography and malware analysis. His research expertise is in darknets, where he is presenting working on alternative approaches that may lead to novel applications of the blockchain. Gareth also has a strong interest in Memory Forensics, and undertakes work into application-agnostic extraction of evidence by using program analysis.
Gareth has a PhD in Computer Science (2007) and has taught at several Universities throughout the UK.
The European Cybersecurity policy - the Network Information Security (NIS) Directive - is about to become the new law that sets security standards for many organisations across Europe.
Recent research carried out by FireEye shows that many organisations are not fully prepared to implement the legislation, which comes into effect in less than two years' time, and it is critical these organisations begin preparing now to be in compliance and not be caught unprepared.
In this webinar, Mandiant’s Nathan Martz, Principal Strategic Consultant for Central Europe, will cover:
-The basics of the European Cybersecurity policy - the Network Information Security (NIS) Directive
-Timeline, key components and possible penalties for noncompliance
-Practical recommendations on compliance and security standards to keep your company prepared
Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.
This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.
- Why endpoints are the new perimeter
- How employees can strengthen your security operations strategy
- Techniques to test and validate security awareness program
- How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform
Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.
The greatest value the cloud offers is the ability to use technology to scale business processes quickly and make them more consumable. It enables them to run as a service, giving developers and operators more flexibility to stand up a service, sort out what works and what doesn’t, and ultimately improve the user experience. As they say in Silicon Valley, it allows developers to “fail fast” and repeat.
The so-called “SaaSification” of business is driving innovation and smart organizations get this—they are seizing the moment, creating dynamic services on a platform, consumable by large groups of users at any time. According to some recent industry analyst estimates, 34 percent of enterprises will have 60 percent or more of their applications on a cloud platform within two years.
During this webcast you will learn:
-How App SaaSification allows companies to use their new found IT “assets” in ways they haven’t before
- How App Saasification saves the companies from having to buy any additional infrastructure or expensive platforms. Instead, they were able to scale up and down cost-effectively to offer an additional, value-added product that enhanced customers’ viewing experience
As threats evolve, so must application security. HPE Security Fortify continues to create and pioneer new features and functionality to further automate and streamline your app security testing program. Learn about new static scanning advances that align with DevOps requirements. Hear how scan analytics can further enhance and refine advanced auditing processes to increase the relevancy of security scan results.
Advanced processes and practices that show the value of 3d printing as a process and production aide. We will discuss the more cutting edge applications, who is advancing these methods and why? Also we will explore the less complex but most impactful applications being used in industry. This will help you understand what is possible when you start to really dive into how the technologies can be used. Day 2 sponsored by Stratasys
Open source has been adopted by organizations across all industries, including software, systems, and cloud services. How much open source is used, along with the license, security, and operational risks posed by unmanaged use of open source, is a question M&A professionals need to consider in every transaction.
This webinar will provide insight from real world data abstracted from Black Duck M&A audits. The data covers hundreds of systems and commercial applications, the code assets of recent acquisition targets, and will illuminate why acquirers should understand exactly what is in the code base before closing the deal. Data will include:
- The composition of open source v. proprietary code in the average code base
- The gap between the number of open source components used vs. what was known by the target
- The prevalence of components using licenses that could put IP at risk
- Number and age of security vulnerabilities in the open source components
- An understanding of which components have underactive support communities
Values-free leadership is an oxymoron, and leadership without authenticity is a misnomer. Integrity is the heart of leadership and authenticity is its soul. True leaders are not only ethical and transparent, they engage and influence others on a deeper, more personal level. By applying the ethical theories of notable moral philosophers and contemporary thought leaders, participants test proven ethical principles of authentic leadership.
Organizations across all industries are facing increased pressure from customers, vendors, and employees to offer Wi-Fi access. While offering this service provides significant gains, businesses cannot forget about the critical security measures needed to defend against wireless threats.
Join Ryan Orsi, Director of Strategic Alliances, as he delves into the top challenges of deploying enterprise-grade, secure Wi-Fi, and the key solutions within reach of all organizations.
Criminal groups use exploit kits as one of the main distribution methods to infect Windows hosts with malware. Exploit kits are designed to work behind the scenes while you are browsing the web. During the past year, the most common malware distributed by exploit kits has been ransomware.
In most cases, a potential victim visits a compromised website as the first step in an infection chain. Behind the scenes, the victim is redirected to an exploit kit. The exploit kit gathers information about the victim's system, determines the appropriate exploit, and infects any vulnerable hosts.
In this presentation, Brad Duncan reviews fundamental concepts of exploit kit activity for the SLED vertical and demonstrates how ransomware infections happen through this method. Brad also discusses preventative measures people and organizations can take to combat this very real threat.
Industry analysts believe that “eighty-nine percent of companies plan to compete primarily on the basis of the customer experience.” To fulfill this vision in the manufacturing industry, the role of master data management (MDM) has been strategically evolving. Now, in addition to traditional uses, MDM is helping manufacturers tackle an array of business challenges like cross-sell and upsell, vendor management, or targeted marketing campaigns. Early adopters have seen significant business advantages by using MDM to build a 360-degree view of customers across products, regions and lines of business. In fact, with a next-generation view of customers and the products they own, one $60 billion manufacturing company improved cross-sell and upsell success by five percent.
In this webinar, Suresh Babu Balasubramanian from Wipro and Hamaad Chippa of Informatica will discuss how great customer data can help tackle some of the major strategic and operational business challenges manufacturers face. Our conversation will focus on:
• Industry trends impacting the customer experience and need for a 360-degree view of customers
• An overview of key Total Customer Centricity solution capabilities and value-add
• Business benefits of improved customer information
• A customer success story
Join us for this presentation which includes an in depth look at a number of case studies regarding customers that have successfully deployed the FormationOne software-defined storage platform. This interactive presentation will include a number of specific use cases with performance and ROI results to demonstrate the value and benefits of moving away from hardware based arrays and towards software based architectures.
As software becomes the competitive currency of the enterprise, investments are being made to embrace new distributed cloud applications, implement cloud platforms, and automate infrastructure provisioning. However, organizations are facing many challenges in regards to setting the correct path toward cloud native, delivering high quality & agile applications, all while keeping up with the increasing pace of business without sacrificing governance and operational efficiency.
Cisco, Apprenda and Redapt have joined hands to offer an end-to-end solution to alleviate these challenges and transform your datacenter into a secure, policy-driven application cloud platform.
Join us to learn:
• Where your organization currently fits on the cloud maturity model and what strategies can help you succeed at improving your cloud capabilities
• How enterprises can effortlessly cloud enable existing monolithic Java and/or.NET applications in addition to running docker based cloud native applications
• How to drive rapid development through DevOps, including continuous integration (CI) and continuous delivery/deployment (CD)
• Approaches to leverage both IaaS and PaaS to automate service provisioning, security, compliance and governance
• Ways to drive order of magnitude improvements in infrastructure utilization, developer productivity, organizational agility, and governance
Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.
In this webinar, you will learn critical aspects to securing data in a variety of ways:
1) Three approaches to securing data-at-rest
2) How software-defined policies can ease security management
3) The role that key management plays in securing data-at-rest
4) How real-time alerting can take your security posture to the next level