Hi [[ session.user.profile.firstName ]]

Information Technology

  • Getting the Sec into DevSecOps Getting the Sec into DevSecOps Scott Crawford and Anna Chiang Live 60 mins
    Getting app development, DevOps and security teams all on the same page when it comes to implementing AppSec testing in development workflows is often a difficult task. Developers need to do frequent code releases to meet continuous integration (CI) process requirements. Adding security testing into this process is often met with resistance and poor adoption, unless it’s done correctly with the right security training, developer and CI tools integrations, and corporate security buy in by all involved.

    Join us as 451’s Scott Crawford and WhiteHat Security’s Anna Chiang discuss what’s needed to truly integrate security into a DevOps environment.
  • How Mouser Electronics Differentiates with Rich Product Information How Mouser Electronics Differentiates with Rich Product Information Hayne Shumate, Matt Wienke, Prash Chandramohan Recorded: Jan 24 2017 51 mins
    When a manufacturer wants a Wifi Module for the next generation of smart phone, the design engineers turn to Mouser Electronics to find the exact module they need. As a worldwide, leading authorized distributor of electronic components and semiconductors, Mouser specializes in the rapid introduction of new products and technologies for more than 600 manufacturers.
    With neither Inside Sales nor Outside Sales teams, new customers discover Mouser through the detailed product pages on the many country specific websites. Most sales are completed online and with 7 million active products and information on 14 million obsolete/unavailable products. Mouser.com serves as a primary reference for anyone designing a circuit. Mouser’s product data is a critical differentiator and is elemental to Mouser’s growth and success in providing engineers and buyers with product data that is highly searchable, complete, and accurate.
    Join this webinar to hear Hayne Shumate, SVP of Internet Business from Mouser Electronics, Matt Weinke of Infoverity, and Prash Chandramohan of Informatica share:
    -Product information management (PIM) requirements that help Mouser sustain 20% annual growth
    -How Mouser uses Informatica MDM Product 360 to maintain high-quality, detailed electronics data so that customers can quickly find, select and buy the components that meet their specifications
    -Best practices from Infoverity and their Quickstart framework that helps companies like Mouser start small and scale with their PIM implementations
    -Lessons learned from this experience, and the next steps in Mouser’s PIM journey
  • Datacenters and Storage Models of the Future Datacenters and Storage Models of the Future Randy Kerns Recorded: Jan 24 2017 53 mins
    Every new or recycled idea that comes along is going to be the ‘only way things are done in the future' according to some. This narrow view has been offered in the area of storing and managing information since modern computing began. The reality is much more messy. Different approaches for handling information are used and in reality, the processing and management of information use mostly unrelated solutions. This BrightTalk session will look at evolving datacenters and how information is handled including the storage technologies employed. There will be different approaches that will be discussed as part of the presentation.
  • Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Neil Goldfarb, Gerente Regional de Darktrace, y Victor Ibañez, Gerente del País de Cast Info Recorded: Jan 24 2017 90 mins
    Los avances de inteligencia artificial siguen aumentando y estos avances nos están llevando a un desarrollo impresionante y peligroso en la tecnología de ciberataques, los cuales causan que las amenazas sean más rápidas y más sofisticadas. Desde el ransomware inteligente hasta malware sofisticadas y personalizadas que se integran a la red, los equipos de seguridad están luchando para seguir el ritmo de la nueva generación de amenazas.

    Dentro de la carrera de ciberarmas, una nueva estrategia es esencial para identificar y responder a los ataques de IA y a otros adversarios sutiles y avanzados. Durante el webinar, el Gerente Regional de Darktrace, Neil Goldfarb, y el Gerente Regional de CastInfo, Victor Ibañez, examinarán este desafío y explicarán por qué la ‘tecnología del sistema inmune’, propulsada por machine learning no-supervisado, será crítica en el futuro de la ciberdefensa.
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud and Melanie Posey, Research Vice President for VotE- Cloud Recorded: Jan 24 2017 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Hortonworks Partner Demo Kit Hortonworks Partner Demo Kit Sean Roberts, Mark Lochbihler & Ajay Singh; Hortonworks Recorded: Jan 24 2017 72 mins
    Demonstrate the capabilities of Hortonworks Connected Data Platform using the Partner Demo Kit. In this session, we will provide an overview of the Partner Demo Kit including:

    1) Cloud and On-Prem Setup
    2) IOT application to monitor and prevent traffic violations
    3) Data Science application to analyze earthquake patterns and predict its intensity
    4) Social Media monitoring to gain insight into trending topics and real-time discussions
  • Demanding More Out of Your SIEM - EMEA Demanding More Out of Your SIEM - EMEA Eric Sun Recorded: Jan 24 2017 58 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Five Things to Focus On for Faster MDM Results Five Things to Focus On for Faster MDM Results Jake Freivald, Information Builders and Dan Power Hub Designs Recorded: Jan 24 2017 61 mins
    Innovation Sessions 2017 #1

    Want faster results from your master data management (MDM) program? See what happens when you're able to better align business and IT in your organization. Dan Power and Jake Freivald discuss the Five Things you can do to achieve faster deployments and more rapid cycle times.

    Bio: Dan is the author of more than 35 articles and white papers on MDM and data governance, and is a featured speaker at industry conferences, webinars and vendor events.

    Dan has written for Information Management magazine and The Data Warehousing Institute, and is the publisher of Hub Designs Magazine, a widely read blog on MDM and data governance.
  • Doing the right thing: Privacy beyond GDPR Doing the right thing: Privacy beyond GDPR Jorge Carillo, President of the (ISC)² Czech Chapter, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Jan 24 2017 60 mins
    With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.

    The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.
  • How to Save on Oracle Licensing Fees by Replatforming with Dell EMC: Bart Sjerps How to Save on Oracle Licensing Fees by Replatforming with Dell EMC: Bart Sjerps Bart Sjerps - Principal Systems Engineer Recorded: Jan 24 2017 60 mins
    Database license fees drive over 80% of total system cost. Many organizations virtualize their applications, but Oracle is often an exception for a variety of reasons.
    You will learn why re-platforming Oracle databases on better hardware can drive down TCO by a significant amount. Bart will also cover technical challenges and benefits, as well as myths and facts about licensing Oracle on VMware, and how to deal with Oracle license audits and still stay compliant.
  • Smart Mobility – Hitachi paves the way  Smart Mobility – Hitachi paves the way  Hitachi Data Systems Recorded: Jan 24 2017 8 mins
    The founder of Hitachi, Namihei Odaira, who unveiled an electric motor in 1910 as his first product, would be proud of how we continue to bring innovation into the real-world of IoT today. In this video we showcase the contributions of Hitachi to modern mobility concepts in the automotive industry and subsequently for all of us. In close collaboration with our customers, Hitachi Social Innovation projects bring together the best of operational technology know-how, expert insights, industry analyses, IT-infrastructure and cloud, and expertise in business models.
    Enjoy the video and learn more about what we call the Internet of Things THAT MATTER.
  • The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences Sameer Bhalotra, frm. cybersecurity director at the White House, Kennet Westby, president of Coalfire, James Carder, CISO Recorded: Jan 24 2017 59 mins
    The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions are protected.

    In this webcast, a panel of experts discuss a number of questions around critical infrastructure and the challenges of protecting it against advanced cyber threats. The panelist also highlight the issues and risks the Internet of Things (IoT) pose to securing critical infrastructure.

    You’ll learn:

    • The definition of critical infrastructure
    • The responsibility the private sector plays in protecting the nation’s critical infrastructure
    • How IoT is amplifying the scope of critical infrastructure
    • Where organisations should focus to best mitigate the growing and shifting cyberthreats
  • Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Nicasio De Tomas Recorded: Jan 24 2017 61 mins
    El ransomware es una forma de malware que impide el acceso a los datos/a la red hasta que la víctima pague un rescate. En 2016, el ransomware se está propagando a un ritmo sin precedentes. Los cibercriminales lo utilizan de forma activa para tomar empresas, instituciones e incluso individuos como rehenes. Los expertos en seguridad definen el ransomware como la nueva crisis del crimen cibernético.
    Participe en nuestro webcast en directo con un experto en seguridad de red y descubra:

    •Cómo los cibercriminales pueden explotar las vulnerabilidades de su red
    •Las acciones que puede emprender para prevenir y detener esta amenaza peligrosa y potencialmente costosa
    •Los tipos de empresas con mayor riesgo de sufrir ataques de ransomware
    •Cómo proteger sus datos allá donde vayan
  • Are Hybrid Clouds in Tune with Future Business Growth? Are Hybrid Clouds in Tune with Future Business Growth? Agatha Poon 451 Research, Rajesh Awasthi Tata Communications Recorded: Jan 24 2017 61 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jan 24 2017 54 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Top 5 Benefits of Doing IoT Right Top 5 Benefits of Doing IoT Right Dan Ortega - VP of Marketing at Blazent Recorded: Jan 23 2017 4 mins
    In this episode we will review some of the Top 5 reasons why IoT is fast becoming mainstream. The benefits came from a November 2016, Hewlett-Packard Enterprise survey of approximately 80 IT professionals to understand how IoT was working for them.
  • Tintri Analytics: Lower Cost Now and Later Tintri Analytics: Lower Cost Now and Later Mike Matchett, Sr. IT Analyst, Taneja Group and Dhiraj Sehgal, Sr. Product Marketing Manager, Tintri Recorded: Jan 23 2017 49 mins
    Learn from leading storage technology analyst Taneja Group about how to resolve these issues, with a rich set of actionable insights delivered by Tintri Analytics, the SaaS based Analytics platform. These insights are based on workloads’ key characteristics and the end-user experience of performing several common tasks.
  • Accelerate threat detection and incident response through a managed SOC service Accelerate threat detection and incident response through a managed SOC service Sridhar Karnam, Director, Product Marketing @ Arctic Wolf Networks Recorded: Jan 23 2017 31 mins
    A SIEM is costly and complex, IDS/ IPS are not enough, threat intelligence is overwhelming, and a SOC takes years to build and an army of security staff to manage. So where do I start with security? How should I prioritize? How can I integrate all the tools? How many security staff will I need? How do I integrate a SOC and a NOC?

    Managed Detection and Response is the answer to all these questions. With a focus on detecting and responding to threats, the service configures the right combination of tools and provides the people and process to help you quickly implement the best security within your budget. With a simple subscription-based model, you will pay a fixed price that is not dependent on your data volume. It is time to throw your SIEM, IPS, and other point solutions out and move forward with MDR.

    This webinar covers how you can implement three years worth of work on your security roadmap in just 60 min.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Recorded: Jan 23 2017 61 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Understanding Storage Performance for Hyperconverged Infrastructure Understanding Storage Performance for Hyperconverged Infrastructure Luke Pruen, Director of Technical Services at StorMagic Recorded: Jan 23 2017 37 mins
    Hyperconverged infrastructure is now being broadly adopted, yet many organizations are blindly deploying these new shiny toys without clear line of sight to an optimal storage configuration.

    In this webinar, Luke Pruen, Technical Services Director at StorMagic presents real-world data from a large variety customers removing the fog of how best to configure for the perfect balance of cost, efficiency and performance.

    Learn more about StorMagic SvSAN on our website: http://stormagic.com/svsan/
  • Augmenter l’efficacité de votre gestion logicielle - Snow Software Augmenter l’efficacité de votre gestion logicielle - Snow Software Karim Maadi Recorded: Jan 23 2017 52 mins
    Afin qu'une organisation puisse progresser dans ses niveaux de maturité SAM et parvenir à une gestion efficace de ses actifs logiciels, il est nécessaire qu'elle maîtrise bien son modèle d'optimisation et notamment les processus qui en découlent.
    Combinée à la solution Snow License Manager, Snow Automation Platform offre aux entreprises la capacité de modéliser et d'automatiser différents processus SAM (ou autres que SAM) à travers un portail web très intuitif et qui s'intègre nativement aux différents systèmes existants dans l'organisation (Active Directory, SCCM, Mail, Azure, ITSM, etc...).
    Nous vous invitons à assister à la présentation de la solution Snow Automation Platform et ses dernières nouveautés.
  • CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics Recorded: Jan 20 2017 15 mins
    CloudPhysics takes the complexities of your virtual infrastructure inventory, performance, and configuration analysis and compels the evaluation nearly effortless. Learn how to use the On Premise IT Cost Calculator to derive the value of your current workloads and use the Cost Calculator for Microsoft Azure to make an informed comparison of the two scenarios.
  • Advancing Business Performance: Align IT Vendor Risk to ERM Advancing Business Performance: Align IT Vendor Risk to ERM Scott Roller 3WP; Yo Delmar, MetricStream, Albert Biketi, HPE Security -Data Security, Riskonnect Jan 24 2017 6:00 pm UTC 60 mins
    Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.

    During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.

    - Causes of Vendor Risks incidents and the impact on the enterprise
    - Best approach to align IT vendor risk to enterprise risk
    - Building mature VRM Program
    - Role of technology in integrating Vendor risk to Enterprise risk management
  • Assembling a Container Security Program Assembling a Container Security Program Securosis and Aqua Security Jan 24 2017 6:00 pm UTC 60 mins
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Introduction to Swordfish: Scalable Storage Management Introduction to Swordfish: Scalable Storage Management Richelle Ahlvers, Chair, SNIA Scalable Storage Mgt Technical Work Group, Principal, Storage Management Architect, Broadcom Jan 24 2017 6:00 pm UTC 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Created by SNIA’s Scalable Storage Management Technical Work Group (SSM TWG), SNIA Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting. This session will present an overview of SNIA Swordfish including the new functionality added in version 1.1 released in January 2017.
  • Elevate IT Operations in the Boardroom with App Analytics Elevate IT Operations in the Boardroom with App Analytics Bryan Whitmarsh, Sr Principal Product Manager, Application Performance Management, CA Technologies Jan 24 2017 6:00 pm UTC 60 mins
    Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
  • Why you need to adopt an open architecture to secure your business Why you need to adopt an open architecture to secure your business Paul Brettle, ArcSight Architect, HPE Security Jan 24 2017 6:00 pm UTC 45 mins
    With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting open standards and architectures.

    By embracing new, innovative and open standards, security organizations can look to solve complex problems in a modern new way. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.

    This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Using the right approach and the right technologies are important to addressing requirements of log data storage, analysis, analytics and advanced security monitoring. Learn why integration is key and where ArcSight comes in.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Jan 24 2017 6:00 pm UTC 60 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • 5 traps to avoid and 5 ways to succeed with Big Data Analytics 5 traps to avoid and 5 ways to succeed with Big Data Analytics Hal Lavender, Chief Architect, Cognizant, Thomas Dinsmore, BI & Big Data Expert, Josh Klahr, VP Product Management, AtScale Jan 24 2017 6:00 pm UTC 60 mins
    When it comes to Big Data Analytics, do you know if you are on the right track to succeed in 2017?

    Is Hadoop where you should place your bet? Is Big Data in the Cloud a viable choice? Can you leverage your traditional Big Data investment, and dip your toe in modern Data Lakes too? How are peer and competitor enterprises thinking about BI on Big Data?

    Come learn 5 traps to avoid and 5 best practices to adopt, that leading enterprises use for their Big Data strategy that drive real, measurable business value.

    In this session you’ll hear from Hal Lavender, Chief Architetect of Cognizant Technologies, Thomas Dinsmore, Big Data Analytics expert and author of ‘Disruptive Analytics: Charting Your Strategy for Next-Generation Business Analytics, along with Josh Klahr, VP of Product, as they share real world approaches and achievements from innovative enterprises across the globe.

    Join this session to learn…

    - Why leading enterprises are choosing Cloud for Big Data in 2017
    - What 75% of enterprises plan to drive value out of their Big Data
    - How you can deliver business user access along with security and governance controls
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Jan 24 2017 6:00 pm UTC 60 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • 2016 Malware Review and Top Threat Predictions for 2017 2016 Malware Review and Top Threat Predictions for 2017 Tyler Moffitt | Senior Threat Research Analyst Jan 24 2017 6:00 pm UTC 45 mins
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
  • The GPU Manifesto: Why GPUs Will Take Over The Enterprise The GPU Manifesto: Why GPUs Will Take Over The Enterprise Todd Mostak Jan 24 2017 7:00 pm UTC 60 mins
    From game consoles to supercomputers and now the datacenter, GPUs are permeating more and more of the computing ecosystem. By boasting order of magnitude performance improvements on key tasks and exhibiting massive cost of ownership advancements these once specialized chips are writing a new chapter in enterprise computing. The MapD Manifesto talk will provide an overview on why GPUs are so well suited for analytics and visualization. Further, the talk will address what software optimizations MapD has employed to harness the parallel processing power of GPUs. Finally, this talk will discuss some of the potentially destructive analytical behaviors that result from having to wait minutes or hours for queries to complete. There will be live product demonstrations. Ample time will be left for Q&A.
  • The Tools and Technology Behind Empowering a Digital Workforce The Tools and Technology Behind Empowering a Digital Workforce Ali Mazaheri, Microsoft & Burke Fewel, DocuSign Jan 24 2017 7:00 pm UTC 60 mins
    Thanks to digital transformation, the workforce has changed. Employees expect to be engaged in digital ways, with the ability to complete work while mobile, access insights easily, and collaborate with ease.

    HR and IT leaders need to co-strategize how to respond to the growing digital expectations of today’s employees and to increase employee satisfaction, promote cross-group knowledge sharing, and improve productivity.

    Join this webcast to:
    - Learn how HR and IT can work together to empower employees, with specific examples of organizations that are doing just that
    - See how DocuSign has helped HR organizations make key functions like hiring, onboarding, and benefits enrollment paper-free, saving these companies time, reducing errors, increasing compliance, and improving employees' and candidates’ experience
    - Hear how DocuSign helps meet the HR needs of global enterprises with more than 40 signing languages and ease of integration with HRIS (Human Resource Information System) solutions
  • Demanding More Out of Your SIEM Demanding More Out of Your SIEM Eric Sun Jan 24 2017 7:00 pm UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Future-Proof Your Private Cloud with Software-Defined Storage Future-Proof Your Private Cloud with Software-Defined Storage Rob Whiteley, VP of Marketing, Hedvig Inc. Jan 24 2017 7:00 pm UTC 45 mins
    Many large organizations either can’t or won’t go all-in on the public cloud. Regulatory compliance, legacy infrastructure, and costs drive these organizations to build private clouds. Do you invest in VMs or containers? Do you use OpenStack, Kubernetes, or Mesos to orchestrate your cloud? How will you bridge your private cloud with AWS, Microsoft Azure, or Google Compute Cloud? You need a flexible architecture that not only embraces all the above, but facilitate frictionless movement among them.

    Specifically, you’ll learn how you can use software-defined storage to:
    1. Support any hypervisor, container, or cloud platform – simultaneously.
    2. Plug into any cloud orchestration tool to automate your private cloud.
    3. Integrate public cloud – and not just bolt it on – when you’re ready.
    4. Create self-service storage and sandboxes for DevOps environments.
  • How to Choose the Right Data Platform for Big Data Storage and Faster Apps How to Choose the Right Data Platform for Big Data Storage and Faster Apps Divya Mehra Principal Product Manager, Red Hat William Burns Senior Software Engineer, Red Hat Jan 24 2017 8:00 pm UTC 60 mins
    The convergence of mobile, social, big data, and cloud has increased demands on applications to react instantaneously to changes in data at a large scale. A delay of a few seconds can mean the difference between engaging or losing a customer.

    Application performance is highly correlated to how quickly an app can access and process a variety of data types. It's crucial that data platforms provide high performance as data changes, scales out linearly to handle large data sets, and maintains data integrity and security.

    Watch this webcast to learn about the market and data trends driving the need for computing and in-memory storage.
  • Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Michael Basilyan, Google Cloud Platform; Scott Jeschonek, Avere Systems; Jason Stowe, Cycle Computing Jan 24 2017 8:00 pm UTC 60 mins
    Google Cloud Platform, Avere Systems, and Cycle Computing experts will share best practices for advancing solutions to big challenges faced by enterprises with growing compute and storage needs. In this “best practices” webinar, you’ll hear how these companies are working to improve results that drive businesses forward through scalability, performance, and ease of management.

    In this webinar, you will learn:
    - How enterprises are using Google Cloud Platform to gain compute and storage capacity on-demand
    - Best practices for efficient use of cloud compute and storage resources
    - Overcoming the need for file systems within a hybrid cloud environment
    - Understand how to eliminate latency between cloud and data center architectures
    - Learn how to best manage simulation, analytics, and big data workloads in dynamic environments
    - Look at market dynamics drawing companies to new storage models over the next several years

    In just 60-minutes, you’ll be presented with a foundation to build infrastructure to support ongoing demand growth and have ample opportunity to ask direct questions to presenters.
  • “The Best Way To Predict Your Future Is To Create It.” “The Best Way To Predict Your Future Is To Create It.” Peter McCallum Jan 24 2017 9:00 pm UTC 45 mins
    More so than ever before, businesses are requiring IT to become less about infrastructure and more about availability and mobility of data. Yesterday’s IT shops were defined by the technology they chose to use rather than capabilities they could deliver to the business and its workforce. End users have become more savvy and less willing to accept limitations of traditional, static services. Technology has to adapt to timing, location and value of data on a global basis without restrictions. Based on these trends, FreeStor grew from roots in static infrastructure to now support the widest interoperability across storage platforms, protocols, hypervisors, clouds, and applications in the industry. See how FreeStor is helping to drive the goal of “infrastructure anywhere” for seamless delivery of data anywhere users need to be.
  • Leveraging Memory to Increase Disk Performance Leveraging Memory to Increase Disk Performance Petros Koutoupis, Lead Linux Systems Developer, IBM Cloud Object Storage (Cleversafe) Jan 24 2017 10:00 pm UTC 60 mins
    The future is now. Memory prices are dropping drastically and companies are investing heavily in them. That doesn't mean spinning magnetic disks are to disappear anytime in the near future. Their densities continue to rise and prices are significantly cheaper than that of memory. Operating at slower speeds, this presentation dives into the methods one can employ to increase the performance, and in turn the value of this slower and aging data storage technology.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 1:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Demanding More Out of Your SIEM - APAC Demanding More Out of Your SIEM - APAC Eric Sun Jan 25 2017 3:00 am UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 9:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits