Hi [[ session.user.profile.firstName ]]

Information Technology

  • Apache Kafka® + Machine Learning for Supply Chain 
    Apache Kafka® + Machine Learning for Supply Chain 
    Kai Waehner, Confluent + Graham Ganssle, Expero Recorded: Aug 23 2019 59 mins
    Automating multifaceted, complex workflows requires hybrid solutions like streaming analytics of IoT data, batch analytics like machine learning solutions, and real-time visualizations. Leaders in organizations who are responsible for global supply chain planning are responsible for working with and integrating with data from disparate sources around the world. Many of these data sources output information in real-time, which assists planners in operationalizing plans and interacting with manufacturing output. IoT sensors on manufacturing equipment and inventory control systems feed real-time processing pipelines to match actual production figures against planned schedules to calculate yield efficiency. 

    Using information from both real-time systems and batch optimization, supply chain managers are able to economize operations and automate tedious inventory and manufacturing accounting processes. Sitting on top of all these systems is a supply chain visualization tool, enabling users' visibility over the global supply chain. If you are responsible for key data integration initiatives, join for a detailed walk through of a customer's use of this system built using Confluent and Expero tools. 

    WHAT YOU'LL LEARN: 
    •See different use cases in automation industry and Industrial IoT (IIoT) where an event streaming platform adds business value. 
    •Understand different architecture options to leverage Apache Kafka and Confluent.
    •How to leverage different analytics tools and machine learning frameworks in a flexible and scalable way.
    •How real-time visualization ties together streaming and batch analytics for business users, interpreters, and analysts.
    •Understand how streaming and batch analytics optimize the supply chain planning workflow.
    •Conceptualize the intersection between resource utilization and manufacturing assets with long term planning and supply chain optimization.
  • How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with D
    How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with D
    Roger Grimes Recorded: Aug 23 2019 55 mins
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

    What you’ll learn:
    - How to enable DMARC, SPF, and DKIM
    - Common configuration mistakes
    - How to best configure DMARC and other defenses to fight phishing
    - Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • Uncovering Data Governance Maturity models
    Uncovering Data Governance Maturity models
    George Firican, Nicola Askham Recorded: Aug 23 2019 45 mins
    Are you planning to start a data governance program or have started one and want to know how to evolve it? A data governance maturity model might provide you with solutions. Join this session to gain an understanding into what maturity models are and how they can be used, while understanding their shortcomings and benefits
  • Forrester Research: Why agile integration is critical to digital transformation
    Forrester Research: Why agile integration is critical to digital transformation
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research Recorded: Aug 23 2019 32 mins
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research discusses the importance of agile integration in digital transformation initiatives. Recorded during Red Hat's Microservices, Containers, API's an Integration Day on May 21, 2019 in Chicago, IL.

    About the speaker:
    Jeffrey helps CIOs and digital leaders succeed by working with them to improve their software delivery capability and by helping them assess the relevance of emerging software technologies. As a 25-plus-year software industry veteran, he's helped clients improve their development shop culture, apply Agile and continuous delivery best practices, and build successful developer ecosystems.
  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Adam Dagnall, James Clark Recorded: Aug 23 2019 31 mins
    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.

    Cloudian is Part of the Splunk Technology Alliance Program
  • Alarmstufe Rot: Die aktuellen Auswirkungen des Fachkräftemangels in der IT-SEC.
    Alarmstufe Rot: Die aktuellen Auswirkungen des Fachkräftemangels in der IT-SEC.
    Lars Kroll, CISM, CISSP - Cyber Strategist Symantec (Deutschland) GmbH Recorded: Aug 23 2019 34 mins
    Cyberangriffe sind raffinierter denn je. Die meisten Menschen kennen großangelegte Hacker-Attacken nur
    aus dem Fernsehen. Für Cybersecurity-Experten ist die aggressive Threat-Landschaft von heute aber die tägliche Realität. Ihre Aufgabe? Eine schier endlose Abfolge von Attacken durch professionelle, bestens
    ausgestattete, hoch motivierte und erfahrene Angreifer zu stoppen.

    Was ist die Reihe „Alarmstufe Rot“?
    Die Studien in der Reihe „Alarmstufe Rot“ basieren auf einer Befragung von über 3.000 Cybersecurity-Entscheidern in Frankreich, Deutschland und im Vereinigten Königreich. Die Umfrageergebnisse wurden von Dr. Chris Brauer, Director of Innovation
    at Goldsmiths, University of London, ausgewertet und mit den Erfahrungen führender CISOs angereichert. Damit gibt Ihnen die Reihe „Alarmstufe Rot“ einen umfassenden Überblick über die Cybersecurity im Jahr 2019 – und hilft Ihnen, durchgehend die Kontrolle über Ihre IT zu behalten.

    Wir werden uns in vier Kapiteln verschiedenen Fragestellungen in der Cybersecurity widmen. Unsere Erkenntnisse, Analysen und Empfehlungen sollen Ihnen helfen, eine tragfähige Cybersecurity für die Cloud Generation zu implementieren. So schützen Sie den guten Ruf Ihres Unternehmens, sichern sich das Vertrauen Ihrer Kunden, vermeiden teure Bußgelder und schöpfen Ihre Budgets und Ressourcen optimal aus. In den kommenden Monaten werden wir uns mit vier Themen auseinandersetzen. In diesem Webcast gehen wir auf die ersten zwei Studienergebnisse ein:
    • Alarmstufe Rot Kapitel 1: Die Verkettung unglücklicher Umstände
    • Alarmstufe Rot Kapitel 2: Fertigkeiten
    in der Krise

    Weitere Webcasts zu diesem Thema sind in Vorbereitung:
    * Alarmstufe Rot Kapitel 3: Nach dem Angriff
    * Alarmstufe Rot Kapitel 4: Die Security-Landschaft der Zukunft

    Profitieren Sie von aufschlussreichen neuen Informationen und Analysen – und erfahren Sie, welche Alternative Ihnen Symantec als Marktführer bietet, um die Komplexität Ihrer Security nachhaltig zu reduzieren.
  • The Real Cost of Machine Identity Risk in the Financial Sector
    The Real Cost of Machine Identity Risk in the Financial Sector
    Dorothy Boyer, Director, Competitive & Market Intelligence, Broderick Perelli-Harris, Sr. Dir, Tech Sales EMEA Recorded: Aug 22 2019 58 mins
    Digital transformation has propelled a wave of new technological advancement that has arguably enriched people's lives. By the same token, the proliferation of machines - physical, virtual and in the cloud - has posed many security challenges and threats across industries, banking being the most noteworthy. As this "rise of machines" expands the threat vector, most banks and financial institutions are faced with increased pressure to protect their customer data and brand.
    In this webinar, we'll explore some of the key trends impacting machine identity protection in the financial sector. We'll look at how managing security risk has taken on a new meaning for the enterprise in today's threat landscape.

    Join our webinar and you'll also learn:
    - How machine identity protection has evolved within DevOps and in the Cloud
    - Ways to enforce a sound, enterprise-wide security policy
    - Recent data breaches in the financial sector and the aftermath
    - The next stage of machine identity protection
  • Why Build an Apache Kafka® Connector
    Why Build an Apache Kafka® Connector
    Sree Karuthody, Sr. Manager, Technology Partnerships, Confluent + Jeff Bean, Partner Solution Architect, Confluent Recorded: Aug 22 2019 39 mins
    Apache Kafka® is the technology behind event streaming which is fast becoming the central nervous system of flexible, scalable, modern data architectures. Customers want to connect their databases, data warehouses, applications, microservices and more, to power the event streaming platform. To connect to Apache Kafka, you need a connector!

    This online talk focuses on the key business drivers behind connecting to Kafka and introduces the new Confluent Verified Integrations Program. We’ll discuss what it takes to participate, the process and benefits of the program.
  • Case Study: Real-World Breach Response
    Case Study: Real-World Breach Response
    Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager Recorded: Aug 22 2019 44 mins
    Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

    In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
  • I Need to Access My Data from the Cloud - How?
    I Need to Access My Data from the Cloud - How?
    Ian Breitner - Product Marketing, Dell EMC Recorded: Aug 22 2019 25 mins
    Cloud is the rage – it has been for some time, but organizations are struggling to consume cloud resources whilst ensuring access to the data sets needed in their cloud consumption models, Learn what Dell Technologies can deliver to bring your data to your cloud applications.
  • Using Complete ITAM Data to Improve Your ITSM
    Using Complete ITAM Data to Improve Your ITSM
    Jason Yeary Recorded: Aug 22 2019 30 mins
    IT asset management (ITAM) and IT service management (ITSM) are the perfect partners in crime (so to speak). An organization’s success within each discipline can impact the employee’s experience. In fact, these two areas of IT should live together, fully integrated and compliment each other.

    The service desk is the epicenter for employees’ relationships with business technology, and IT asset management holds the data for the technology they use. That means a clear view of asset data and histories can help deliver better incident management and request fulfillment. It can drive successful change, problem, and release management. It can drive automated actions that connect employees to the resources they need, and help manage the risks that you don’t need.

    In this presentation, you’ll learn:
    - How to build a self-sustaining IT asset management strategy as a main pillar to growing your ITSM strategy
    - How to improve your existing incident management process by automatically linking tickets with the underlying assets related to them through asset discovery
    - How to analyze the impact of technology changes, and improve tracking and resolutions of employee impacting issues
  • [state of the internet]/security Credential Stuffing: Attacks and Economies
    [state of the internet]/security Credential Stuffing: Attacks and Economies
    Patrick Sullivan, Senior Director, Security Technology & Strategy Akamai and Shane Keats, Director of Global Industry Mktg. Recorded: Aug 22 2019 32 mins
    Webinar: Credential stuffing targets media

    January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.

    Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.

    During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies.

    You’ll learn:

    - Why cheap tools and free tutorials lower the bar of entry for would-be criminals
    - How malicious actors turn data breaches into substantial profits on darknet markets
    - What businesses can do to detect and prevent credential stuffing attacks
  • Episode Three: The E-rate Fear Less Solution
    Episode Three: The E-rate Fear Less Solution
    Holly Davis, CEO Komplement Business Development Consulting Recorded: Aug 22 2019 2 mins
    How to cost-effectively protect K-12 networks.

    The E-rate program is critical for K12 organizations that lack the funding to procure appropriate networking and cybersecurity solutions, such as firewalls and wireless security. But understanding the program — as well as confirming your E-rate eligibility — can be daunting.

    In this third episode of our E-rate series, expert Holly Davis discusses:

    •School eligibility
    •Discounts levels
    •Competitive bidding process.

    Watch the entire video series for valuable insights to help you confidently approach E-rate funding.



    For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at holly@komplement.us.
  • Data Loss Prevention Deep Dive: Protecting Sensitive Data
    Data Loss Prevention Deep Dive: Protecting Sensitive Data
    Shamil Turner, Industry Principle, Dropbox & Dror Liwer, CISO & Co-Founder, Coronet Recorded: Aug 22 2019 30 mins
    Data volume has been growing exponentially, dramatically increasing opportunities for theft and accidental disclosure of sensitive information. Companies are looking at Data Loss Prevention (DLP) solutions to help identify, monitor and protect sensitive data.
    Watch this Webinar to learn the importance of DLP, and how our products together can help you automate and align to your company’s security strategy.

    Coronet and Dropbox will cover how you can provide risk visualizations and implement a remediation strategy without disrupting end user productivity.

    In this Webinar, we will cover:

    - How to identify and block insider suspicious behavior
    - Ways to protect company data and content via DLP rules
    - How to protect Dropbox Business from malware and ransomware attacks
  • Why IoT Security is More Important Than Ever
    Why IoT Security is More Important Than Ever
    Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla Networks Recorded: Aug 22 2019 60 mins
    Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
    1. Defend against Cyberattacks
    2. Ensure Privacy Safeguards
    4. Minimize Reputational Risk
    5. Earn the Trust of your Customers

    Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.
  • Powering Jira Workflows with Real-Time Messaging
    Powering Jira Workflows with Real-Time Messaging
    Aaron Rothschild, Senior Product Manager of Integrations & John Thompson, Solution Architect Recorded: Aug 22 2019 40 mins
    Mattermost reduces friction for development teams who are working together on projects in Jira. Seamless integration allows you to post Jira information to and from multiple channels across your teams for easy collaboration and quick resolution.

    Join this webinar to see a live demonstration of how our Jira integration can help your team work together more efficiently, including:

    1. Admin configuration and setup
    2. Posting notifications from Jira projects into Mattermost channels
    3. Creating Jira issues and attaching messages to Jira directly through the user interface
    4. Taking action on Jira issues via slash commands

    After the live demonstration, we’ll have a Q&A session where we can answer all your questions!
  • 5 Ways to Make Your SOAR Initiatives Take Flight
    5 Ways to Make Your SOAR Initiatives Take Flight
    Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions Recorded: Aug 22 2019 44 mins
    This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.

    Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
  • Continuous Governance: Security and Compliance for Your Kubernetes Clusters
    Continuous Governance: Security and Compliance for Your Kubernetes Clusters
    Hitesh Parashar and Erik Melander, Astellent Inc. Recorded: Aug 22 2019 43 mins
    Containers, Kubernetes and OpenShift are radically redefining how security and compliance teams work with the product and development teams to secure their businesses. Continuous Integration (CI) and Continuous Delivery (CD) bring amazing agility and innovation to software development organizations but present unprecedented security challenges. Static security policies & checklists no longer suffice and don’t scale for containers in the enterprise. To truly get the business advantages of containers, enterprises need to evolve their approach to security. Security must become a continuous activity. It must be considered at every stage of your application and infrastructure lifecycle.

    Continuous Governance (CG) adds to CI/CD a shared model of security where compliance is not an after-thought but woven throughout the product, software engineering, infrastructure, operations, InfoSec and compliance organizations and culture.

    With this webinar, learn how containers, Kubernetes, OpenShift and Astellent Sigil (http://astellent.com/sigil) can help add Continuous Governance to your software development processes. Learn how you can maintain the agility and innovation that containers and Kubernetes provide while at the same time controlling and defending your Kubernetes clusters. With this webinar you will learn how to -

    Establish a preventative security posture by only running trusted code
    Verifiably prove the steps of your software supply chain
    Put in place integration with your existing tools to gather metadata for attestations
    Build flexible per-cluster policies to allow trusted images and emergency deployments
    Simplify governance with a single structured path for code to get from development to production
    Who is it for?

    Information Security teams
    Compliance teams
    Internal and external IT audit teams
    Container adoption teams
    Infrastructure teams
    Enterprise Architecture teams
    Applications and product teams
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Recorded: Aug 22 2019 59 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Accelerate Incident Response Through Automation
    Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Recorded: Aug 22 2019 29 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • Cost Optimize Your Success in the Cloud
    Cost Optimize Your Success in the Cloud
    Mike Boudreau, Director of Cloud Optimization at Mission Recorded: Aug 22 2019 35 mins
    There is a lot of information out there about saving money/cost optimization on AWS, but a lot of it comes with a catch. In this webinar, the Director of Cloud Optimization at Mission, Mike Boudreau, will identify these potential snags and how to avoid them, so you can optimize your success in the cloud.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Recorded: Aug 22 2019 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • Accelerating Modernization With Google Anthos
    Accelerating Modernization With Google Anthos
    Chris Kang, Field Solutions Engineer at Google and Mike Koleno, CTO of Cloud Practice, Solstice Recorded: Aug 22 2019 39 mins
    Google Cloud's introduction of Anthos promises to bring the best of managed Kubernetes to the cloud infrastructure of your choice, whether you are running private, public or hybrid cloud. This is the first offering of its kind provided by a public cloud provider. We will debunk the myths and provide a real-time look into how Anthos is being deployed and received in the enterprise field today.
  • Beating Friction Restriction:Facilitating a Frictionless Customer Experience
    Beating Friction Restriction:Facilitating a Frictionless Customer Experience
    Comcast Business Recorded: Aug 22 2019 54 mins
    In a digital economy, a frictionless customer experience has become the expectation. Given the need to balance agility and speed-to-market against the requirements for data integrity, having the right infrastructure in place is becoming increasingly critical in creating an omnichannel, seamless experience. In fact, a June 2019 Forbes article, “Are You Providing A Frictionless Customer Experience?”, noted that, to succeed, organizations must embrace technologies that reduce or eliminate friction for both customers and employees.

    Join us on August 22 at 1 p.m. ET for, "Beating Friction Restriction:Facilitating a Frictionless Customer Experience a webinar from Comcast Business. Our expert panelists will discuss what it takes to build a network geared to a frictionless experience for anyone that interacts with it.

    We’ll explore:
    •The technologies that support a frictionless platform
    •The tools that can be placed in the hands of customers and employees to create intuitive, simple digital experiences
    •Building a frictionless network based on specific enterprise needs and technical abilities and that can change with your market and business
    •Controlling the digital experience from anywhere
    •Assessing the level of management you need

    Panelists:
    •Martin Capurro, Vice President, Managed Services, Comcast Business.
    •Zeus Kerravala, founder & Principal Analyst, ZK Research, provides a mix of tactical advice to help his clients in the current business climate and long-term strategic advice.
  • Control Your Digital Transformation with IT4IT Value Streams
    Control Your Digital Transformation with IT4IT Value Streams
    Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro Focus Recorded: Aug 22 2019 52 mins
    Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?

    The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.

    Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.

    Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
  • SAM 2.0 - The Modern Approach to Software Asset Management
    SAM 2.0 - The Modern Approach to Software Asset Management
    Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam Aug 26 2019 5:00 pm UTC 44 mins
    The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
  • Securing the Hybrid Environment
    Securing the Hybrid Environment
    Michelle Johnson Cobb, Chief Marketing Officer, Skybox Security Aug 26 2019 5:00 pm UTC 33 mins
    For many organizations, the challenge of cloud security isn’t purely a cloud problem. As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks. To effectively protect these hybrid environments, organizations need to take a holistic approach to their security, understand their interconnections and dependencies, and ensure that security and compliance standards are being met anywhere in the network.

    Register for the webinar to secure your migration to the cloud and see the benefits of unifying security management across your hybrid environment.

    In this webinar, you’ll learn:

    -Why breaking down data silos between on-prem and multi-cloud networks is fundamental to good cyber hygiene — not to mention security team sanity
    -How data correlation can be used to detect vulnerabilities in cloud environments without an active scan
    -How the single-pane-of-glass view of your attack surface to supports secure cloud migrations
    -How attack surface modeling and analysis illuminates paths between and within networks, vulnerability exposures, misconfigurations, policy violations and more
    -What processes of hybrid security management can be offloaded to automation and what ingredients are needed to make that automation an effective risk-fighting tool
  • 6 Degrees of Network Security
    6 Degrees of Network Security
    Negisa Taymourian, Product Marketing Manager, Cisco Umbrella Aug 27 2019 12:00 am UTC 36 mins
    Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.
  • Platform of the Future - Efficiency (Part 5)
    Platform of the Future - Efficiency (Part 5)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 27 2019 1:00 am UTC 9 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • Discover the Latest Innovations at Tableau
    Discover the Latest Innovations at Tableau
    Jay Peir, Executive Vice President, Corporate Development and Strategy, Tableau Aug 27 2019 2:00 am UTC 50 mins
    Learn about Tableau and her exciting innovations, plus watch a demonstration of our products!
  • How to Quantify and Mitigate the True Costs of Downtime
    How to Quantify and Mitigate the True Costs of Downtime
    Melanie Postma - Product Marketing Manager, Navya Dwarakanath - Splunk/VictorOps Aug 27 2019 4:00 am UTC 34 mins
    How to Quantify and Mitigate the True Costs of Downtime
  • Exploring Petabyte-scale Storage for Unstructured Data
    Exploring Petabyte-scale Storage for Unstructured Data
    Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GM Aug 27 2019 4:30 am UTC 47 mins
    Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?

    Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
  • Migrating to AWS and Cloud-native architecture Through App Connectivity
    Migrating to AWS and Cloud-native architecture Through App Connectivity
    Philip Griffiths of NetFoundry & Mikko Marttinen of AWS Aug 27 2019 7:00 am UTC 30 mins
    Modern businesses are migrating towards cloud-first architectures, containerized microservices, and DevOps cultures in order to be innovative and rapidly bring new applications to market.
    But there’s a problem: Traditional networking technologies weren’t designed to support today’s complex application development environments. They are inflexible, complicated to manage and open enterprises to a host of new security challenges. The webinar will be delivered by NetFoundry, an Advanced Technology partner for AWS, as well as utilise customer challenges and use cases.

    Join this webinar to learn on:

    The ‘3rd option’ for connecting to AWS; private network benefits without private network hardware and wires
    How application connectivity (or ‘AppWANs’) increase your businesses agility and efficiency
    The benefits of app connectivity being integrated into your favourite tools like AWS CloudEndure and CloudFormation
    The role of Zero Trust in securing the world of application development
    The benefits of automating networking within CI/CD pipelines and workflows
    How Connectivity-as-Code based solutions can reshape your DevOps strategy

    If you are responsible for the development and deployment of applications, infrastructure or migrations, you won’t want to miss this educational webinar.

    Live online Aug 27 09:00 am European Summer, 10:00 am Finnish Summer
  • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief podcast Aug 27 2019 8:00 am UTC 19 mins
    On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.
  • Jak zaprojektować swój pierwszy klaster Ceph?
    Jak zaprojektować swój pierwszy klaster Ceph?
    Jarosław Biniek, SUSE; Jakub Kmiecik, Trecom Aug 27 2019 8:00 am UTC 90 mins
    Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat trzeciego spotkania to "Jak zaprojektować swój pierwszy klaster Ceph?"

    Plan warsztatów:
    - Co jest nam potrzebne do założenia Software-Defined Storage (software / hardware; minimalna konfiguracja do testów, nody zarządzające, monitorujące i storage
    - Rekomendacje odnośnie konfiguracji klastra produkcyjnego
    - Jak się zabrać do instalacji – przewodnik krok po kroku (jak założyć konto na SUSE.com, jak pobrać pliki instalacyjne, gdzie znajduje się dokumentacja i na co warto w niej zwrócić uwagę), proces instalacji - na co zwrócić uwagę, potencjalne pułapki; podstawy konfiguracji, jak odwzorować fizyczną infrastrukturę w crush map
    - Propozycje zastosowań Software-Defined Storage i pokaz używania SES w praktyce (disk-to-disk backup, obsługa obrazów wirtualnych maszyn, przestrzeń na pliki użytkowników serwerów Windows, serwowanie plików za pośrednictwem Samba).
  • SSL Visibility with SSLO Orchestrator
    SSL Visibility with SSLO Orchestrator
    Peter Silva - Senior Solutions Marketing Manager Aug 27 2019 8:00 am UTC 8 mins
    Are you equipped to decrypt? Over 80% of page loads are encrypted with SSL/TLS and attackers commonly use encryption to hide malicious payloads. If you’re not inspecting SSL/TLS traffic, you will miss attacks, and leave your organisation vulnerable. Watch the Lightboard Lesson video to learn how SSL Orchestrator provides robust decryption/encryption of SSL/TLS traffic.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Rajesh P, Aruba TAC Aug 27 2019 9:00 am UTC 90 mins
    Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.

    Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.

    Agenda:

    1. Introduction to Health Check and DPS
    2. Features and basic setup requirements
    3. Uplink health check configurations
    4. DPS Policies Configurations
    5. DPS policies verification
    6. DPS Traffic Verification
    7. Flow with routing plus DPS
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 1:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Create a Foundation for Agency Innovation with Dell Technologies
    Create a Foundation for Agency Innovation with Dell Technologies
    Ryan Vance, John Abrams and Al Ford, Dell Technologies Aug 27 2019 2:00 pm UTC 60 mins
    We empower U.S. government agencies with the people, process and technology to protect our nation’s digital future. Come learn how our data center solutions can fit any agency’s need for transformation from the edge to core to cloud. In addition, we will also discuss how data analytics provides you with the opportunity to increase your speed to decision as well as accuracy to decision. Our speaker will also share examples in which an intelligence layer is being added to the data or data analytics capabilities, which include: cyber, RPA, inferencing and multi-INT.

    Register for this webinar today to learn more!

    Click the "Attend" button and select from the "Add to Calendar" options. Open the calendar reminder and click on the link to register through GoToWebinar.

    Go to the URL below to test your system.
    https://support.logmeininc.com/gotowebinar/system-check-attendee
  • PREMIER uCPE Solutions
    PREMIER uCPE Solutions
    Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVA Aug 27 2019 3:00 pm UTC 60 mins
    While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
  • Unleash the Full Potential of Your Data
    Unleash the Full Potential of Your Data
    Krishna Subramanian, COO, Komprise & Chris Tinker, Chief Technologies, Hewlett Packard Enterprise Aug 27 2019 3:00 pm UTC 45 mins
    Hewlett Packard Enterprise and Komprise are partnering to transform data management. Komprise analyzes data across all storage, provides visibility into data growth, and transparently moves infrequently accessed data to cost-efficient HPE Scalable Storage. Join HPE and Komprise to learn how to modernize your infrastructure and unleash the full potential of your data.

    Topics:

    - Data growth industry trends
    - Analyze and move cold data to HPE Scalable Storage
    - Modernize Your Data Environment
    - Komprise and HPE joint value proposition
  • Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat Aug 27 2019 3:00 pm UTC 55 mins
    Successful companies are measuring success from "idea to execution" in weeks and months. Getting there means navigating nearly unlimited technical choices, for both application and operations teams. Learn how leading companies are making the right choices for their Hybrid Cloud, to drive new market opportunities and greater business success.

    Brian Gracely (@bgracely) is Director of Product Strategy at Red Hat, focused on OpenShift. He brings 20+ years of experience in Strategy, Product Management, Systems Engineering, Marketing and M&A. He is recognized as an industry thought-leader in Cloud Computing and DevOps, as well as being co-host of the award-winning podcast, The Cloudcast (@thecloudcastnet) and weekly Kubernetes podcast @PodCTL.
  • Converging Governance for Privacy and Third Party Risk
    Converging Governance for Privacy and Third Party Risk
    Linnea Solem Aug 27 2019 3:00 pm UTC 60 mins
    Converging Governance for Privacy and Third Party Risk with Linnea Solem CEO and Founder of Solem Risk Partners LLC
  • How Syniti delivers on the journey to SAP S/4HANA Central Finance
    How Syniti delivers on the journey to SAP S/4HANA Central Finance
    Susan Nee, Sr. Value Engineer at Syniti Aug 27 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP Advanced Data Migration for SAP Central Finance. See how to complete and maintain your SAP Central Finance program, allowing you to centralize your financial data and post to the supporting financial source systems. Using Syniti’s proven solutions and agile methodology will result in a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your organization.
  • Actian Partner Program
    Actian Partner Program
    Lisa McKenna, Vice President Channels & Business Development Aug 27 2019 3:00 pm UTC 60 mins
    If you are a VAD, VAR, MSP, ISV or technology business selling and servicing data management clients - your clients and your bottom line will benefit from this partnership.

    Actian Partner Program opens a new, recurring revenue stream while allowing you to offer your clients industry-leading data solutions. Actian Partner Program offers unmatched technology, competitive pricing and industry-leading incentives. Bundled with an all-inclusive set of sales tools and marketing resources plus a comprehensive support package to help you grow your business.

    Join us for our webinar to learn more!
  • 10 Tips for Achieving Cultural Change in DevOps
    10 Tips for Achieving Cultural Change in DevOps
    Jeffrey Martin (Director of Product, WhiteSource) Aug 27 2019 3:00 pm UTC 60 mins
    DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
  • Ultra AI - Building Corporate Intelligence Agency (CIA) - Part 1
    Ultra AI - Building Corporate Intelligence Agency (CIA) - Part 1
    Thomas B. Cross Aug 27 2019 3:00 pm UTC 45 mins
    Business Espionage & Sabotage Seminar on Building a Corporate Intelligence Agency (CIA)
    "Competitors have this time prevented us from knowing enough about them; but we have not prevented them from knowing far too much about us.”
    Critical analysis on building an ultra artificial intelligence and quantum computing for business intelligence gathering, internal and external threat assessment, competitive intelligence, customer assessment and actions and more.
  • 5 keys to success with open hybrid cloud
    5 keys to success with open hybrid cloud
    Irshad Raihan, Director Product Marketing, Red Hat & Annie Potvin, Sr Manager, Portfolio Programs Product Marketing, Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Hybrid cloud has become increasingly popular. But what exactly qualifies as a hybrid cloud? What applications can benefit from a hybrid cloud approach? How do application and workload portability impact business agility? What customer successes has Red Hat had through their solutions and consulting portfolio?

    Join this session to hear industry experts discuss 5 keys to their open hybrid cloud success.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat