The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Nathan Burke, CMO @ AxoniusRecorded: Jul 19 20194 mins
By connecting to the management and security tools that customers already use and the network infrastructure, Axonius gives customers a credible, comprehensive asset inventory. From laptops & desktops, servers and VMs, cloud instances and mobile devices, to IoT and OT, if an asset is part of your environment it can be discovered.
Providing customers with a true, always up-to-date inventory of assets is the first step in uncovering security gaps and enforcing policies to take automated actions like enriching CMBD data and creating incidents when any asset is not in line with the overall security policy.
Guy Fletcher, CISO @ AppsFlyerRecorded: Jul 19 20192 mins
With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.
“Asset management and what Axonius provides is a core element. You can’t build a house without having a solid foundation. Asset management and understanding what you have is basic.” -- Guy Fletcher, CISO @ AppsFlyer
Dean Sysman, CEO & Co-Founder @ AxoniusRecorded: Jul 19 20194 mins
A security teams job is so difficult today - but they’re still spending time figuring out where things are and what they are. The more solutions you have the harder it is to understand where something is, who owns it, and does it actually fit your security policy.
Asset management isn’t sexy - but at the end of the day, everything you’re doing in your security program relies on a foundation of knowing what your assets are and if they’re fitting that security policy.
Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.
In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:
• Prometheus to gather the metrics for the platform.
• AWS CloudWatch to gather metrics for additional components/services.
• Grafana to centralize from multiple sources and visualize all of the cluster metrics.
• Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
• Slack to notify the operations team.
• Dynatrace for application and end-to-end monitoring.
Tom Gillis and Sylvain Cazard, VMwareRecorded: Jul 19 201926 mins
Hear from Industry veteran, Tom Gillis, Senior Vice-President and General Manager of VMware’s Network and Security Business Unit during his recent visit to London for a fascinating and wide-ranging conversation: his extensive background in the industry, and his views on how digital transformation is driving a fundamental shift in the way we architect networks and conceptually approach IT security.
You’ll also hear from the horse’s mouth about VMware’s latest star launches in the Networking and Security space: NSX-T 2.4, the Service -Defined Firewall and how we confidentially expect that these will revolutionise the market.
Taking part to give the perspective from this side of the Atlantic is Sylvain Cazard, Vice-President of VMware’s Software-Defined Datacenter business in EMEA.
VMware’s Scott McKinnon, Business Solutions Architect and Garry Owen, Networking & Security Solutions MarketingRecorded: Jul 19 201927 mins
The second fastest growing cost in IT is security. The fastest? The financial impact of breaches. Something isn’t working, which means a new approach is needed.
Hear from VMware’s Scott McKinnon and Garry Owen as they talk about the end of castle walls, the beginning of app defence, and what you need to do to secure your business in the era of ever-evolving threats.
Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery ServiceRecorded: Jul 19 201946 mins
You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.
In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.
•The Red Hat IT standard development and deployment pattern.
•How to automate your CI/CD delivery pipeline, from merge request to release.
•How to implement basic supply chain security to support application integrity.
•How we deal with security and change management requirements.
•The tools and processes needed to implement this model.
This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
Is your business struggling to secure its IT as it goes through digital transformation?
Sylvain Cazard, VP EMEA, Software Defined Datacenter, Networking & Security at VMware EMEA explains how the current security model is broken, with businesses managing too many security vendors and focusing too heavily on a reactive approach.
With intrinsic built-in security, VMware’s infrastructure means you’re better protected, so you can focus more on innovation and performance.
Find out how VMware could transform your businesses’ security:
How many assets are in your environment? Most security teams don’t know. Asset management is a huge, nagging problem that is only getting worse. With the increase in the number and types of devices in today’s corporate environment, compounded by trends like BYOD, Cloud and IoT, it’s nearly impossible to understand how many devices are on our networks, what’s on them and whether they comply with the overall security policy. Until now.
Enter Axonius, a simple solution with a unique approach. By aggregating existing business data from over 130 management and security solutions, the Axonius Cybersecurity Asset Management Platform provides actionable visibility and automated security policy enforcement for every asset and user.
Ajay Chenampara, Senior Specialist Solutions Architect, Ansible Network Automation, Red Hat & Andrius Benokraitis, PrincipalRecorded: Jul 19 201954 mins
Check out this webinar if you're interested in the latest questions around network automation. Want more? Visit our Github Community for Network Automation (https://github.com/network-automation). Want to join the Github Community? Have a question? Email us at email@example.com. Register for an upcoming Ask an Expert webinar. Any question - from beginner to advanced - is welcome, and will be addressed in an open forum with Ansible staff.
Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat CitrixRecorded: Jul 19 201946 mins
Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.
This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
Meg Ramsey, Vice President Cloud Services - Sungard AS & Bill Martorelli, Principal Analyst - ForresterRecorded: Jul 19 201928 mins
This 30-minute webinar, Optimizing for Success in the Cloud, features guest speaker Forrester Principal Analyst, Bill Martorelli, talking about the latest trends in digital transformation and how accomplishing success doesn’t have to disrupt ongoing operations. Sungard AS’ Meg Ramsey discusses the Sungard AS solutions that deliver innovative digital services your business needs with the quality your customers demand.
Dirk Thelen und Dirk SchülerRecorded: Jul 19 201949 mins
Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!
Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
Jon Wallace, Technologist at InstartRecorded: Jul 18 201963 mins
Join Instart Technologist, Jon Wallace, to learn about the 7 most common website and web application attacks and how you can prevent them with the right preparation.
Anyone who operates a website should be concerned about security, especially the security of your sensitive customer information - this much should be obvious to you by now. However, unless you keep an ear to the ground about security news, it is often only the most high profile or sophisticated attacks that you actually hear about. The reality is that common, low level attacks are executed every single day against websites and web applications. There is a reason the OWASP top 10 hasn’t changed in years. The good news is these types of attacks are preventable with the right preparation.
In this webinar, you will learn:
-What motivates hackers
-What makes an application a target
-What are the 7 most common website and web application attacks
-How you should protect your assets
Every use case differs in the way it defines and executes password resets, but ultimately it’s imperative for many platforms to verify users’ identities for each password reset request – from enterprise employees to government applications and even with e-commerce and other human-centric sites.
Platforms that integrate a secure identity verification method into their password reset process will benefit from having a greater level of assurance that the person initiating the reset is in fact who they say they are, and furthermore, will ensure that the user isn’t a bot or a bad actor impersonating an active user.
For industries like finance, insurance, and healthcare that deal with a lot of personally identifiable information (PII) and other highly sensitive data, leveraging more rigorous verification standards for password resets becomes especially critical.
In this webinar, we’ll discuss a range of identity verification methods with various assurance levels so that organizations of all sizes and industries can better understand how to build a password reset program that meets their specific security needs.
- Level set on why identity verification is important for account security and password reset interactions and how it affects every type of organization.
- In-depth review of the most effective identity verification methods for successful (and secure) password resets.
- Explore how identity verification works with multi-factor authentication for password resets.
Gary Marsden, Senior Director of Data Protection Services at ThalesRecorded: Jul 18 201944 mins
Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.
Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.
This informative webinar will cover:
• A current view of the cloud’s impact on IT business models
• Why HSMs are critical to data security on premise or in the cloud
• How creating centralized key management and security strategy will make your cloud life a whole lot easier
• Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red HatRecorded: Jul 18 201944 mins
The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?
Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.
In this webinar, we’ll cover:
•Challenges of brownfield migrations.
•Things to consider before, during, and after migration.
•Phases of the example migration.
Tony Ramirez, Mobile Security Analyst / Brian Reed, Chief Mobility OfficerRecorded: Jul 18 201964 mins
Are you ready for Android Q and iOS 13? Apple and Google’s forthcoming mobile operating systems boast a bevy of privacy features that enable users to seize more control of their personal data.
NowSecure Mobile Security Analyst Tony Ramirez will share a deep dive into Android and iOS application security and privacy enhancements and what they mean for mobile DevSecOps teams. Join us to learn about:
+ Increased transparency and granularity over location tracking
+ New protections for sensitive information
+ Safer data exchanges in Android Q through TLS 1.3 encryption
Amanvir Sangha, Consultant, SynopsysRecorded: Jul 18 201969 mins
We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.
Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
Joshua Bartolomie, Director, Research and Development and KJ Jagtap, Product Marketing Manager, CofenseRecorded: Jul 18 201947 mins
Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognize phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.
This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organizations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.
Join this webinar to learn about:
- The constantly changing threat landscape
- Turning active, real threats into learning moments for your users
- Speeding up response with timely, actionable intelligence
Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuthRecorded: Jul 18 201942 mins
Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.
Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.
Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.
The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD - Sr Director of Engineering and Data ScienceJul 22 20191:00 pmUTC60 mins
The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before.
In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.
You will learn:
- What the threat looks like on a global scale, as observed through Secureworks' Incident Response engagements
- Data Science 101, including definitions of Data Science (DS), Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
- How our detectors work, including Domain Generation Algorithm (DGA) Detection
Chris Roberts, Chief Security Strategist and Hacker, and Tony Cole, CTOJul 22 20195:00 pmUTC60 mins
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Pano Xinos, Global Telco Marketing Lead, Red HatJul 22 20196:00 pmUTC15 mins
This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.
In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.
OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
Darren Thomson, EMEA CTO SymantecJul 22 20199:00 pmUTC11 mins
As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.
Join Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
Dean Nicolls, VP of Marketing, Jumio Corp.Jul 23 20197:00 amUTC26 mins
Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.
Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.
Join us for this informative “how-to” webinar and discover how to…
- Dissect the abandonment problem
- Reduce the number of identity verification screens & clicks
- Cast a wider net with omni-channel verification
- To say “no” to verification “maybes”
Moving towards a cloud play in your given environment? Thinking that AzureAD will be your future authentication strategy? It’s likely you’ll still need access to some on-premises resources that won’t make it over that quickly or others that are running outside of a pure Microsoft feature set, such as Amazon (AWS) or Google Cloud Platform (GCP). In this session, you’ll learn how Citrix ADC bridges the gap between clouds, and how to integrate remaining datacenter resources into a common offering while maintaining user experience. Plus, explore the elements that constitute a true hybrid cloud infrastructure, which will likely be the longest migration episode in many IT lives.
Cyber Security Brief PodcastJul 23 20198:00 amUTC22 mins
On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security.
Amandeep Nagra, Blake ConnellJul 23 20199:00 amUTC42 mins
What separates workspace pretenders from leaders? Apart from having a complete portfolio of integrated services spanning devices, apps, desktops, networks and files, Citrix has a unique advantage in Citrix Analytics. Citrix Workspace is the only workspace with a machine learning–based analytics platform that delivers intelligence around user behavior. This helps customers reduce the risk of insider attacks based on user risk profiles and provide a range of remediation actions at every step of the user journey to stop the attack in its path. Citrix Workspace also integrates with SIEM vendors and connects with Microsoft Graph, blending Microsoft data sources with Citrix risk indicators to provide an even more comprehensive user security profile. Join us in this session to learn how you can unlock even more value in Citrix Workspace with improved security via ML and Citrix Analytics.
Lars Norling, ADB SAFEGAT; Joost van der Struijk, Videns; Eyal Webber-Zvik, Cato NetworksJul 23 20199:00 amUTC31 mins
Learn how ADB SAFEGATE, together with Videns IT Services, had successfully migrated 24 global sites from MPLS to SD-WAN. Join us as we uncover the challenges, and offer a walkthrough for a successful global SD-WAN project - sharing insights and tips on how to avoid common pitfalls.
John Gudmundson, Sr. Product Marketing Manager GigamonJul 23 201912:00 pmUTC53 mins
Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?
Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.
During this live demonstration, you’ll see how Application Intelligence helps you:
• Identify and extract traffic from over 3,000 applications
• Detect and manage shadow IT and rogue apps
• Separate unnecessary application traffic to greatly improve tool efficiency
We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.
Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)²Jul 23 201912:00 pmUTC60 mins
Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.
This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.
Join this webinar to learn about:
-The constantly changing threat landscape
-Turning active, real threats into learning moments for your users
-Speeding up response with timely, actionable intelligence
John Pescatore - Director, SANS InstituteJul 23 20191:00 pmUTC10 mins
Infrastructure and security have always been linked, but not particularly successful. Why has it failed in the past and what needs to happen now? Learn how organizations can make major advances without adding more complexity
Darren Thomson, EMEA CTO, Symantec and Dr Chris Brauer Goldsmiths UniversityJul 23 20191:00 pmUTC32 mins
Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to keep their business safe. Over a quarter say they are vulnerable to avoidable incidents.
A brand new survey of over 3,000 cyber security professionals reveals that intense pressure is affecting decision making and increasing the risk of critical mistakes. Put simply, today’s constant state of high alert is unsustainable.
Join leading psychologist Dr Chris Brauer from Goldsmith’s College, University of London, and Symantec EMEA CTO Darren Thompson, as they present the survey findings, and analyse what they mean for organisations like yours, including:
-What cyber security leaders and professionals really feel about their roles in 2019
-How to build a plan to reduce stress and improve cyber security effectiveness
-Why the Symantec Integrated Cyber Defense Platform can help put your plan into action.
Mike Fecher, Technical Account Manager, Marshall England, VP MarketingJul 23 20193:00 pmUTC60 mins
How to Manage Network Growth, Complexity & Speed: Flow-Aware Load Balancing
As data volume and speeds of networks increase with more devices, applications and endpoints connecting to corporate, telecom and carrier networks, network engineers and operators are being overwhelmed with increasingly complex protocols and growing network traffic.
Complicating matters are overly encapsulated and messy packet headers that can degrade performance and efficiency of network operations. Network engineers and operators are challenged to manage this infrastructure with a mix of new and old tools designed for lower speeds.
Join Mike Fecher, Technical Account Manager and Marshall England, VP Marketing, MantisNet, for this 45-minute, webinar as they discuss how implementing flow-aware load balancing can help manage the growth, complexity and speed of networks, at scale, without sacrificing quality and accuracy needed to monitor and manage critical network traffic. We’ll illustrate how we make complex traffic types and overly encapsulated packets more efficient for processing.
As network speeds will continue to grow (200G / 400G is coming), engineers will want to know more about flow-aware load balancing.
Attendees of the webinar will learn:
•Fundamentals of flow-aware load balancing, compared to other load balancing methods
•Why flow-aware load balancing should be employed and where it should be deployed
•How flow-aware load balancing can extend the utility of network tools
•How flow aware load balancing reduces congestion and improves performance
Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GMJul 23 20194:00 pmUTC47 mins
Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?
Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
Security Standards Organizations - The good, the bad, and the ugly? This session covers the evolution of a number of technologies to address the evolving threat models. Changes to the SOC and response technologies will be included.
Is your organization struggling with inefficiencies from an outdated, scale-up approach to managing and protecting data? The need for a fully integrated data protection appliance to deliver greater availability and scalable services for on-premises applications and data is becoming a necessity.
Join us as we discuss the benefits of a scale-out infrastructure and how the launch of Commvault HyperScale™ Appliance and Commvault HyperScale™ Software address the shift enterprises are making towards secondary storage as a means to drive key business and IT transformation initiatives.
In this webinar, you will learn:
•Scale-out vs. scale-up infrastructures
•How to leverage a scale–out infrastructure
•How you can save time and drive greater value with an integrated data protection appliance or reference design architecture
•How Commvault HyperScale™ Appliance tightly integrates compute, storage, full lifecycle data protection and analytics into a single platform
It’s time for a fresh approach to solving data management challenges. Register today and learn how you can achieve IT agility through a scale-out infrastructure.
Richard Tychansky, Travis Jeppson, Brandon Dunlap (Moderator)Jul 23 20195:00 pmUTC60 mins
(ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 3000+ attendees and over 180 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.
In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented
Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
"Trusted” Websites Are Not as Safe as First Thought!
Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.
Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.
Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.
- Why the Internet remains a dangerous place
- Best practices for lowering the odds of a cyberattack
- Newer technologies that are solving this problem
Sean Walker, Enterprise Account ExecutiveJul 23 20195:00 pmUTC36 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Tim Appnel, Ansible Senior Product Manager, Red HatJul 23 20195:00 pmUTC64 mins
This webinar is based on Tim Appnel's talk from AnsibleFest Austin 2018, which was a followup to Ansible Best Practices: The Essentials. It delves into the topic of developing roles and modules to extend the power of Ansible automation while maintaining readability and simplicity. Based on actual experiences helping Ansible users, we show you what to do (and what not to do) to create the most reliable, resilient, and easy-to-manage automation solutions.
Clarke Patterson - Head of Product MarketingJul 23 20195:00 pmUTC58 mins
Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.
In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:
-How to design any-to-any batch and streaming pipelines into and out of Kafka.
-How to monitor end-to-end dataflows through Kafka.
-How to operate continuous data movement with agility as data sources and architecture evolve.