The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
During the next 5 years, machine learning is poised to play a pivotal and transformational role in how IT Infrastructure is managed. Two key scenarios are possible: transforming infrastructure from a set of under-utilized capital assets to a highly efficient set of operational resources through dynamic provisioning based on consumption; and the identification of configurations, dependencies and the cause/effect of usage patterns through correlation analysis.
In the world of IT infrastructure, it’s all about efficient use of resources. With on-premise infrastructure (compute, storage and network) utilization rates for most organizations in the low single digits, the cloud has sold the promise of a breakthrough. For those organizations moving to Infrastructure as a Service (IaaS), utilization in the middle to high teens is possible, and for those moving to Platform as a Service (PaaS), utilization in the mid-twenties is within reach.
Dynamic provisioning driven by demand is essentially the same operational concept as power grids and municipal water systems – capacity allocation driven by where resources are consumed, rather than where they are produced.
The second part of the breakthrough relates to right-sizing infrastructure. Whether this is network capacity or compute Virtual Machine size – machine learning will enable analysis of the patterns of behavior by users and correlate them to the consumption of infrastructure resources.
During the near term, these benefits will be much more tactical. Automated discovery combined with behavioral correlation analysis will virtually eliminate the need for manual inventory and mapping of components and configuration items in the IT ecosystem to reveal how the ecosystem is operating.
Today, IT has the opportunity to automate the mapping of components in their infrastructure to provide a more accurate and actionable picture.
Modern SOCs looks very different than those that were built even a few years ago. This webinar discusses the fundamental shifts in thinking and technology that allow security teams to spend more time seeking out and detecting advanced attacks.
As every company becomes a technology company, merger and acquisition transactions increase and become more complex, and thus more susceptible to vulnerabilities. Often, companies involved are targeted by cyber attacks. Legacy IT systems are a costly, insecure barrier to realizing the full value of M&A.
Cloud identity access management is transforming the IT delivery of M&A. Connecting all the major stakeholders, like employees, partners, and customers, to every type of technology that they use is crucial. As a result, M&A can happen faster, more securely and at a lower cost.
Join our webinar to:
-Learn about IAM challenges in M&A
-Understand how Cloud IAM solves those challenges and provides business value
-See a live demo of the Okta Identity Cloud in M&A scenarios
Splunk Enterprise Security (ES) is an analytics-driven SIEM that powers successful security operations teams. But did you know it is actually made up of distinct frameworks that can each be leveraged independently to meet specific security use cases?
Join us to learn the technical details behind key ES frameworks including: asset and identity correlation, notable event, threat intelligence, risk analysis, investigation and adaptive response. Splunk experts will discuss real-world examples and demo the key frameworks, which will help you to solve your security challenges.
Girish Bhat, director of security product marketing at Splunk
Chris Shobert, senior sales engineer at Splunk
10min - Overview of Splunk Enterprise Security
40min - Demonstration of key frameworks
10min - Q&A
Ransomware’s showing no signs of slowing down – and neither are we!
We'll teach you about ransomware, how you can protect your data AND demonstrate why Varonis customers have some of the fastest response times in the industry.
Attend our Webinar to discover:
Warning signs of an impending ransomware attack
The most recent ransomware threats (Cryptolocker & its variants, Zcrypt, Locky, and more)
How Varonis customers:
Use DatAlert to detect suspicious behavior and insider threats
Stay up-to-date defending against the latest ransomware variants
Discover which files were affected and how to recover quickly
Join us at our next Career Conversations session. Career Conversations gives WSC members the opportunity to connect with career professionals. We'll discuss topics such as "What made them decide on IT or Cyber Security?, "What were some of their work/life challenges?" , "What skills and education do they see as essential to success?"
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations!
Guests: Jenn Henley, Director of Security, Facebook
Lisa Jiggetts, Founder and CEO of the Women's Society of Cyberjutsu will moderate discussions.
About the Speaker:
Jennifer Henley is the Director of Security Operations at Facebook. In her current role, Henley is responsible for operational excellence, organizational management, and program management for the Facebook Security team. A jack of all trades, she also runs internal and external security awareness and outreach efforts, most notably, Facebook’s popular “Hacktober” events for National Cyber Security Awareness Month. She is also deeply passionate about attracting and retaining a diverse set of talent to the security industry. Prior to her employment at Facebook, she was Chief of Staff for the CISO at PayPal.
Osterman Research conducted an in-depth, primary market research study, surveying 150 IT professionals knowledgeable about use of encryption in their organizations. This informative webinar will provide attendees with details on the survey results, address critical issues surrounding content encryption, and offer best practice recommendations and business process improvements for decision-makers to consider.
Highlights include the following:
• Statistics on manual and policy based content encryption use for email and file transfer
• Legal and regulatory impact of failing to encrypt content
• Complications related to mobile devices and cloud-based application use
• Barriers to adoption for content encryption
• Best practice recommendations including risk and business case analysis
The DataMotoin platform helps you safely exchange sensitive data in a secure and compliant way. This short 5 minute video gives you a high level overview of the some of the technical features and other abilities of the platform.
CloudCheckr TechTalk is a webcast series designed to help unlock the power of unified cost and security management. Whether you’re a power user or new user, our product experts will help you maximize your production using the CloudCheckr platform.
Join us for a deep dive into the CloudCheckr platform. Whether you or your team are new to CloudCheckr, everyone attending this session will learn:
SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.
Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
•A real-world customer journey for complete data security in SaaS.
•Common threats leading to data leaks from popular SaaS apps.
•Benefits of adopting a platform approach to SaaS security.
Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.
The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.
Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
Get inspired and informed by Eric Ogren, Sr Analyst at 451 Group, and Matt Rodgers, Head of Strategy at E8 Security, as they discuss how behavioral analytics is transforming security operations with improved visibility across endpoints, users, and networks. Learn how that translates into better detection and faster investigation time for security incidents.
Behavioral analytics is about un-complicating your security environment. The information is there, but how do you make the most of it? Security analysts should understand what’s happening without having to piece an incident together from scratch.
1. Why security teams are a company’s true heroes
2. Black holes: turning “more data” into “better data”
3. Navigating the grey area between the binary poles of true positive and false positive
Government networks, critical infrastructure and data are under a constant state of attack. The nature of these threats evolve on a daily basis. Hacktivists, nation states and cyber criminals push people, processes and technologies that make up Government cyber defenses to their breaking points.
In this webinar, Tony Cole, Vice President and Global Government Chief Technology Officer at FireEye, will be sharing how to:
-- Interpret and respond to trends in adversary capabilities and motivations.
-- Integrate and apply cyber intelligence to reduce risk, cost and operational overhead.
-- Improve readiness and response to minimize the impact of a breach.
Learn how you can apply best practices in intelligence-led security into your defenses.
Part 4 of 5: Easy Ways To Improve Your Security Posture
Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.
Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:
•Why tighter integration between the network and endpoint improves security posture
•How new REST APIs help orchestrate a rapid response at the endpoint
•What the future plans are for new APIs, integrations, and global threat intelligence
Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.
• Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
• Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
• Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
E-commerce, partner portals, customer service portals, and other cloud-enabled business services: Websites are the new front door to many businesses, and we expect to gain access whenever we want, from anywhere in the world, and from any device.
But what happens to the business when the website doesn’t perform as expected? And how do you protect your website(s) from nefarious traffic looking to harm your business by bringing it down, scraping content, changing content? Do you know whether your traffic is a human user - or is it a bot? Does the language (or a lack of communication whatsoever) between the business and the IT personnel leave you wondering what the potential issues might be?
During this expert panel discussion, we will explore the business impact of an underperforming or compromised website. You will:
- Learn more about what good website performance look likes
- Gain a deeper understanding of traffic on websites
- Understand how your website's performance affects other departments within the business
- Hear practical recommendations for business leaders on how to protect your website from compromise
Tin Zaw, Director Security Solutions, Verizon Digital Media Services
Laz, InfoSec Strategist and Professor
Edward Roberts, Director of Product Marketing, Distil Networks
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
It’s a fact: Digital Transformation is arguably the number one growth opportunity among today’s IT and business leaders. Organizations that embrace advanced technologies are attracting the best talent, optimizing productivity and creating enduring value for customers and shareholders.
Join us to engage with subject matter experts, network with peers and learn about new innovations that will streamline operational efficiencies and reinvent the way your organization performs with the advanced security you require in the cloud era.
View this webcast to:
• Learn about Microsoft’s vision for Digital Transformation
• Explore innovations that bridge the gap between intelligence and security
• Discuss how to optimize for teams and get the most from your biggest investment: People
Who Should view this webcast:
• Business leaders across Finance, Operations, Communications, Sales and Marketing
• CISOs, and VPs of Information Security
• CIOs and Innovation Officers
• IT Managers
The financial services industry (FSI) maintains high-value assets and typically operates in a very complex environment. Applications of all types—web applications, mobile applications, internal web services and so forth—are being developed quickly in response to market pressures by developers with limited security training and with relatively immature processes to support secure application development. This combination presents a juicy target for attackers, and data shows that the FSI continues to be a top target. Attempts to introduce security into the application life cycle frequently face challenges such as a lack of available application security expertise, concerns about costs for tooling, and a fear among product owners that security processes might impede the development cycle and slow their response to market conditions.
This webinar will explore:
- Who is the financial services industry (FSI)?
- Drivers of application security
- Inhibitors of application security
- The foundation of a secure SDLC
It's expected that by 2020, annual revenues around IoT solutions could exceed $470 billion. As all things IoT saturate the market (cars, tea kettles, toasters!) what does that mean from a security standpoint? What vulnerabilities aren't included in the fine print of these technologies? Join Ryan Orsi in episode three of our webinar series for a look at the current state of Wi-Fi Iot and what may lay ahead.
CSPi's Myricom nVoy Series assists in targeted cyber forensic analysis, and compliance assurance for IT and security resources. In this webinar, you'll learn how the nVoy solution makes it easy no matter if they’re just starting out building their network security capabilities or want to add to the infrastructure they already have in place. With just a few minutes of effort, they can build a cost-effective cyber threat visualization solution and implement better network monitoring, data capture, forensic analysis, and regulatory compliance adherence functionality.
Are you tormented by latency or outages that lead to lost revenue? Are you frustrated with the lack of comprehensive visibility that siloed solutions create? Never fear!
Join this webinar to learn how you can solve these problems and optimize your infrastructure with Dell EMC and Splunk. You’ll also see certified apps that Dell EMC has built in Splunk to help joint customers derive Operational Intelligence from their IT assets. We’ll share best practices, tips and tricks for successful deployments and rapid time-to-value that Splunk and
Dell EMC have learned from working with customers around the globe.
Cyber security is not working – budgets increasing only to be outstripped by the number and sophistication of threats and breaches. Organisations need to do things differently – stop just thinking about technology and start thinking about how security works for your business.
This webinar will look at forming a strategy tailored to your business and how organisation should start integrating and automating as much as possible. We'll also explore the importance of planning, prioritising spending and capability and maturity to manage risk
Learn how to drive new sales opportunities by adding complimentary Symantec solutions into your customer conversations. This session will overview the Symantec portfolio and identify the latest integrated value propositions your customers will want to understand.
Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?
By registering, you’ll gain valuable insights into:
Which techniques effectively block zero-day attacks.
Why robust endpoint protection plays such a critical component.
How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
With the mainstream adoption of DevOps, what does this mean for heavily regulated industries, such as financial services? How can an organisation that requires a clear segregation of duties between Dev and Ops, as well as strict regulations adopt the DevOps way?
Join this webinar for an optimistic view of how Dev(Sec)Ops can be applied in such challenging environments as well as examples of industry best practices.
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.
Among topics discussed:
- Trending business vulnerabilities in 2017
- Particularities of pentesting
- How to prepare for GDPR in 2018
- Implications of IoT, AI & machine learning on cyber security
- Yahoo breach
- Brexit and cybersecurity
- Recommendations to CISO's developing security strategies
About the speaker:
Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.
With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.
The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.
Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
The growth of state surveillance appears to be escalating dramatically. With the most recent Wikileaks Vault 7 revelations, it is clear that independent oversight is totally lacking and yet, much-needed if we ever hope to curb such unwarranted surveillance. Transparency relating to such activities is essential in order to hold governments accountable for their actions. The need for both global privacy and security - by design, is growing on a daily basis, and will be outlined in this presentation, in an effort to move things forward.
About the Presenter:
Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of Ryerson University’s Privacy and Big Data Institute. Dr. Cavoukian served an unprecedented three terms as the Information & Privacy Commissioner of Ontario, Canada. There she created Privacy by Design, a framework that seeks to proactively embed privacy into design, thereby achieving the strongest protection possible. In 2010, International Privacy Regulators unanimously passed a Resolution recognizing Privacy by Design as an international standard. Since then, PbD has been translated into 39 languages. Dr. Cavoukian has received numerous awards recognizing her leadership in privacy, most recently as of the Top 100 Leaders in Identity (January, 2017).
As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.
In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.
There’s no need for excuses. Register now and see what’s really happening on your network.
Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.
In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.
As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.
Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.
She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017, at the Newseum in Washington, D.C. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.
In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!
This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:
* Understand and map your enterprise infrastructure topology before you make a change
* Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
* Common mistakes to avoid when making changes to your network security devices
* How to better understand business requirements from the network security perspective
The status quo of old monitoring solutions and approaches can't handle today's complex, highly distributed service-oriented architectures. We’ve all tried implementing solutions in the past, expecting that they’d offer more visibility and control. But eventually all we got was just one more tool to maintain that didn't provide much value.
Splunk IT Service Intelligence (ITSI) solves this problem. The solution delivers an advanced data-centric approach to service monitoring driven by machine learning and analytics—taking operations and service intelligence to the next level.
Join us in this webinar for a live demo to see how you can:
- Gain service context by combining event and performance data
- Get the big picture of your environment to streamline operations
- Accelerate root-cause analysis and get ahead of customer-impacting outages
- Prioritize incident investigation and reduce time-to-resolution with events analytics
- Understand how analytics and machine learning can enhance service intelligence
Priya Balakrishnan, Director, Solutions Marketing at Splunk
Alok Bhide, Director, Product Management at Splunk
Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.
Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.
Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.
We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.
About the Presenters:
Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.
Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.
This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.
Learn how you can have both development velocity and security without compromising either one.
Security 101: Don't ignore those prompts to patch, learn about how cybercriminals exploit vulnerabilities in unpatched environments. Throughout the VIPRE Security 101 series, speakers have come back to the importance of patching. Im many cases, prompts to update Adobe, Java, Chrome, iTunes, Skype and others are to fix newly discovered security vulnerabilties in those products. Cyberminimals exploit those vulnerabbiliteies to open a backdoor onto your systems to drop malware and infect your network. Learn how to address these issues with steps to protect and product considerations.
How you access, manage, protect, and utilize your data is the challenge. Gartner reports the data volume is set to grow 800% over the next 5 years.
Nasuni offers a complete Azure-based enterprise file storage system to handle this data volume growth. The IT goal hasn’t changed. How to accomplish it has. The debate is not hardware versus the cloud. It’s how to create an intelligent file infrastructure that utilizes the cloud.
Join this webcast to learn how to:
- Store data centrally in one self-protecting global file system
- Make your data accessible anywhere, anytime
- Scale your storage at unheard-of cost efficiency
About the Presenter:
Andres Rodriguez brings to Nasuni the energy and experience of a visionary entrepreneur with several successful companies behind him. He oversees sales, marketing and strategic partnership development—and is the face of Nasuni.
His previous company, Archivas, developed an enterprise-class cloud storage system and was acquired by Hitachi Data Systems in 2006. As founder, CTO and charismatic frontman at Archivas, Andres was a key force in sales, partner development and marketing and oversaw all technology initiatives. After the acquisition, Andres became Hitachi’s CTO of File Services, supporting the worldwide rollout of the Archivas-based Hitachi Content Archive Platform (HCAP). Having seen his team and product successfully integrated with its acquirer’s, Andres turned his attention to his next venture, which, with its goal of making the benefits of cloud storage more accessible to the enterprise, was a natural progression from his last.