Browse communities
Browse communities
Presenting a webinar?

Best Practices of Securing Data in Storage and Archive

Chris Winter, Director of Product Management, SafeNet
NAS is invaluable to enterprises because of their accessibility, centralization of assets, and flexibility. But those attributes also make NAS file shares valuable targets and susceptible to exposure. By and large, many organizations are not effectively addressing the risks.

Join your fellow professionals to understand the best ways to secure storage and archive data, and then a discussion on encryption and access controls. Done correctly, deploying encryption in NAS environments can boost security and strengthen compliance. Done improperly, it can be a costly exercise that offers limited security and hampers business productivity. This webinar will show how organizations can maximize the chances of success with their NAS encryption initiatives.
Jun 13 2012
49 mins
Best Practices of Securing Data in Storage and Archive
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (111)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Traditional PBX vs Cloud Communications: A Customer Weighs-in Apr 15 2015 5:00 pm UTC 15 mins
    RingCentral
    Coldwell Banker Mid-America Group is a real estate brokerage with approximately 200 agents in central Iowa. Recently the company switched from an expensive Avaya PBX system to a RingCentral cloud communications solution. Director of IT Paul Clowser says, “Agents now have much more control over their needs without having to contact IT.”
  • From the Front Lines: The Top 10 DNS Attacks Apr 9 2015 5:00 pm UTC 45 mins
    Srikrupa Srivatsan, Sr. Product Marketing Manager, Infoblox
    More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
  • How Mobile Data Protection Can Accelerate Top CIO Initiatives Apr 8 2015 4:00 pm UTC 60 mins
    Dave Packer, Director of Product Marketing & Seyi Verma, Sr. Product Marketing Manager
    The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • Three Ways to Increase Productivity with Unified Communications Apr 7 2015 5:00 pm UTC 45 mins
    John Scarborough, SVP Marketing & Product Management, MegaPath
    Year-over-year, the number of organizations moving from one-off communication tools to a more collaborative approach are growing dramatically. A key driving force behind this shift is the increase in worker mobility. Research shows that within 3 years, 51% of organizations will be doing businesses primarily over mobile devices. Without the presence of a unified communication system, the increase in mobility may not translate into an increase in productivity.

    In this webinar, you will learn three ways to increase productivity with your unified communications platform.
  • Easing Your Transition to a Cloud Phone System Apr 7 2015 3:00 pm UTC 15 mins
    RingCentral
    When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.
  • VMware Virtual Volumes – What impact will they have on the datacenter? Apr 2 2015 4:00 pm UTC 60 mins
    Tom Fenton, Taneja Group; Eric Siebert, HP; Joel Kaufman, NetApp; Ben Bolles, NexGen
    Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?

    Panelists:
    Eric Siebert, Worldwide Solutions Marketing Manager; HP
    Joel Kaufman, VMware Technical Director; NetApp
    Ben Bolles, VP Products; NexGen Storage
  • Lyft Case Study: Achieving Growth with Cloud Communications Apr 1 2015 5:00 pm UTC 15 mins
    RingCentral
    Pick up your smartphone, tap a button, and get a lift to wherever you need to go. That’s the idea behind Lyft, the San Francisco-based company whose service is now available in five major metropolitan areas.

    “We wouldn’t be able to operate at this capacity without a product like RingCentral,” says Adam Fishman, Director of Growth and Operations. “We needed something that was fast, scalable, and had all the features we were missing.”

    With RingCentral, Lyft has realized an exponential growth in productivity, including:

    -An increase in call-back rates from 5% to nearly 50%
    -More than 100% improvement in outbound call volume

    Watch the video to understand the role cloud communications plays in turning a good idea into something revolutionary.
  • Hyper-converged Infrastructure: A Hype-Free Buyer’s Guide Mar 31 2015 6:00 pm UTC 45 mins
    Jon Toigo, Chairman, Data Management Institute; Sushant Rao, Sr. Director of Product Marketing, DataCore Software
    Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • How Rackspace Makes OpenStack Production-Ready Mar 31 2015 3:00 pm UTC 60 mins
    Christian Foster, Director of Marketing for Rackspace Private Cloud; Justin Shepherd, RPC Distinguished Architect
    As companies explore how they can leverage OpenStack to advance their business, they often ask if OpenStack is really “production-ready.” Through co-founding OpenStack, running one of the world’s largest OpenStack clouds, and managing OpenStack private clouds for enterprises, we know what is takes to make OpenStack production-ready. In this session, Justin Shepard, a Rackspace distinguished architect, will discuss what it means to be "production-ready" and how we designed Rackspace Private Cloud Powered By OpenStack to run production workloads. Register today to join this insightful and informative discussion.
  • Simplifying Private Cloud Deployments: The Next Generation of Network Automation Recorded: Mar 26 2015 29 mins
    Matt Gowarty, Sr. Product Marketing Manager
    Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Why Capacity Management is Essential for a Cloud Strategy Recorded: Mar 26 2015 50 mins
    Marina Yesakova, Sr. Marketing Manager; Giuseppe Nardiello, Sr. Product Manager, BMC Software
    To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:

    • Gain visibility into capacity utilization at the resource, service, and business level.
    • Support timely decision-making on IT investments.
    • Increase agility, reduce IT costs, and minimize risks.

    Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
  • Accelerate your Desktop Transformation Strategy: Six New Additions to Horizon 6 Recorded: Mar 25 2015 59 mins
    Sumit Dhawan, SVP and GM of VMware Desktops
    Join us as Sumit Dhawan, SVP and GM of VMware Desktops, unveils the next wave of application and desktop innovations:

    - Six key new enhancements to Horizon 6
    - Features that help you deliver unlimited access to desktops and apps at lower costs, with better performance (think 3D!) - and at unprecedented scale
    - New technology demonstrations that bring together virtual networking, storage, desktops and apps
  • Cloud-based Computing Survey Results: Adoption Trends and Security Concerns Recorded: Mar 25 2015 7 mins
    Kris Bondi, VP of Marketing, Moka5
    Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Deploying a Cloud Scale App with Rackspace DevOps Automation Recorded: Mar 25 2015 50 mins
    Eric Brinkman
    Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Visions For Ethernet Connected Drives Recorded: Mar 25 2015 61 mins
    Chris DePuy, Vice President, Dell’Oro Group; David Fair, SNIA-ESF Chair
    The arrival of mass-storage services, the emergence of analytics applications and the adoption of Object Storage by the cloud-services industry have provided an impetus for new storage hardware architectures. One such underlying hardware technology is the Ethernet connected hard drive, which is in early stages of availability.

    Join this Webcast to hear Chris DePuy, Vice President of Dell’Oro Group, share findings from interviews with storage-related companies, including those selling hard drives, semiconductors, peripherals and systems. Chris will present some common themes uncovered, including:
    •What system-level architectural changes may be needed to support Ethernet connected drives
    •What capabilities may emerge as a result of the availability of these new drives
    •What part of the value chain spends the time and money to package working solutions
    This Webcast will also present some revenue and unit statistics about the storage systems and hard drive markets and will discuss potential market scenarios that may unfold as a result of the Object storage and Ethernet connected drive trends.
  • Leveraging Cloud Connected Storage for Limitless and Backup-less NAS Recorded: Mar 25 2015 39 mins
    Fred Pinkett, Senior Director of Product Marketing
    The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Private and Hybrid Cloud – What Are Their Roles in a Modern Datacenter? Recorded: Mar 24 2015 63 mins
    Tom Fenton, Taneja Group; Steve Wilson, Citrix; Burzin Patel, Microsoft; Bryan Che, Red Hat; Mathew Lodge, VMware
    Join us for this informative 60 minute roundtable as we discuss how private and hybrid clouds fit into the modern datacenter. This panel includes top luminaries from major private and hybrid cloud providers. Some of the questions we will be asking include: Why use private and hybrid clouds instead of public clouds? Are all workloads suitable for these types of clouds? What are the economic factors that play into these types of clouds? Are they a transitional technology or the new normal?

    Panelists:
    Steve Wilson, VP Cloud Software, Citrix
    Burzin Patel, Director of Product Marketing, Microsoft
    Bryan Che, General Manager, Cloud Product Strategy, Red Hat
    Mathew Lodge, VP Product Marketing and Management, Cloud Services, VMware
  • Choosing the Right DCIM Software: of RFPs, POCs and Other Adventures Recorded: Mar 24 2015 49 mins
    Jason Sherman, Director of Sales Engineering, Graphical Networks
    So you have been tasked to find a DCIM solution for your organization. There's only about a hundred of them, so that sounds like fun!

    Before you plunge into mind-numbing RFP writing, join Jason Sherman, Director of Sales Engineering at Graphical Networks as he provides valuable tips and tricks of the trade that can save you time and energy.

    We'll go over some of the aspects that may be forgotten in the RFP writing process as well as requirements for a meaningful proof of concept, and other important things to consider when evaluating a DCIM software tool.
  • 5 Reasons to Deploy File Sync in a Private Cloud Environment Recorded: Mar 24 2015 27 mins
    Trace Ronning, Content Marketing Manager, eFolder
    The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • Cost Analysis of On-Premise vs. Cloud Phone Systems Recorded: Mar 24 2015 3 mins
    RingCentral
    There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices of Securing Data in Storage and Archive
  • Live at: Jun 13 2012 3:00 pm
  • Presented by: Chris Winter, Director of Product Management, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this