Adobe Acrobat X: Reduce Risk and Protect Documents
Control your work and help secure sensitive information. Attend this webinar to hear about best practices for implementing security policies and how Acrobat X and Reader X implement security standards.
In this presentation, you will learn how to:
- Protect information - use Adobe Acrobat Pro X to set permissions, limit access and control user interaction
- Save time and accelerate document workflows with electronic document signatures
- Permanently remove content and metadata from a document to expedite sharing
RecordedJun 28 201260 mins
Your place is confirmed, we'll send you email reminders
Past infrastructures provided compute, storage and network enabling static enterprise deployments which changed every few years. This talk will analyze the consequences of a world where production SAP and Spark clusters including data can be provisioned in minutes with the push of a button.
What does it mean for the IT architecture of an enterprise? How to stay in control in a super agile world?
J Metz, Cisco, Alex McDonald, NetApp, John Kim, Mellanox, Chad Hintz, Cisco, Fred Knight, NetApp
Welcome to this first part of the webcast series, where we’re going to take an irreverent, yet still informative look, at the parts of a storage solution in Data Center architectures. We’re going to start with the very basics – The Naming of the Parts. We’ll break down the entire storage picture and identify the places where most of the confusion falls. Join us in this first webcast – Part Chartreuse – where we’ll learn:
•What an initiator is
•What a target is
•What a storage controller is
•What a RAID is, and what a RAID controller is
•What a Volume Manager is
•What a Storage Stack is
With these fundamental parts, we’ll be able to place them into a context so that you can understand how all these pieces fit together to form a Data Center storage environment.
Oh, and why are the parts named after colors, instead of numbered? Because there is no order to these webcasts. Each is a standalone seminar on understanding some of the elements of storage systems that can help you learn about technology without admitting that you were faking it the whole time! If you are looking for a starting point – the absolute beginning place – start with this one. We’ll be using these terms in all the other presentations.
Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.
In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:
• A “Network DVR” to record and replay traffic events to pinpoint app issues
• At-a-glance view of all virtual services throughout the system
• Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
• Health scores that give you immediate feedback on application performance
Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software
Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.
Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.
Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
Are you a storage admins running business-critical workloads on vSphere? Replacing a traditional storage environment with hyper-converged infrastructure (HCI) solutions can give you a simpler, more efficient way to manage resources—and eliminate the guesswork that often leads to overprovisioning.
Learn what HCI can do to alleviate some pressure. We’ll discuss how VMware Virtual SAN 6.2 powers HCI with a new operational model for shared storage, including features that complement high-end SANS.
By offloading just one virtualized workload from SAN to Virtual SAN, you can save more expensive SAN or NAS for higher value workloads.
Topics in the webcast include:
-The advantages of VM-centric, policy-based storage
- Avoiding frequent storage requests for transient workloads
- Simplifying capacity planning by scaling compute and storage in tandem
- Focusing on optimizing production workloads
Easy to learn, and with the broadest set of consumption models, see how Virtual SAN hyper-converged storage powers radically simple HCI solutions that solve critical problems for storage admins.
Different workloads demand different attributes from their storage. These differences lead some to believe flash storage is only good for certain point use cases like accelerating databases. But the performance of flash systems lead others to claim a single flash system can support all workloads. The truth, as usual, is somewhere in the middle. Join Storage Switzerland and IBM for this live interactive webinar where we bust another flash myth and help you select the right flash for the right workload for the right reasons.
We hope you may find some new ideas to implement with your team. The field of Performance Engineering is changing rapidly over the last few years due to technology and perception of the field by the business areas. The presentation today will cover several areas that have proven successful in this new era of engineering.
Ethernet technology had been a proven standard for over 30 years and there are many networked storage solutions based on Ethernet. While storage devices are evolving rapidly with new standards and specifications, Ethernet is moving towards higher speeds as well: 10Gbps, 25Gbps, 50Gbps and 100Gbps….making it time to re-introduce Ethernet Networked Storage.
This live Webcast will start by providing a solid foundation on Ethernet networked storage and move to the latest advancements, challenges, use cases and benefits. You’ll hear:
•The evolution of storage devices - spinning media to NVM
•New standards: NVMe and NVMe over Fabric
•A retrospect of traditional networked storage including SAN and NAS
•How new storage devices and new standards would impact Ethernet networked storage
•Ethernet based software-defined storage and the hyper-converged model
•A look ahead at new Ethernet technologies optimized for networked storage in the future
Register today for this live Webcast where our experts will be on hand to answer your questions.
Cloud storage has transformed the storage industry, however interoperability challenges that were overlooked during the initial stages of growth are now emerging as front and center issues. Join this Webcast to learn the major challenges that businesses leveraging services from multiple cloud providers or moving from one cloud provider to another face.
The SNIA Cloud Data Management Interface standard (CDMI) addresses these challenges by offering data interoperability between clouds. SNIA and Tata Consultancy Services (TCS) have partnered to create a SNIA CDMI Conformance Test Program to help cloud storage providers achieve CDMI conformance.
As interoperability becomes critical, end user companies should include the CDMI standard in their RFPs and demand conformance to CDMI from vendors.
Join us on July 19th to learn:
•Critical challenges that the cloud storage industry is facing
•Issues in a multi-cloud provider environment
•Addressing cloud storage interoperability challenges
•How the CDMI standard works
•Benefits of CDMI conformance testing
•Benefits for end user companies
Steve Woo, Co-founder and VP of Products, VeloCloud
Most enterprises deploy both private MPLS and public broadband Internet to some or all of their branch offices. The right SD-WAN solution will dramatically improve the utilization, performance and ease of management of the these hybrid deployments.
Join this webinar for a detailed understanding of the architectural details of Cloud-Delivered SD-WAN for hybrid WAN deployments. You’ll leave with a clear understanding of how hybrid deployments can be designed, implemented and maintained for a secure, optimal and high quality wide area network.
MuleSoft expert and Principal Solution Architect Brett Roeder provides an overview of the broad set of capabilities available out of the box with Anypoint Platform that will enable business agility and create better experiences for your customers. These capabilities uniquely enable reuse, self-service, composability, governance and security. Infused throughout Brett’s demo are best practices for designing, building,and managing both APIs and integrations to deliver projects 3x faster.
Sarvesh Jagannivas, VP Product & Industry Marketing, MuleSoft
Chief architects and CIOs know that API-led connectivity drives business and IT agility. MuleSoft surveyed tech leaders among its customers and discovered not only the value of IT agility, but dramatic, measurable business outcomes for organizations that adopted our approach to integration. This webinar will provide a practical approach to understanding the value of API-led connectivity within your company.
Ian Bromehead, HPE, Harald Burose, HPE, Luke Bradley Vodofone
83% of recently surveyed companies agree that end-to-end visibility is critical to operating a hybrid cloud.
94% state that a single integrated solution is needed to monitor Hybrid IT environments.
But how do you monitor private and public cloud services? How do you make sure you're delivering appropriately? What if you're paying far too much for services you consume? Does monitoring providers give access to any use? With the new HPE Operations Bridge Suite, we'll show you how you can address these issues, and with the help of our customer Vodofone Group, you'll learn what benefits you can extract through adopting it
Mike Wood, VP of Marketing, VeloCloud & Ron Longo, Head of WW Operations, VeloCloud
Since the dawn of time nearly every being has striven for independence. IT professional tirelessly work to get to the same goal of creating solutions which result in greater independence from how technology was used in the past.
Join this webinar to learn how Cloud-Delivered SD-WAN delivers independence from underlying transport, freedom to host applications anywhere, liberty for how services are delivered and choices on how far you extend your wide area network. You'll leave with a better understanding of how to gain your independence from the boundaries of the legacy networks of the past decade.
Hyper-converged systems offer a great deal of promise and yet come with a set of limitations. While they allow enterprises to re-integrate system components into a single enclosure and reduce the physical complexity, floor space and cost of supporting a workload in the data center, they also often will not support existing storage in local SANs or offered by cloud service providers. There are solutions available to address these challenges and allow hyper-converged systems to realize their promise. During this session you will learn:
• What are hyper-converged systems?
• What challenges do they pose?
• What should the ideal solution to those challenges look like?
• About a solution that helps integrate hyper-converged systems with existing SANs
Alex Li, Product Manager, Ahyoung An, Product Marketing Manager, and Damian Sima, Lead Software Engineer, MuleSoft
How are you validating the behavior of your Mule app before you send it to QA? Did you know that there is a testing framework that automates the testing of Mule apps? Join this webinar to learn what you may not know about testing your Mule applications within Anypoint Studio.
Learn how to use MUnit to:
- Test API implementations
- Do other types of unit and integrated testing
- Automatically generate coverage reports
- Integrate testing into your continuous integration process
Derek Granath, VP of Product Marketing, Silver Peak
This new and disruptive technology has taken the industry by storm - delivering the promise of accelerated WAN performance, extended visibility and control as well as a massive cost savings of up to 90%. IDC reports that the SD-WAN market will reach $6 billion by 2020 and independent studies such as the one conducted by Silver Peak and IDG show that 92% of enterprise organizations surveyed will implement an SD-WAN in the next 12 months.
Are you ready to jump on board? Confused about how to take the first steps?
Join us for an overview of this emerging technology that can not only reinvent your network, but significantly impact your business.
Ben Wilson, Senior Director, Product Management, Fortinet
During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.
Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.
During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.
The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.
*This webinar will be conducted in Mandarin
Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.
In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.
The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.
In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.
Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
- How the most current variants of ransomware work
- How to prevent successful ransomware attacks in Healthcare
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:
The foundational security controls now required by law
How these controls are applied to mobile
Best practices to achieve compliance
The central role of Enterprise Mobility Management (EMM)
The implementation of Federal Information Technology Acquisition Reform Act (FITARA) brought about a major shake-up for officials across government, forcing agencies to address a variety of technology issues. By expanding oversight into IT investments and expenses, adjusting the roles of IT mission owners including the enhancement of the CIO's authority and updating the technology acquisition and procurement processes, IT leaders are working towards the common goal of an effective, efficient and secure technological landscape across all federal agencies.
How can agencies continue to push forward in achieving the requirements laid out by FITARA and controlling IT costs in general?
Join IT experts on August 23 as we explore how your agency can:
- Better understand your IT environment and start gaining insight around the current software and hardware assets
- Improve security and performance
- Streamline and achieve FITARA compliance
- Position itself to take advantage of technological advancements and innovate for the future
Cradlepoint announced it is delivering an innovative Router Software Development Kit (SDK) and extensibility platform to enable enterprises to customize Machine-to-Machine (M2M) and Internet of Things (IoT) connectivity to meet their specific business needs, applications, and network requirements.
With the new Router SDK and extensibility platform, enterprises can now build and customize more intelligent, application-specific solutions on top of Cradlepoint’s latest COR IBR routers. Developers and enterprise customers can now create tailored M2M and IoT applications on top of Cradlepoint Solution Platforms that can precisely address their specific business needs.
The extensibility platform launches in conjunction with new additions to Cradlepoint’s COR family of M2M-IoT and in-vehicle routers — the COR IBR600B and COR IBR650B. The new routers include embedded Cat4 modems that will perform at higher speeds and support additional bands. They also support auto-carrier selection that automatically connects to the U.S. wireless carrier associated with the SIM card installed.
The new routers support the COR Extensibility Dock that enables dual modems, extra Ethernet ports, and support for a third party expansion card, as well as, Cradlepoint’s SDK and extensibility platform that enable customers, partners, and third parties to write custom scripts and then securely push those scripts down to the router fleet for distributed computing at the Networks Edge.
Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
During the webinar Professor Wool will cover how to:
· Identify and securely migrate legacy applications to a micro-segmented data center
· Effectively define and enforce security policies for East-West traffic
· Manage the micro-segmented data center alongside traditional on-premise security devices
·Identify risk and manage compliance in a micro-segmented data center
· Use network segmentation to reduce the scope of regulatory audits
· Identify and avoid common network segmentation mistakes
Many Security Operation Centers operate in a reactive mode. They primarily respond to alerts that are being presented to them by implemented detection technologies. And we all know alerts are generated in overwhelming volumes, severely crippling SOC’s effectiveness and efficiency. Today’s threat landscape requires SOCs to operate ever more proactively to keep up with the threat actors. More and more SOCs therefor are actively ‘hunting’ for threats that may be residing in the environment they are to defend. ‘Hunting' however requires a different approach from the traditional, reactive mode, not least for the SOC experts themselves.
Join Matias Bevilacqua, Mandiant Principal Incident Response Consultant, as he discusses tips and tricks for hunting for those lurking threats: what to look for, what tools to use, etc.? You will leave the session with some hands-on material to start turning over stones and uncover threats you never knew were there.
This presentation will enumerate some of the risks, old and new, of migrating to a cloud infrastructure as well as the risks posed by consumer and employee “cloud creep”. I will detail how your business could impacted and illustrate some architectural and procedural changes that can help to mitigate these risks.
Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work. They will not scale. Join this webinar to discover response scenarios for cloud enabled and cloud dependent enterprises, a model for preparing for cloud response and examples of cloud breach investigations.
With more and more organisations using the services of a cloud provider, what impact does this have on securing Cardholder Data. This presentation will give an general overview of the PCI SSC, and then focus specifically on the issues relating to storing data in the cloud. Especially it will look at the key issues of “Who is responsible?” and “What happens when there is a data breach”. In addition the presentation will look briefly at the impact of the recent GDPR on cloud storage and cloud providers.