Taking Advantage of Open Cloud Computing

Jason Waxman, Intel, General Manager, Cloud Infrastructure Group & James Staten,Forrester, Vice President & Principal Analyst
Join Intel Cloud Infrastructure Group GM Jason Waxman and Forrester VP and Principle Analyst James Staten discuss the trends, key players, opportunities and how to specifically take advantage of an open cloud computing approach to address key challenges today. They will explore how to build upon IP that others are sharing, advances in open source cloud, open standards development, the Open Compute Project, and much more followed by a question and answer session!
Jan 25 2012
60 mins
Taking Advantage of Open Cloud Computing
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5242)
  • Upcoming (122)
  • Date
  • Rating
  • Views
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Channel
  • Channel profile
  • Taking Advantage of Open Cloud Computing Recorded: Jan 25 2012 60 mins
    Join Intel Cloud Infrastructure Group GM Jason Waxman and Forrester VP and Principle Analyst James Staten discuss the trends, key players, opportunities and how to specifically take advantage of an open cloud computing approach to address key challenges today. They will explore how to build upon IP that others are sharing, advances in open source cloud, open standards development, the Open Compute Project, and much more followed by a question and answer session!
  • Building Trust from Client to Cloud Recorded: Jun 17 2011 37 mins
    Today, cloud access security requires more than a simplistic secure VPN tunnel or single sign on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. From a compliance standpoint it is a growing nightmare involving orphaned accounts, infected clients, and un-auditable silos of user activity data left outside enterprise control. In this session, Intel showcases key technologies that are being used in the market today to build a trusted client to cloud connection. On the client side, Intel will present ‘Identity Protection Technology’ that will deliver strong second factor authentication using OTP one time password technology directly from the PC chip. To secure data in flight and access to the cloud, Intel expressway solutions enable federated single sign-on and web services security. On the server side, TXT trusted execution technology enables the setting up of trusted compute pools and establishing hardware root of trust between data centers. Attend this session to learn more about Intel’s 2015 vision for how to build a federated, automated, and client aware cloud.
Intel @ WWT Geek Day
TBD

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Taking Advantage of Open Cloud Computing
  • Live at: Jan 25 2012 5:00 pm
  • Presented by: Jason Waxman, Intel, General Manager, Cloud Infrastructure Group & James Staten,Forrester, Vice President & Principal Analyst
  • From:
Your email has been sent.
or close
You must be logged in to email this