Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
Anuta Networks won the 2019 SD-WAN Implementation Award by TMC. In this presentation, Anuta Networks CEO, Chandu Guntakala shared the latest Anuta ATOM deployment details as well as key learnings from the multi-year IZO SD-WAN project roll-out at Tata Communications.
Tom Bienkowski – NETSCOUT Arbor, Director, Product MarketingRecorded: Feb 20 201932 mins
As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.
During this webinar we will talk more about:
- Understand the limitations of existing perimeter security solutions because of their stateful nature
- See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)
- Learn how stateful and stateless technologies can work together the make a more secure Internet edge
- Arm yourself with protection against Internet-scale attacks
- Answers to audience questions during live Q&A
Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing
Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
Tom Cooper, Principal Geek, Bright Hill GroupRecorded: Feb 20 201953 mins
As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
What no one tells you is that you're only looking at one of the three factors that lead to career success.
In this session, you will:
- Learn the other two factors (and what you should do about them)
- Learn the four levels of thinking needed to be an expert who leads
- Assess where you are in each of the areas
- Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, IntelRecorded: Feb 20 201956 mins
Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
Cyber threats continually evolve, growing more sophisticated and aggressive, regularly overwhelming and bypassing traditional security solutions. With AI-powered software trained on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions are increasingly able to detect and block abnormal behavior, even without a known signature or pattern.
Adding AI into the mix is a major turning point for cybersecurity. It’s growing clear that artificial intelligence and machine learning is the safest, and perhaps the only, path for cybersecurity professionals to really lock down their data and protect the enterprise. These systems offer the fastest, smartest ways to identify and analyze threats in real time -- and find the quickest way to taking them down.
To learn more about how to improve privacy and security, and how new AI-powered security can protect companies and their customers better, don’t miss this VB Live event!
Registration is free.
Attend this webinar and learn:
* How AI is defeating and preventing cyberattacks
* When AI analytics need to be deployed and for what reason
* How to build AI-powered tools that can assure consumers their data is secure
* Real-world AI applications and what they mean for cybersecurity
* Fernando Maymi, Cybersecurity Researcher & Consultant, Moderator
* Jim Ducharme, VP, Identity Products, RSA.
* Eduardo Delgado, AVP, ORM, Cybersecurity, TD
Alon Lebenthal, Senior Manager, Solutions Marketing, Workload Automation, BMCRecorded: Feb 19 201926 mins
Everybody talks about Operations “Shifting Left” but Developers also need to “Shift Right” and start thinking about how applications are orchestrated in production. Taking a Jobs-as-Code approach means putting all the workflows and operational instrumentation in the CI/CD pipeline to ensure you get the acceleration and increased quality that comes from automated testing and deployment.
Join this session and hear how you can orchestrate your workflows with a DevOps enabled approach.
Stephen Mann, ITSM Analyst and Matt Klassen, VP Product Marketing, CherwellRecorded: Feb 19 201960 mins
Industry best practices provide IT service desks a wealth of metrics to adopt, and benchmarking data offers guidance on the KPIs to employ. These have both remained virtually static for the last decade or longer. However, a growing reliance on IT services, a rapidly changing technology landscape, and demands that the service desk shift from a cost center to a value center, is forcing IT leaders to re-think and re-define traditional KPIs and metrics. Those who remain complacent in this respect will almost certainly fail to deliver the outcomes the business demands.
In this webinar, hosted by ITSM analyst, Stephen Mann, and Cherwell’s Matt Klassen, you’ll learn:
• How the evolving workplace and employee expectations are driving the need for new KPIs
• Why the adoption of self-service, automation, and AI require further changes to your measurement philosophy
• Metrics you are using today that will no longer be relevant in three to five years
• Tips for developing a new portfolio of metrics that will position you for future success
Hannu Mattinen, Raimo MalilaRecorded: Feb 19 201945 mins
Uuden teknologian menestyvä lanseeraus edellyttää huippusuoritusta myyntityössä ja kaupallistamisessa. Innovaatiot uudistavat omaa ja asiakkaan organisaatiota. Ja aivan erityisesti myyntityötä, sillä uudet teknologiat eivät lyö läpi kilpailukentällä ilman myyntityön uudistumista. Myyntiprosessiin, myyjiin ja heidän sisältöosaamiseensa kohdistuu armottoman kovia vaatimuksia.
Mikä myynnissä muuttuu, kun uusi teknologia tuodaan markkinoille? Ymmärrämmekö riittävästi asiakkaan näkökulmaa uutta teknologiaa harkittaessa? Kuinka oman tiimin on uudistuttava? Kuinka asiakkaan on muututtava? Tervetuloa mukaan maksuttomaan webinaariin, jossa otetaan neljä tärkeää askelta:
Myyjän näkökulma: uuden teknologian myyminen
Asiakkaan näkökulma: uuden teknologian ostaminen
Oma näkökulma: haastetaan perinteiset ajattelumallimme
Näkökulmien yhteensitominen: työpajassa 13.3. pureudutaan syvälle asiakkaan maailmaan.
Lopussa mahdollisuus kysymyksille chatin kautta!
Webinaarissa Raimo Malila ja Hannu Mattinen tuulettavat perinteisiä ajattelumalleja kaupallistamisesta B2B-caseissa. Sisältö perustuu tuoreeseen analyysiin loistavaan nousukiitoon lähteneiden innovaatioiden ja takkuavien liikkeellelähtöjen eroista. Menestystarinoiden rakentaminen edellyttää erityistä perehtymistä asiakkaan päätöksentekoon, ratkaisun kaupalliseen ilmiasuun, myynnin keskustelutaitoon ja taktisiin kykyihin.
Webinaari on omiaan myynnin esimiehille, myyjille, tuotekehityksen johdolle, innovaatioiden kaupallistamisesta vastaaville tiimeille ja asiakaspalvelun esimiehille.
Hannu Mattinen Hannu on kirjoittanut kolme kirjaa asiakkuusteemasta. Hän on toteuttanut yli 160 myynnin ja liiketoimintamallien kehittämiseen tuotettua simulointityöpajaa neljällä mantereella ja kymmenessä maassa.
Raimo Malila omaa vahvan kokemuksen liiketoimintojen kehittämisestä ja johtamisesta kansainvälisessä toimintaympäristössä.
Myynti on sana, joka herättää liian monissa asiantuntijoissa epävarmuutta ja jopa lievää kauhua. Ilman myyntitaitoja, asiantuntijan osaaminen jää kuitenkin usein hyödyntämättä. Myyntitaitoja tarvitaan sekä ulkoisten asiakkaiden palvelussa, että oman asiantuntijauran edistämisessä. Kahdesta saman tasoisesta osaajasta pärjää se, joka osaa selkeästi ja vakuuttavasti kertoa, miten hän voi olla avuksi. Kuitenkin myyntitaitojen koulutus on vielä lapsen kengissä asiantuntijoiden koulutuksessa, niin yliopistoissa kuin ammattikorkeakoulussakin. Oletetaan edelleen, että vahva osaaminen myy kyllä itsensä.
Mitä myynti sitten tarkoittaa asiantuntijatyössä? Kiteytettynä on kyse asiantuntijan osaamisen ja asiakkaiden muuttuvien tarpeiden yhdistämisestä. Tarkemmin katsoen asiantuntijan ja myyjän työprosessit muistuttavat hämmästyttävällä tavalla toisiaan. Asiakkaiden löytäminen, luottamuksen rakentaminen, kuuntelu, sekä ratkaisun tuottaminen ja perustelu ovat samoja molemmissa. Moni asiantuntija tekeekin myyntityötä, vaikkei sitä aina myynniksi mielläkään.
Ymmärrät ammattitaitoisen myynnin merkityksen asiantuntijatyössä
Tunnistat ja osaat analysoida omat asiakkaasi paremmin
Opit tunnistamaan vahvuutesi ja kehittämiskohteesi asiantuntijamyyjänä
Ymmärrät myyntityön merkityksen omassa työssäsi, ja osaat arvostaa myyntityötä osana ammattitaitoasi.
KTT Jari Salminen
Jari on tehnyt työtä yli 30 vuotta, asiantuntijana, myyjänä, myynnin johtajana, yrittäjänä ja myynnin kouluttajana. Jari toimii aktiivisesti esimiesten ja asiantuntijoiden kouluttajana perustamansa Impactin toimitusjohtajana. Jari on perehtynyt syvällisesti muun muassa, arvomyyntiin, asiakkaan ostoprosessin analysointiin ja luottamuksen rakentamiseen ihmisten välillä. Lue lisää Jarin viime vuonna julkaistusta kirjasta ASIANTUNTIJAN MYYNTITAIDOT.
Kaspersky Lab and guestsRecorded: Feb 17 201956 mins
The connected world needs a strong, resilient cyberspace, but the landscape is increasingly fragile and fragmented. At this summit, hosted by Kaspersky Lab, leaders from across the cybersecurity industry will debate the growing need for transparency, collaboration and trust in addressing these challenges and more.
Webinaarissa käsiteltäviä aiheita:
- Henkisen suorituskyvyn elementit
- Mielen johtamisen vaikutus henkiseen suorituskykyyn
- Tilannetajua kehittämällä parempia päätöksiä ja resilienssiä
- Mitä tilannetaju on ja miten vaikutat mielen kuormaan?
Mitä oivalluksia saat webinaarista:
- Näkökulmia tilannetajuun
- Fokuksen suuntaamisen merkitys
- Stressin vaikutus tilannetajussa
- Tasapainota oman energian johtaminen
- Miten mielen kuormaa voi vähentää?
- Miten lisää ajattelun joustavuutta?
- Miten virittää aistit, mieli ja keho vaativiin tilanteisiin?
on erittäin kokenut yritys- ja mentaalivalmentaja, NLP kouluttaja ja tietokirjailija. Jaanan intohimo on mentaalivalmennus – itsetuntemus, henkinen suorituskyky, mielentaidot sekä vuorovaikutus kiihtyvästi muuttuvassa ympäristössä. Hän tuo rohkeutta, innovaatisuutta ja uudenlaista näkökulmaan kokonaivaltaiseen hyvinvointiin. Työotteeltaan Jaana on vahvasti läsnäoleva, innostava ja oivalluttava. Hän haastaa osallistujia pysähtymään oman ajattelunsa ja toimintansa äärelle sekä antaa tilaa osallistujien ajattelulle ja kokemusten jakamiselle. Tietosisällön lisäksi toiminnallisuus sekä omakohtainen tekeminen ja harjoittelu ovat Jaanan koulutusten keskiössä.
Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.
Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.
Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 aikana. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.
Julkisen hallinnon tiedonhallintaon muutosten edessä.
- Tiedonhallinta ja tietoturvallisuus
- Tekniset rajapinnat
- VAHTI suositusvaatimukset
- Asianhallinta ja tietoaineistojen muodostaminen
- Metatietoa ja rekistereitä
- Tiedonhallinnan elinkaarikysymykset ja arkistointi
- JHS-179 ja kokonaisarkkitehtuuri
- Suomen Ammattipuhujat on yksi Oppia.fi kouluttajakumppaneista.
Maailman suosituin palvelunhallinan viitekehys ITIL® saa uuden version. Julkaisuaikataulu on marraskuun 2018 mukaan vuoden 2019 ensimmäisellä neljänneksellä. Axelos julkaisee asiasta koko ajan uutta tietoa. Tässä webinaarissa kerrotaan mitä ITIL 4:stä on jo julkaistu.
Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermediate, VeriSM, SIAM Foundation, CAPO, CASM ja CMDB Foundation valmentaja.
Quentin McPhee, Implementation Manager, VivantioRecorded: Feb 14 201953 mins
IT monitoring and metrics play a key role in measuring IT service management success. By properly analyzing, understanding and measuring where the true value lies in your organization, you can effectively analyze risk, add value, reduce the cost of service delivery and boost the overall performance of your service teams.
But without knowing what to measure, how to interpret the results and how to leverage your organization’s tools and data to make this possible, you’re setting yourself up for frustration and a lack of clarity in your reporting output.
On Thursday, May 17th, join BrightTALK and Vivantio’s Senior Implementation Manager Quentin McPhee to learn what you and your senior management need to inform IT decision-making and drive sustainable service improvement, in practical terms.
Quentin McPhee has more than 20 years’ experience in service management delivery and brings significant knowledge in implementing solutions for all types of organizations.
This session is not just a ‘back to basics’, but rather will set out what every ITSM organization should be measuring and how to interpret the results, plus how to sustain the measuring process to become a self-aware powerhouse. We’ll also discuss:
•What value reporting on your ITSM processes can realise
•Different types of reports and who needs them
•Tips, tricks and best practices to build out, maintain and sustain your organisation’s reporting structure
We’ll also cover real-life examples of organizations who have improved efficiency through effective data analysis.
Vivantio is a leader in help desk, IT service management and customer service software, empowering service teams to embrace automation and improve service levels at hundreds of organisations around the world.
David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast SecurityRecorded: Feb 14 201963 mins
The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation.
Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover:
- Common security anti-patterns
- What is Cloud-Native Security?
- People: How to align Dev, Security and Ops teams to achieve Cloud Native Security
- Process: How does Cloud Native change security processes to support the modern agile business?
- Technology: Introducing Cloud Native Security tools to achieve continuous application security
This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices
Ahyoung An, Sr. Product Marketing Manager at MuleSoft and Sundip Patel, Product Manager at MuleSoftRecorded: Feb 14 201945 mins
This session covers how Anypoint Runtime Fabric provides greater flexibility and simplifies operations––enabling enterprises to transform their businesses faster using public, private, or hybrid clouds.
Watch this webinar to learn how to:
- Manage deployments in multiple clouds––all from Anypoint Platform’s cloud-based control plane, hosted by MuleSoft
- Isolate applications, deploy multiple runtime versions in the same Anypoint Runtime Fabric, scale horizontally, and re-deploy with zero downtime
- Eliminate manual tasks and optimize processes with an easy-to-use container service that offers built-in support for Docker and Kubernetes
Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - TeradiciRecorded: Feb 13 201935 mins
PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
•Support for Active Directory, including support for sub-domains
•User Roles: System Administrator and Administrator roles
•Web Interface performance improvements
This Webinar session will consist of a brief walk through of Software Asset Management’s foundation. Diving deeper into answering the age-old IT question “What do we own and how do we own it?” Specifically, we will highlight various types of legal documentation, noting key verbiage and contractual elements Software Asset Managers encounter in their day to day responsibilities. The briefing will cover various aspects of reviewing, drafting and negotiating agreements to ensure adequate protection and overall license term understanding. Attendees will gain insight into defining drafting and assigning SAM policies, procedures and responsibilities.
Mark Kerrison and Mark KedgleyRecorded: Feb 13 201946 mins
Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.
NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.
NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.
Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:
• Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
• Where and how vulnerability management corresponds with the CIS Top 20 Controls
• Architectural, features, functionality and competitive differentiators
• Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours
With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.
Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
Klemens Rauch, Development Operations Engineer & Team Leader of IT Development, Brennercom.Recorded: Feb 13 20194 mins
Klemens Rauch talks about Brennercom's search for a single ITSM solution, rather than a silo of systems in each department, that could be implemented quickly and easily, without the need for development, using their current resources. Cherwell's software has enabled greater automation and far easier reporting.
Chris Goettl, Todd Schell, Brian SecristRecorded: Feb 13 201964 mins
The average spent on Valentine’s Day is a topic that’s been making the rounds on social media. It’s generated shock and awe—but it’s nothing compared to the damage one exploited vulnerability can unleash on your organization. So, let’s keep the money in February flowing into flower stores and candlelit dinners, rather than into the pockets of those we’d never choose to date. For February the men (and women) of Patch Tuesday recommend you lavish attention upon Microsoft. Patch the exploited zero day, public disclosures, and privilege escalation vulnerability. Also, make time for the ever-popular target, Adobe. Because nothing leaves a worse taste in your mouth than a breach you could have prevented—unless, perhaps, it’s those chalky conversation hearts.
Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT DataFeb 21 20192:00 pmUTC60 mins
Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
We will be discussing the application of these technologies in a real world CX automation context.
Jeff Laskowski, Security Consulting Director, FireEye MandiantFeb 21 20194:00 pmUTC60 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoftFeb 21 20195:00 pmUTC50 mins
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
- Measure application performance across APIs and integrations in production
- How to query and retrieve log data across your network
- End-to-end walkthrough of priority issue identification and resolution
- Exciting new capabilities of Anypoint Monitoring
Troy DuMoulin, Bruce RandallFeb 21 20195:00 pmUTC59 mins
Organizations are recognizing that adopting a service-oriented operating model, underpinned by system-based automation, can address many of the core challenges of competing in a digital economy. At the same time, defining value-based outcomes in the form of products and services, and optimizing shared processes with automation, have been proven to increase productivity, foster collaboration, lower costs and improve speed, no matter the business department or function. The sum of these capabilities and outcomes are often referred to as Enterprise Service Management.
Join Troy DuMoulin from Pink Elephant and Bruce Randall from ServiceNow as they provide an overview of the many dimensions of Enterprise Service Management.
In this webinar you’ll learn:
How to increase employee productivity and creativity with ESM
How to focus on service management capabilities like service definition, publishing, and knowledge management
How to transform workflow automation related to incident and request fulfillment
Komal Bhardwaj & Ritesh PatelFeb 21 20196:00 pmUTC60 mins
When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.
In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.
Ritesh Patel - VP Products at Nirmata
Komal Bhardwaj - Principal Product Manager at Citrix
Damon Tepe & Jeff HickmanFeb 21 20196:00 pmUTC60 mins
Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.
Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.
Better breach protection starts with better identity trust!
During this session you’ll learn how:
• Attackers are getting around two-factor authentication
• Risk and context checks can raise trust in identities and identify attackers
• Adaptive authentication delivers better access security without slowing down your business
Damon Tepe - Director, Product Marketing, SecureAuth
Jeff Hickman - Director of Sales Engineering, SecureAuth
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM CloudFeb 21 20196:00 pmUTC45 mins
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Closed-Loop Automation by Anuta ATOM combines Orchestration, Analytics, and Assurance to ensure the network matches the business intent. Closed-Loop Automation eliminates human errors, generates new business insights and avoids network downtime. For more information, visit https://www.anutanetworks.com/technologies/closed-loop-automation/
Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security AllianceFeb 25 201910:00 amUTC46 mins
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.
Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…
During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.
Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- TeradiciFeb 26 20192:15 pmUTC30 mins
Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.
1.What graphics adapters does Cloud Access Software support?
2.What Windows versions does Cloud Access Software support?
3.Can USB devices be used with Cloud Access Software?
4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
5.Can I connect to my Cloud Access Software workstation on a tablet device?
Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
Jim Haas, Vice President of Managed Services at NtiretyFeb 26 20196:00 pmUTC77 mins
On July 9th, 2019 Microsoft will end all support for SQL Server 2008. How can you prepare your organization? Start by understanding your options.
Why should you attend?
Doing nothing is not an option this time. Data security is a risk to your organization, as all critical patches and security updates for SQL Server 2008 will end. Your Lack of compliance with industry standards and applicable regulations may lead to security breaches, data loss, litigation, and reputational risk.
Join Jim Haas, Vice President of Managed Services at Ntirety (a Division of Hostway|HOSTING), as he discusses how you can go about making a compelling case:
• Upgrade Options: Migrate to Azure, Upgrade SQL Server, or Purchase Extended Security
• The many advances since SQL 2008.
• How to get started. What you can do yourself. Where you may need help and where to find
Terence Fogarty, Contact Center Consultant, Carousel Industries; Robin Gareiss, President and Founder, Nemertes ResearchFeb 26 20196:00 pmUTC60 mins
With the ability to increase sales, reduce costs, and improve customer satisfaction, it’s no surprise that more than 75% of companies have, or plan to have, a Digital Customer Experience (DCX) strategy. Leveraging collaboration technology can transform how you’re engaging customers and driving organizational innovation.
In this interactive webinar Carousel Industries and Nemertes Research explore the top five digital customer experience projects that drive business growth.
What you will learn:
• Which digital customer experience projects deliver measurable success
• How to realize the business value of upgrading or replacing existing communications platforms
• Why aligning your approach with your financial model can boost business impact
• How to identify the right approach for your business: on-premises, cloud, or hybrid
• Why you need to take a closer look at your internal unified communications and collaboration
• How to determine if now is the time to upgrade or replace existing communications platforms
Ricardo Casanovas, CTO Linke / Guillermo Torres & Maurici Galofré, AWS Solution Architect and SAP experts at LinkeFeb 27 20193:00 pmUTC60 mins
Traditionally, setting up High Availability for SAP systems has been achieved through the implementation of third-party software tools, often expensive and complex to deploy. Today, customers can leverage AWS highly available cloud services to achieve High Availability for their SAP systems at a fraction of their cost.
Learn how you can configure High Availability for SAP systems on Amazon Web Services using their own AWS tools and services such as Amazon Cloudwatch, AWS Lambda, and AWS Systems Manager.
Join us to learn:
•How to plan and define your SAP landscape in High Availability
•Setup SAP in High Availability using AWS Services
•Operate with SAP in High Availability on AWS
Stephen Mann, ITSM.tools; Roy Atkinson, HDI; Dr. Akhil Sahai, Symphony SummitAIFeb 27 20196:00 pmUTC60 mins
Articles, headlines, blogs, and presentations about AI are everywhere, most being either apocalyptic (we’ll all lose our jobs) or utopian (we won’t have to work) about how AI will affect the near future. In this webinar, industry analysts Stephen Mann and Roy Atkinson and AI expert Dr. Akhil Sahai will speak directly to service and support managers about how AI is being integrated into service management software, and how that integration has a direct bearing on how service management and support can and will be done in the near future.
The webinar will feature a panel discussion followed by time for attendee Q&A.
What You Will Learn:
In this webinar, we will discuss:
- What AI is and is not
- How AI is being built into service management tools
- How next-generation tools will affect the day-to-day operations of service and support
Who Should Attend:
- Service desk/support center directors, managers, supervisors, and team leads
- ITSM professionals responsible for workflows and processes
- Support organization leaders
The primary goal of service management is deliver value to the customer, or internally, your employees. As advanced technology reshapes the service desk, there are more and more ways to enhance service delivery. In this webinar, ITIL-certified Samanage Solutions Consultant Liz Beckner will discuss:
- How she has helped organizations integrate technology within the service desk
- How automated workflows and self-service provide maximum value
- How to create a single platform for services in multiple departments
- New research on how the experience with the service desk impacts employee productivity
Join us to start transforming the service experience for your employees!
Chris Marsh of 451 Research & Matt Crawford of CitrixFeb 28 201912:00 pmUTC54 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Bruce Kelly, VP ProServ., Curvature, Etienne Gadient, Mng. Partner, CloudLogic; Fred Latala, Mng. Partner, CloudLogicFeb 28 20195:00 pmUTC60 mins
Cloud Providers love to highlight how easy driving new business innovation, creating new market opportunities and driving rapid experimentation using the cloud is-- all at a fraction of today’s cost. Yet, the reality of today’s enterprise is much more complicated: expensive applications, capital infrastructure and a growing need to adapt and accelerate without compromising business performance. Curvature, powered by CloudLogic, focuses on ways IT leaders can evolve their portfolio of applications and services to not only survive, but embrace the opportunity.
Join Curvature and Cloud Logic experts for an informative discussion, where you’ll learn more about:
•How the cloud can change the “infrastructure game”
•Why Infrastructure and Platform as a Service in the public cloud isn’t
always the best answer
•Use cases for public cloud, private cloud and hybrid models to create
•How to prioritize and measure whether the cloud actually drives ROI for
•How data is the new currency for today’s enterprise and how the cloud
flattens the field
George Spalding, EVP, Pink Elephant and Matt Klassen, VP, Product Marketing, CherwellFeb 28 20196:00 pmUTC60 mins
ITIL 4, the latest version of the most widely adopted ITSM framework, has been released! This version integrates DevOps, Agile, and Lean IT principles for a holistic end-to-end systems approach.
Pink Elephant, well-known for ITIL training and certification, has played an integral role in ITIL and IT service management over the past 30 years. The ITIL experts from Pink Elephant have been at the forefront of ITIL’s evolution since its inception, and are now playing a significant role in the development of the latest version, ITIL 4.
Join George Spalding, EVP, Pink Elephant, 20-year ITIL veteran, who has been working with ITIL 4 since early last fall and who co-authored the ITIL V3 Continual Service Improvement volume and Matt Klassen, VP, Product Marketing, Cherwell for an inside look at this most recent ITIL release.
Security and IT operations teams must work together to keep modern data centers compliant and secure, but their efforts are often crippled by disparate toolsets, misaligned workflows, and competing priorities. It’s time for that to change
Join Mehul Revankar, SaltStack Sr. Product Manager, and Kendall Lovett, SaltStack Sr. Product Marketing Manager, as they discuss SaltStack SecOps, a powerful solution that harnesses SaltStack’s event-driven automation technology to deliver full-service, closed-loop automation for IT system compliance and security.
With SaltStack SecOps, security professionals and IT operations teams can work together to define a compliance policy, scan all systems against it, detect issues, and actively remediate them—all from a single platform.
Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUTFeb 28 20196:30 pmUTC45 mins
When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.
Attend this webcast to learn about:
Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware
Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations
Understanding the ever-changing DDoS landscape – key vertical targeting and techniques
Robert Peerenboom, Tameem HouraniFeb 28 20197:00 pmUTC55 mins
Wayfair has an extremely mature and well-defined DevOps culture in which the company was built on; and this introduced challenges on how to enable ServiceNow as the core platform for their production operations.
Learning how to integrate multiple ServiceNow modules into the CI/CD pipeline and aggregate operations with deployments was key to getting a holistic view of how business services are performing. Having a single hub for all of the data allowed Wayfair to build KPI’s that are much more relevant to a DevOps world—focused around agility and failing fast.
Join Tameem Hourani, Head of Production Operations at Wayfair, as he showcases how to:
Maximize your DevOps journey by moving fast, iterating faster, and bypassing gatekeepers
Accelerate your digital adoption by integrating ServiceNow with existing open source toolsets and frameworks
Leverage existing tools to be able to extend and create applications onto the ServiceNow platform
Participate in this session to learn how you can get support for all phases of your DevOps process lifecycle.