Hi [[ session.user.profile.firstName ]]

IT Service Management

  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • Keys of Success to Full Lifecycle API Management
    Keys of Success to Full Lifecycle API Management Chirag, Sr. Director, Product Management at MuleSoft and Sanjna Verma, Manager, Product Marketing at MuleSoft Recorded: Sep 20 2018 52 mins
    One emerging API best practice involves treating APIs like products. Similar to products, APIs should be designed with a specific purpose and teams should also deliver APIs using a Software Development Lifecycle (SDLC) framework. Join us for this webinar to get a walkthrough of Anypoint Platform's capabilities, and learn how the platform addresses the full API lifecycle––from design and implementation to security and governance of APIs.
  • IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio
    IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio Amr Fahmy, Bobby Allen Recorded: Sep 20 2018 55 mins
    SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)

    Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.

    Speaker: Amr Fahmy
    Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use

    Speaker: Bobby Allen
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Driving Growth of Sustainable Safety Instrumented Systems
    Driving Growth of Sustainable Safety Instrumented Systems Muthuraman Ramasamy, Industry Director, Frost & Sullivan, Mr. Ian Ramsay-Connell TUV Functional Expert (FSM&SIS) Yokogawa Recorded: Sep 20 2018 58 mins
    Title: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety

    Subtitle: Plant safety ensures compliance, revenue maximization, and operational cost reduction

    Sustainable Safety Instrumented Systems (SSIS) are a natural evolution of conventional SIS, which allow the key decision makers to optimize their plant’s safety performance without compromising productivity, revenue, and cost. Sustainable SIS incorporates a holistic assessment of operational safety to mitigate and manage risks throughout the lifetime of a plant. It equips all stakeholders to protect businesses from excessive hazard-related downtime. Future growth opportunities will ensure that safety systems in the plant do not become obsolete and help operations run smoothly.

    Frost & Sullivan's Industrial Practice expert, Muthuraman Ramasamy, invites you to join us for the webinar: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety. Hear about future growth opportunities, followed by a live question-and-answer session.

    Key Takeaways:

    Learn how SSIS can benefit your company
    Understand the challenges using conventional safety instrumented systems
    Identify the need for sustainable safety instrumented systems
    Create lasting value to ensure safety systems are manageable
  • Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it
    Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it Jibril Hassan, Kaspersky Lab Recorded: Sep 20 2018 28 mins
    Threat Intelligence Services from Kaspersky Lab gives you access to the intelligence you need to mitigate against threats, provided by our world-leading team of researchers and analysts.

    Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs. You too can leverage this intelligence in your organisation today.

    Join Jibril Hassan as he introduces the Threat Intelligence Portal and showcases how to optimise this valuable resource to keep your organisation safe from attacks. Gain some valuable insights to help manage your cyber security with confidence.
  • SAFe käyttöönoton ABC
    SAFe käyttöönoton ABC Raija Harle Recorded: Sep 20 2018 38 mins
    SAFe® käyttöönoton ABC -webinaarissa kerrotaan helposti ymmärrettävässä muodossa organisaation askeleet SAFe®-viitekehyksen käyttöönottoon ja organisaation kokonaisvaltaiseen ketteröittämiseen. Samalla saat myös vinkkejä parhaista käytännöistä sekä siitä, miten tukea organisaatiota muutosmatkalla.

    Webinaari sopii kaikille SAFe®-viitekehyksestä kiinnostuneille ja erityisesti niille, jotka pohtivat/suunnittelevat SAFen käyttöönottoa omassa organisaatiossaan.

    Puhujana Raija Harle

    Raijalla on IT-alan kokemusta yli 20 vuotta, koodarista hankejohtoon, erityisesti CRM:n ja ERP:in parissa. LEAN / Agile konsultti, SAFe SPC (muutosagentti) ja RTE (ketterä hankejohtaja). Haluna auttaa organisaatioita tekemään asioita fiksummin ja mielekkäämmin ketterillä menetelmillä.
  • Mallinnuskielten taistelu! - Mikä sopii prosessien mallintamiseen?
    Mallinnuskielten taistelu! - Mikä sopii prosessien mallintamiseen? Tarja Raussi Recorded: Sep 20 2018 61 mins
    Tässä Mallinnuskielten taistelu! -webinaarisarjassa Tarja käy läpi havainnollisin esimerkein keskeisten mallinnuskielten ArchiMaten, BPMN:n ja UML:n soveltumista eri tarkoituksiin. Tänä syksynä keskitymme yhteen aiheeseen kerrallaan, jotta aikaa on kunnolliseen käsittelyyn.

    Jotta webinaarista saadaan osallistavampaa, ilmoittautuneet voivat lähettää Tarjalle (tarja.raussi@coala.fi) etukäteen aihepiiriin liittyviä kysymyksiä tai esimerkkitapauksia, joita hän sitten käsittelee webinaarissaan. Kysymykset tai esimerkit tulee lähettää viimeistään 3 päivää ennen webinaaria.

    Mallinnuskielten taistelun 1. ottelussa keskitytään siihen, mikä mallinnuskielistä sopii parhaiten prosessien mallintamiseen. Jotta asia ei olisi niin yksinkertainen, niin on hyvä muistaa, että prosesseja kannattaa mallintaa eri tarkkuustasoilla eri tarkoituksia varten. Niinpä vastauskaan ei liene yksioikoinen…

    Senior Consultant Tarja Raussi on käyttänyt eri mallinnuskieliä vuosikymmeniä. Hän käytti UML:ää jo 1990-luvulla. Kun BPMN tuli kuvioihin, Tarja alkoi käyttää sitä, ja samoin kävi ArchiMaten kanssa. Tarjalla on sertifikaatit sekä UML:stä että ArchiMatesta. Koska Tarja on tehnyt laajoja projekteja ja myös kouluttanut näitä kieliä, hän on joutunut miettimään, miten fiksuimmin selvitä koko paletin kanssa. Nykyään Tarja työskentelee Coala Oy:ssä konsulttina ja käyttää päivittäisessä työssään kaikkia mallinnuskieliä.
  • Security Deep Dive: How Dropbox Business Protects Your Data
    Security Deep Dive: How Dropbox Business Protects Your Data Dropbox Solutions Architect Abhishek Lahoti Recorded: Sep 19 2018 30 mins
    Security is critical when you store your data in the cloud. And that means being confident your solution protects sensitive data, maintains compliance, and ensures privacy.

    We’ve made security a foundation of Dropbox Business through everything from our infrastructure design, to the admin and user security tools we provide, to the ongoing independent verification of our systems.

    Dropbox Business is built on a sophisticated infrastructure that can meet—or exceed—your security needs. Join Dropbox Solutions Architect Abhishek Lahoti for a security deep dive, where we cover:

    - The back-end infrastructure used for data protection
    - New functionality that enables admins to layer and customize their own policies
    - Independent verification and compliance measures
    - Security and administration solution integrations
  • How IT Plays a Lead Role in Expanding Service Management
    How IT Plays a Lead Role in Expanding Service Management Liz Beckner and Shvonne Craig Recorded: Sep 19 2018 46 mins
    IT leaders are experts in service management. From ITIL best practices, to building workflows, to measuring service delivery, IT has it down to a science.

    But the employee experience reaches far beyond IT. This webinar will show you how IT can take a leadership role in helping other departments deliver the same quality services to employees throughout the organization. Shvonne Craig, Director of IT Services at EXOS, will explain how she helped create a single platform for employee support by including all of the major stakeholders.
  • Beyond the Breach: Recommendations for Effective Response
    Beyond the Breach: Recommendations for Effective Response Heather Stratford-Geibel (Stronger.tech) | Sushila Nair (NTT DATA) | John Matthews (ExtraHop) Recorded: Sep 19 2018 58 mins
    Discover the latest trends in cyber crime, your organization's vulnerabilities, and how to go about preventing, detecting and responding to a breach.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - Trends in breaches and cyber attacks
    - What to do (and not to do) after a breach
    - What's new on the threatscape
    - Best practices and recommendations for improving your security posture

    Speakers:
    - Heather Stratford-Geibel, CEO of Stronger.tech
    - Sushila Nair, Sr. Director, NTT DATA Services
    - John Matthews, CIO, ExtraHop
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Targeted Attacks: A Review of Current Trends and Future Developments
    Targeted Attacks: A Review of Current Trends and Future Developments David Emm, Principal Security Researcher, Kaspersky Lab (Global Research & Analysis Team) Recorded: Sep 19 2018 46 mins
    Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.

    It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.

    About the presenter:
    David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

    In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

    David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
  • The DevSecOps Journey: Why It Starts with Agile DevOps & App Security
    The DevSecOps Journey: Why It Starts with Agile DevOps & App Security Jaweed Metz, Principal, Products at Contrast Security Recorded: Sep 18 2018 45 mins
    DevSecOps is best viewed as a journey that enlightened organizations are starting to embark on.

    The major constituent to consider on this journey is ensuring that organizations defenses have been properly configured, implemented and operated–to that end, application security testing is of paramount importance. As businesses strive to rapidly release code in order to satisfy customer demands and gain a competitive advantage,security must work in tandem with Agile DevOps processes.

    Traditionally, security has been an afterthought, or at the very least introduced late into the release process.Hence, security has been viewed as an impediment to high velocity Agile DevOps processes and becoming a primary bottleneck in the software delivery pipeline.This can cause major contention and distrust between development and security teams–but that doesn’t need to be the case.

    Cyber threats are continuous–so shouldn’t development and security practitioners work in tandem in order to deliver and deploy code securely and continuously?The cultural, differences between development and security teams needs to be addressed and a unified approach established in order to integrate security as early as possible.Automated application security addresses these cultural, technical and process issues.

    This webinar will highlight how modern, automated application security tools can help weave security into the code continuously and accurately throughout the SDLC.Automated application security enables the real-time identification and response to new attacks and vulnerabilities that emerge in custom and third party code. Additionally, we will discuss how integrated application security unites developers and security practitioners with the tools they are already using so that they can work even more effectively.
  • 2020 Vision for Agile, DevOps and Automation Testing
    2020 Vision for Agile, DevOps and Automation Testing Hamesh Chawla, Chief Product Officer, Zephyr Recorded: Sep 18 2018 39 mins
    To stay competitive in this new digital economy, organizations must transform their turn-around capabilities. That is, they must equip themselves to rapidly develop and deploy software products that deliver business value according to new standards for timing. This means building an infrastructure that is hyper-efficient and able to quickly scale. It means perfecting a continuous software delivery pipeline that delivers progressively faster lifecycles. And that means achieving full continuous testing agility.

    Join Hamesh Chawla, CPO at Zephyr as he shares his vision for 2020, explores software delivery trends including the ‘shift-left’ mandate, and outlines the four essential components to achieving full Continuous Testing Agility- Agile, DevOps, Automation and Analytics. He evangelizes the necessity for a sweeping adoption of Agile practices and a DevOps culture, while discussing the benefits of investing in the right tool early on to gain deeper visibility and enhanced collaboration across the entire enterprise.

    In this presentation, you will get critical insights on:

    • Challenges organization's face to adopt the latest best-of-breed Agile, DevOps and Automation tools
    • Which testing functionalities are most beneficial to your organization's progress
    • Actionable next steps your organization can take to progress in its continuous testing journey
    • How your organization can rise to tomorrow's standards and prevent being left behind
  • Cloud Security Management 301: Total Compliance
    Cloud Security Management 301: Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 18 2018 15 mins
    Welcome to Cloud Security Management 301!

    Major cloud providers use different methods when it comes to protecting your resources. AWS utilizes security groups and NACLs, Microsoft Azure uses Network Security Groups on interfaces and subnets, and Google uses Firewalls. While each of these vendors have technology that protects your resources, none of them have built-in mechanisms that offer a comprehensive, holistic, security story. A third-party tool that can understand each of these methods, ensure all of your resources are protected, and conform to your security needs, is crucial when managing workloads across multiple clouds.

    This 301 course builds on your foundational knowledge of cloud security management and teaches you about the risks of noncompliance in the cloud, along with the benefits of comprehensive compliance features in a cloud management provider. Our experts will also demonstrate the value of automated capabilities that save time and effort while managing larger workloads.
  • Live Demo of OptiView XG
    Live Demo of OptiView XG Mike Pennacchi, Network Protocol Specialists Recorded: Sep 18 2018 63 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 25 2018 9:00 am UTC 60 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.


    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • How to Leverage Tools that Support Innovation and Differentiation
    How to Leverage Tools that Support Innovation and Differentiation Gary Middleton: Group Networking Senior Practice Director DCN,Networking &Chris Wolf: CTO, Global Field & Industry,VMWare Sep 25 2018 2:00 pm UTC 45 mins
    Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
    Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:

    • Use containerisation to transform your cloud capabilities.
    • Empower IT to embrace the solutions and services needed to evolve.
    • Build applications that streamline and transform business success.
    • Move with speed and agility while maintaining a strong infrastructure.
    • Exploit the software as a service (SaaS) revolution.
  • Project Finances Made Easy
    Project Finances Made Easy Rick Morris, R2 Consulting and Alf Abuhajleh, CA Technologies Sep 25 2018 4:00 pm UTC 60 mins
    Finance managers are rarely included in project planning, and if they are involved in the project tracking it is usually in a passive way. At the same time, all stakeholders expect to have the latest project financial situation available on demand and customized for their personal use. And if that weren’t enough, there’s often no integration between project and financial management systems. But it doesn’t have to be this way.

    Join agile project management expert Rick Morris of R2 Consulting for an overview of how financial managers can take charge of project finances and use their expertise to add new value to the organization.
  • Machine Learning and Analytics: Taking ITSM and Support to the Next Level
    Machine Learning and Analytics: Taking ITSM and Support to the Next Level Vesna Soraic, Steve Anderson, and Roy Atkinson (moderator) Sep 25 2018 5:00 pm UTC 60 mins
    Technology is becoming increasingly critical to businesses and other organizations, but as technology speeds up, we often don’t think about the negative business impacts it may bring: new hires whose equipment isn’t available, services that are interrupted, and customers or users who aren’t informed of a change or outage, to name a few. Smarter technologies driven by abundant data analytics can provide the support organization with information and solutions with more accuracy and speed than previously possible.

    Join us to learn:

    • Why analytics are important to service management and support
    • What machine learning is and how it can enable faster, better, more accurate resolutions
    • How machine learning and analytics combine to enable smart processes that can pinpoint expertise, accelerate configuration and change management, and minimize wasted time
  • Get Ready for OS Upgrades and Apple Business Manager
    Get Ready for OS Upgrades and Apple Business Manager Nick Thompson, Product Manager, Jamf Sep 25 2018 6:30 pm UTC 60 mins
    With Apple’s Worldwide Developers Conference (WWDC) behind us, it’s time to review the exciting announcements and discuss how you can prepare now for your future iOS 12, tvOS 12 and macOS Mojave updates.

    In our webinar, Get Ready for OS Upgrades and Apple Business Manager, we’ll explain the new management features and services coming your way.

    We will cover:

    •What new mobile device management (MDM) features will be available with Apple’s upcoming OS releases
    •How to prepare for OS upgrades this fall
    •An introduction to Apple Business Manager
  • HP Workplace as a Service
    HP Workplace as a Service Jonas Persson (Sr Category Manager) and Gary Wall (pMPS Business Development Manager) Sep 26 2018 8:30 am UTC 60 mins
    Technology, culture and the millennial generation are shaping how, where and when we work. The workforce is demanding greater flexibility, but is your IT infrastructure ready to control costs and secure data in this new environment?

    Join our industry leading experts to discover current workplace trends and learn how HP’s Device as a Service (DaaS) and Managed Print Services can help you implement solutions to better predict costs, increase uptime, and enhance security.

    With an “office of the future” style approach, this webinar is designed to educate, inform, and assist businesses that are looking for a more flexible IT procurement and management process.

    You will have the opportunity to ask any questions throughout the presentation and in our Q&A section.
  • 4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Sep 26 2018 9:00 am UTC 35 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • Turbocharge Data Pipelines with VelocityAI
    Turbocharge Data Pipelines with VelocityAI Jason Blum, CTO at GPL Technologies and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Sep 26 2018 5:00 pm UTC 60 mins
    Data is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patData is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patterns and structure in this data and its transformation into actionable insights is driven by Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) workloads.

    IDC predicts that in the next three years over half the businesses will use AI, ML, and DL workloads. This has given rise to the NVIDIA DGX-1 GPU-based supercomputer to accelerate these workloads. Vexata supports the DGX-1 and delivers ultra-low latency, massive ingest bandwidth, and heavy mixed random and sequential read/write I/O operations. Using direct attached storage (DAS) or all-flash arrays (AFAs) limits the usefulness of the DGX-1 by restraining performance and requiring complex data provisioning, mobility, and growth. Vexata addresses these issues with VelocityAI, which combines the NVIDIA DGX-1 and the Vexata VX-100FS Scalable NVMe File Array.

    Learn about VelocityAI and how we built it to overcome these machine learning challenges. This webinar is targeted to those that want to leverage GPU for data analytics. Our expert will cover:

    - Dealing with large training and inferencing data-sets by leveraging NVMe media
    - Using the VelocityAI to eliminate movement between data pipeline stages
    - Dealing with data security, protection, and efficiency concerns

    Learn how you can leverage VelocityAI to deliver transformative performance with breakthrough economics at scale for your AI, ML, and DL applications.
  • How Hertz delivers the ultimate car services experience
    How Hertz delivers the ultimate car services experience Lucy Meyo, Senior Director, Integration Architect, Hertz and David Chao, Senior Director Product Marketing, MuleSoft Sep 26 2018 5:00 pm UTC 60 mins
    Hertz is driving a customer experience transformation with the goal of providing a frictionless customer and partner journey. MuleSoft has been foundational in driving the re-platforming of all of Hertz's customer-facing applications, as they replace nearly 100% of their legacy systems.
  • Increasing Collaboration and Efficiency in the Public Sector
    Increasing Collaboration and Efficiency in the Public Sector Marshall Kurtz, Solutions Architect for Dropbox & Judy Price, Town Clerk for the town of Truckee, California Sep 26 2018 6:00 pm UTC 18 mins
    From state to local governments, and throughout the public sector, employees and staff are seeking better ways to collaborate and boost productivity. But collaboration can be complicated when you're working across different teams, committees, and counties.

    Judy Price, Town Clerk for the town of Truckee, California, will share her experience using Dropbox Business to save time, money, and effort, and focus on the issues that really matter to her city.

    Join us in this webinar as we discuss:

    - Key trends we are seeing in the public sector today
    - How technology can help address pain points for city and local governments
    - How implementing tools like Dropbox has helped streamline several processes in Truckee
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana Sep 26 2018 6:00 pm UTC 45 mins
    Part 3 Securing Firmware Updates and Patches

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new Iot connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Next generation SD-WAN:  true end-to-end network visibility and control
    Next generation SD-WAN: true end-to-end network visibility and control Keith Langridge, VP, BT; Adrian Comley, General manager, BT; Saurabh Sandhir, VP, Product Management, Nuage Networks Sep 27 2018 1:00 pm UTC 60 mins
    SD-WAN is the network technology everyone’s talking about. Like any new development, as it matures, it’s capabilities grow. We all know it offers agile WAN connectivity, but organisations now want it to do much more. They want to integrate their cloud services, use new virtualisation and orchestration capability and do all of this in a secure way.

    Keith Langridge and Adrian Comley of BT are joined on this latest webinar by Saurabh Sandhir, VP, Product Management, Nuage Networks. Together they’ll take a look at some of the latest developments to enhance your SD-WAN, including:
    •achieving end-to-end visibility and control across your data centres, public cloud and branches
    •SD-WANs as a VNF or delivering VNFs on a SD-WAN
    •orchestrating services across your SD-WAN
    •and making sure your solution is supported and secure
  • How I Combine Backup and Recovery with Compliance for Ultimate AWS Protection
    How I Combine Backup and Recovery with Compliance for Ultimate AWS Protection Todd Bernhard, CloudCheckr, Sebastian Straub, N2WS Senior Systems Engineer Sep 27 2018 1:00 pm UTC 60 mins
    Welcome to CloudCheckr Partner Webinars—where comprehensive cloud management meets a managed service provider to help you recognize the full potential of cloud infrastructure as a service.

    When managing workloads across multiple clouds, who's protecting your data? Amazon Web Services (AWS) offer foundational level security. However, to grow your cloud practice and harness the full potential of cloud-first infrastructure, you must add cloud management, backup and disaster recovery services.

    Clear up the complexity of cloud security by attending this CloudCheckr Partner Webinar featuring N2WS (a Veeam company), the leading provider of enterprise-class backup, recovery, and disaster recovery solutions for Amazon EC2, RDS, Redshift, Aurora, and DynamoDB. Learn how fast-changing regulatory requirements, ransomware, and the inevitable human error or bug have made compliance a top concern and how to easily and efficiently automate their compliance and security requirements.

    We'll explore why compliance is key to scaling an AWS environment and how to leverage automation in the process. You'll learn how to take your cloud security to the next level with Total Compliance—ensuring your cloud infrastructure is audit-ready for 35 regulatory standards.

    Plus a special promotion! All live webinar attendees will receive a $50 AWS promo credit courtesy of N2WS.
  • The Evolution of Customer Experience (CX)… a look ahead to 2020
    The Evolution of Customer Experience (CX)… a look ahead to 2020 Rob Allman and Mike Wells from Dimension Data Sep 27 2018 2:00 pm UTC 45 mins
    Over the last 20 years, ensuring that the ‘customer is king’ has become more significant than ever. In today’s digital world, where technology enables almost instantaneous exchange of information, making sure your customers’ voices are heard is critical. Companies are under pressure to deliver tangible value to remain relevant in an age where disruptive innovators set the standard. What do the next few years hold for customer experience (CX)? Our e-book explores what the future of CX could look like.
    Join the webinar where our experts explore CX in 2020.
    Speakers:
    Rob Allman Principal Practice Director: Customer Experience, Cx & Workplace Productivity
    Mike Wells Senior Director Consulting, Consulting Services
  • Enabling Digital Transformation with Container Technologies
    Enabling Digital Transformation with Container Technologies Terry Shea, Kublr Sep 27 2018 3:00 pm UTC 45 mins
    Digital transformation may be in danger of becoming an overused buzzword. Yet, real business needs are driving this trend and IT leaders feel the pressure to transform their businesses every day. Whether it is the need for speed, agility, or rethinking business processes as a whole – these challenges are here to stay.

    Remember that bookseller? The one that decided not to be a bookseller but a computing powerhouse and is now shaking up the entire retail industry? Companies such as Amazon, Airbnb or Uber, are pushing traditional enterprises to rethink their modus operandi.

    Whether you seek to transform your business model or improve your operations and customer interactions, Digital Transformation Initiatives have several common elements:
    •Experimentation and speed
    •Realignment and partnering between IT and the business
    •Use of cloud technologies
    •Modern application architectures

    Containers and Kubernetes are part of the technology ecosystem enabling Digital Transformation. In this online meetup, we’ll discuss how container technologies facilitate organizational alignment in IT around DevOps, cloud-native technologies, microservices, and APIs, as well as hybrid and multi-cloud architectures.
  • London’s Calling: ServiceNow Experts Share London’s 5 Most Compelling New Adds
    London’s Calling: ServiceNow Experts Share London’s 5 Most Compelling New Adds Ken Michelson, Marci Parker, Michelle Bautista, Johnny Walker, Meghan Lockwood Sep 27 2018 5:00 pm UTC 60 mins
    On Thursday, September 27th, 1:00 PM ET, 10:00 AM PT, we've got an expert panel to discuss London. Get up-to-date with new features and figure out your next steps.

    Join Ken Michelson, VP of Platform Solutions, Marci Parker, VP of Client Delivery, Meghan Lockwood, VP of Strategic Marketing, Johnny Walker, ServiceNow Architect, and Michelle Bautista, Presales Solution Architect, as they present London's Calling: ServiceNow Experts Share London's 5 Most Compelling New Adds.

    - Learn about the 5 most compelling features ServiceNow added with London
    - Ask our panel of experts your questions about the release
    - Find out if this upgrade is right for your team, plus our tricks to creating a 5-star upgrade schedule
  • How to Offer Technology Choice (and Reap the Benefits)
    How to Offer Technology Choice (and Reap the Benefits) Kat Garbis, Solutions Architect, Jamf Sep 27 2018 6:00 pm UTC 60 mins
    The war for talent is real. According to the Manpower Group, the enterprise is seeing its highest talent shortage since 2007 in crucial business roles such as IT, sales, engineers, finance and management. How can you get a leg up on the competition and start hiring and retaining the best talent? It begins with choice.

    In our webinar, How to Offer Technology Choice (and Reap the Benefits), we will walk you through the what, why and how of employee-choice programs, and examine recent survey findings that show 72 percent of employees will choose and stay at an organization that offers them choice in work technology.

    You’ll learn:

    - How choice influences the employee experience
    - Security implications to consider when offering choice
    - A framework to ensure a successful choice-program implementation
  • Future Smarter with NETSCOUT – Migrate to the Hybrid Cloud with Confidence.
    Future Smarter with NETSCOUT – Migrate to the Hybrid Cloud with Confidence. Ray Krug, Enterprise Solutions Architect, NETSCOUT Oct 2 2018 5:00 pm UTC 60 mins
    The ever-increasing pace of digital transformation is making businesses ever more reliant on interconnected software applications, substantially increasing complexity for deploying and managing these new services. In addition, increased dependence on hybrid cloud magnifies the risk that these technologies may slow down or end up failing. In this webinar, join Ray Krug, Enterprise Solutions Architect at NETSCOUT to learn about:

    • The challenges facing IT teams and the potential barriers that threaten the operation and migration of applications on-prem, off-prem and in hybrid environments

    • How you can extend the smart data your IT team has relied on in your physical and virtual worlds to maintain continuity, visibility and service throughout the transition to public cloud

    • Real-life examples of how businesses have harnessed this visibility in their Cloud environments.
  • Cloud Cost Management 101: Cloud Cost Savings
    Cloud Cost Management 101: Cloud Cost Savings Todd Bernhard, CloudCheckr Product Marketing Manager Oct 2 2018 6:00 pm UTC 45 mins
    When launching and maintaining a cloud-first infrastructure with Amazon Web Services (AWS), Microsoft Azure, or GCP, it’s easy to lose track of underused or underutilized items. However, properly managing cloud resources is one of the most effective ways to reduce your monthly cloud spend. In this foundational webinar, we walk through initial challenges you may face after migrating to the cloud, and discuss different ways to tackle them.

    Cloud Management Platforms (CMPs), like CloudCheckr, regularly check for underused and underutilized items in your cloud and present them to you with options for the next step. CloudCheckr makes recommendations based on analytics, and the results speak for themselves: Customers typically report saving 30% on their cloud spend per month.

    This 101 session is part of a comprehensive Cloud Cost Management mini series, designed to arm you with the essential knowledge you need to succeed in the cloud. You will learn cloud cost best practices, tips and tricks to better optimize your AWS and Azure consoles, and utilization best practices. This webinar is designed for service providers, resellers, and public sector organizations.

    Register for the next session → Cloud Cost Management 201: Right Sizing
  • Powering the Digital Workplace with Box and Office 365
    Powering the Digital Workplace with Box and Office 365 Rand Wacker, VP of Product Marketing @ Box and Rafael Pere, Sr. Sales Engineer @ Box Oct 3 2018 3:00 pm UTC 60 mins
    If you're deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.

    Tens of thousands of businesses running Office 365 choose Box over OneDrive and SharePoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including a:

    Better user experience — users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
    Better admin experience — more granular controls, one admin console to manage all your content
    Better security — a central platform for consistent security and governance
    Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
  • [Ep.21] Founders Spotlight: Matt Angerer, Founder, VerticalRent
    [Ep.21] Founders Spotlight: Matt Angerer, Founder, VerticalRent Matt Angerer, Founder, VerticalRent Oct 3 2018 4:00 pm UTC 45 mins
    In 2014, the founders of VerticalRent (www.verticalrent.com) were featured by Microsoft BizSpark for their early achievements with launching the industry leading rental property management and tenant screening software platform for property managers and landlords. In that article, Microsoft wrote: Matt Angerer is an IT professional by day and a landlord by night. At all times, he has an entrepreneur’s heart and mindset.

    A lot has changed since 2014. VerticalRent has more than quadrupled in the sheer number of landlords using the platform from every corner of the United States. The one thing that has not changed is that VerticalRent remains a small operation without employees that epitomizes the concept of a Lean Startup. If you're an IT professional by day who has been toiling with the idea of launching your own "side-gig", you'll want to tune into this BrightTalk webinar to learn how Matt Angerer, Founder of VerticalRent, started with a simple idea and scaled it into a platform that services over 25,000 landlords and nearly 50,000 renters across the United States in 5 short-years -- all while keeping his day job, running his rental properties, and financially supporting a family of 4.

    Matt will share with you the techniques he learned that allowed him to balance his personal and professional life to create a software as a service business. In this Webinar, he'll cover:
    - The Learn Start Up Mentality - What it Means and How to Live it Day by Day
    - Why a Slow-Growth Approach is Better for Certain Personality Types
    - How Anyone Can Create a SaaS Platform to Create Side Revenue
    - Why SaaS is More Lucrative in the Long-Term than Consulting
    - The Darkside of Entrepreneurship and Why Its Necessary

    Join us on Wednesday, October 3rd at 9am PT / 12pm ET for this live interview!
  • 5 Ways to Boost Staff Engagement, Quickly and Affordably
    5 Ways to Boost Staff Engagement, Quickly and Affordably Jeff Toister and Roy Atkinson (moderator) Oct 3 2018 5:00 pm UTC 60 mins
    We all want an engaged service and support organization, yet success eludes us. According to a 2017 Gallup poll, employee engagement is officially stuck in a rut. In this interactive webinar, service expert Jeff Toister will share five practical ways you can quickly boost staff engagement, starting immediately and without spending a small fortune or launching a huge project. Learn about a simple motivation secret that's often overlooked, best practices for staff satisfaction surveying, no-cost engagement strategies you can implement right away, and more!
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Oct 3 2018 6:00 pm UTC 45 mins
    Part 3 Automated Certificate Management

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • [Webinar] How to Painlessly Ditch HP ALM & Go Agile
    [Webinar] How to Painlessly Ditch HP ALM & Go Agile Dr. Milan Verma Oct 3 2018 8:00 pm UTC 24 mins
    Watch test management expert and former HP software consultant, Dr. Milan Verma, as he prepares you with an actionable plan for migrating from HP ALM to full-functionality testing.

    . Unlock critical HP ALM migration insights including:
    . Why future facing companies are abandoning HP ALM
    . What critical features HP ALM is missing
    . Steps to finding a more intuitive software testing system
    . Just how PAIN-FREE migration can be
  • Trends and Challenges in Web Application Firewalls
    Trends and Challenges in Web Application Firewalls Aaron McKeown, Security Engineering @ Xero; Gil Feliciano, IT Infrastructure @ MMM Holdings; Terry Ray, CTO @ Imperva Oct 3 2018 8:00 pm UTC 60 mins
    As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewalls to understand the latest WAF technologies, trends, and industry challenges. Hear the experiences of Imperva customers and how they implement web application firewalls to protect their enterprises.

    Join this interactive panel with security and infrastructure experts to learn more about:

    - Our analysis of the detailed results and considerations of the report
    - Trends in application development and security – DevSecOps, Analytics and Hybrid Cloud
    - Effective deployment options to meet enterprise demands