Preventing Malware – Keeping Safe and Out of the News
Malware is being creating at a volume that now increases tenfold every few months. Other sorts of attacks also affect the security of your organizations confidential data and systems. Come hear a discussion of the security best practices you need to consider when evaluating whether or not you are doing all you need to prevent such attacks from compromising your security
RecordedMar 24 200932 mins
Your place is confirmed, we'll send you email reminders
Mark Rogov, EMC, Ken Cantrell, NetApp, Alex McDonald, NetApp
The storage performance benchmarking dynamic duo, Mark Rogov and Ken Cantrell, are back. Having covered storage performance benchmarking fundamentals, system under test and most recently block components, this fourth installment of the Webcast series will focus on File Components.
Register now to learn why the File World is different from the Block World. Mark and Ken will walk through the basic filesystem theory to how filesystem data layout affects performance, covering:
• Why file?
• Local vs. shared filesystems
• Compare and contrast typical file performance use cases
Alex Shteynberg Technology Architect; David Hansford Technology Architect, Microsoft Corporation
Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.
Join this webcast to learn:
What components make up EMS
How to get up and running with EMS
How to provide secure access to corporate data
Protect everything—across devices, operating systems and applications
Joseph Yoklavich, National Sales Director for Energy
Attend this webinar to find out why USG&E, Engie and other energy companies choose OutSystems for application development and integration. You’ll see:
•How to build a mobile application visually in minutes
•How easy continuous change can be with Integrated App Feedback
•How simple and fast integration with existing back-office systems and data can be
Mobile is omnipresent in our world today. This puts a constant demand on performance engineers to deliver apps that are faster and better – a challenge when you also have to deliver apps quickly with quality. Users have no patience for low performing apps.
In this web event, the first in our mobile performance testing series, we’ll review the technical nuances of doing mobile performance testing more efficiently. HPE’s guru in performance engineering, Gaspare Marino, will present the mobile solutions for HPE LoadRunner:
Mobile applications HTTP/HTML
TruClient – Mobile Web
TruClient – Native Mobile
Join us for this and all future events in the Mobile performance testing webinars series.
Andu Haon – Principal Group Manager, OneDrive and SharePoint
See a demo-rich overview of the new SharePoint mobile app to access and stay connected to the content that matters most to you across your intranet while you’re on the go; and how this translates to the new SharePoint home. Watch as principal engineer, Andy Haon walks you through the key elements that bring your Intranet into the cloud first, mobile first world, so that you can: navigate your sites and portals, and access important content, information and people.
OneDrive for Business as part of Office 365, is designed to provide effortless, powerful file sharing and collaboration across all your devices with integrated security, privacy and compliance controls. Watch as OneDrive Director, Reuben Krippner, gives you a tour of the new and upcoming capabilities that make OneDrive the window to all your files in Office 365 regardless of whether they are in OneDrive, Office 365 Groups or SharePoint. Also, don’t miss a first look at new intelligent experiences for trending and suggested content as well as insights into the impact and reach of your work.
Navjot Virk – Principal Group Manager, OneDrive and SharePoint
Trust is a key principle of our ambition to reinvent business productivity. As we deliver SharePoint and OneDrive our commitment to security, privacy and compliance is unwavering. Learn from principal engineer Navjot Virk as she both explains and demonstrates Microsoft’s approach and upcoming capabilities for differentiated access, the prevention of unwanted data sharing and more, giving you better control over the security of your data.
Michael Connolly – Principal Group Manager, OneDrive and SharePoint
Whether you have a long-term commitment to keep the bulk of your company’s assets on-premises, or you are planning a full transition to cloud in the future, SharePoint Server 2016 allows you to extend your on-premises investment to the cloud today. Principal engineer Michael Connolly explores the easiest ways for you to get value out of the Cloud now via a hybrid solution that doesn't require full migration of content from your existing on-premises deployment. You can learn more by checking out our resources at: hybrid.office.com OR aka.ms/sphybrid
SharePoint Server 2016 represents a new generation of SharePoint, that brings our experience running SharePoint at scale in Office 365 to your datacenter. This allows us to bring innovation to you at a more rapid pace and on your terms; improve performance, reliability and scale, and provide a foundation for future innovation. Watch as SharePoint veteran, Bill Baer provides an overview of the key elements that make this possible including the new feature pack model; converged code base; the standard min-role topology and zero down-time patching.
Daniel Kogan – Principal Group Manager, OneDrive and SharePoint
Whether you are a 1st or 3rd party SharePoint developer, the new SharePoint Framework offers a modern new client side approach that allows you to extend and customize SharePoint with high-trust code in ways that were previously unavailable in the Cloud. Watch, as program manager Daniel Kogan, provides an overview and demonstrates how the SharePoint Framework helps you to create beautiful, responsive solutions that you can customize to your own needs. Stay to the end to see how you can build and test SharePoint Web Parts locally with the new workbench, without having SharePoint running in your own environment.
Ron Longo, VP of WW Operations, Mike Wood, VP of Marketing
Enterprise wide area networks span tens, hundreds, thousands and even tens of thousands of branch offices resulting in a large hardware footprint, high power consumption, and significant cooling demands. It is no wonder that these networks can have a substantially negative impact on expenses, time and the environment.
Join this webinar to learn how a cloud-delivered software-defined wide area network (SD-WAN) is green, lowers carbon footprints and is good for the environment and Earth. Gain a better understanding of how reducing cooling and power requirements in the branch, lower carbon emissions and fewer devices is helping businesses do more for the environment while at the same time saving money.
Jeff Wallace, President/Founder, Global Kinetics; Anand Ramachandran, VP of Strategy, NTT Innovation Institute
Over the course of the past two decades, the debate over what makes for an engaging digital customer experience has been an ongoing conversation - over and over, anywhere and everyplace. As we dive deeper into the worlds of the Internet of Things, Enterprise Mobility and overall Digital Transformation, understanding how to best engage users is critical. If you subscribe to our philosophy, that user experience drives user adoption and user adoption drives ROI, then without a doubt, the best opportunity to earn ROI on such investments is to pay close attention to creating a compelling user experience. We'll discuss such topics specifically as they relate to these technologies.
Mike Matchett, Sr. Analyst & Consultant, Taneja Group
Come join Senior Analyst Mike Matchett's lively discussion about the concerns and challenges coming when the Internet of Things crashes into our enterprise datacenters. We think big data today is big, but future IoT data streams promise to swamp everything from servers to storage. And today's new big data applications will still need to become more real-time, more agile, distributed and even more scalable. What's coming down the road, and how should we start planning for the future today?
This webcast will go for 30 minutes, followed by a 15 minute Q & A session, where the audience is welcome to ask questions.
Jose Ruiz, VP Engineering Operations, Compass Datacenters
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.
Have you ever wondered if you were getting the most out of your day? Have you ever wondered if you were getting the most out of your team? Well now you can know if you are.
Microsoft Office 365 now delivers rich interactive insights into key trends such as reach, influence and work-life balance across your team. Additionally, with all new tools in Power BI Pro your teams can visualize & analyze live data with greater speed, efficiency, & understanding. Dashboards, interactive reports, & visualizations bring data to life.
Join us to experience the power of Microsoft’s Organizational insights and data visualization tools that are sure to help you and your team be the best they can be without investing additional time.
Scott Villinski, National Director, State and Local Government Enterprise Mobility Sales
More and more of the business and communications of government agencies are now conducted via mobile devices, including tablets and smartphones. While this can enhance productivity, it also poses security and policy challenges. In this webcast you'll learn some of your options for managing mobile users.
Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether it’s an IT, HR or customer service question, having to search multiple places or contact another employee for knowledge that is available but not easily found wastes valuable time and effort.
Register now and join us live or on demand to see how you can create, publish, and access enterprise-wide knowledge via the Microsoft Dynamics Employee Self Service Solution. Intuitive experiences right within Outlook and Word and many other channels, including self-service portals and mobile devices, help you uncover and share answers, and connect to your SharePoint Document Library for master documents. You’ll see how Microsoft’s Employee Self Service Solution helps customers to:
•Increase employee engagement, productivity and satisfaction by providing easy access to a consistent, authoritative and searchable knowledge base.
•Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise –wide: HR, IT, Compliance, Finance, Customer Service and more.
•Reinforce adherence to policies and procedures by making corporate compliance guidelines available to all employees.
Scott Villinski, National Director, State and Local Government Enterprise Mobility Sales
One of the biggest challenges you will face as you move to the cloud is keeping your users productive while protecting your agency data. Your users' identities will live in your datacenter as well as in the cloud, so how you protect that and maintain your security processes is vitally important. The way people access applications and resources is changing. This is why the user's identity is crucial to protecting your data and applications.
Our discussion of hybrid identity will cover:
1. Options for synchronizing identities to the cloud
2. Self-service capabilities for your users, including password management, group management and single sign-on
3. How to configure single sign-on to SaaS applications
4. Automating identity management across different repositories in your datacenter
With our ‘always-on’ society, business users are demanding untethered access to communication and information. Enterprise mobility and its integration with other forms of communications within the enterprise has forever changed how we interact in the business environment and is empowering organizations – large and small.
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Join CounterTack and Paladion Networks for a live webinar as we walk through the attack that shook banks across the globe. We'll hear from the incident response team at Paladion who supported the investigation, and will discuss:
· How the criminals gained access to the SWIFT servers
· The timeline of events that took place
· A fatal mistake that led investigators to the discovery
· Takeaways organizations can learn from to prevent similar attacks
Oggi l’Application Economy richiede un approccio Agile anche nel controllo quotidiano delle infrastrutture IT e nel controllo delle sue performance.
Gli ambienti IT tendono sempre di più ad essere eterogenei con la presenza di sistemi legacy e cloud sia in forma privata che pubblica (hybrid cloud). Allo stesso tempo agli operation manager viene chiesto di essere proattivi e sempre più veloci nel tenere sotto controllo lo stato dei servizi di business erogati.
Un approccio ai tool di monitoraggio a “silos” non risponde a questi requisiti e rischia di mantenere alti i tempi di risoluzione delle criticità e dei problemi (MTTR alti).
CA Unified Infrastructure Monitoring (UIM) consente di avere una visibilità a 360 gradi sulle applicazioni, servizi e infrastruttura (fino al mainframe) in modo moderno e ottimale unificando i vari tools di monitoraggio dipartimentali, offrendo un controllo puntuale sia sui sistemi più tradizionali che sulle nuove tecnologie cloud e micro-service.
Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
•The current state of phishing
•The success and failure of technology systems and how human systems can protect the last mile
•How conditioning – not training - activates employees to identify and report phishing attacks
•The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response
Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.
Presenter: Jim Hansen, Chief Operating Officer, PhishMe
Jim has over twenty-two years’ experience in sales, operations and
executive management in the information security industry,
including co-founding and serving as COO of Mandiant. He has also
held numerous executive and management positions in both sales
and consulting organizations, and regularly speaks and publishes
articles on information security topics.
Controlling and protecting smartphones and tablets and the applications they run is an important part of the extended endpoint protection environment. Endpoint security is vital, and you need to treat your mobile endpoints with the same urgency as your Windows and server endpoints.
Join Zimperium’s latest webinar featuring Ovum’s Andrew Kellett. Andrew and John will discuss the importance of adding mobile devices to your endpoint security procedures and how to detect attacks via mobile OSs, applications, malware and Wi-Fi networks.
- Mobile Devices are a Viable Vector of Attack
- Ovum Research: Endpoint Security & Mobile Security Requirements Differ
- Enabling mobile devices as threat detection sensors
DevOps is an immensely popular topic. And there is frequent debate over whether practicing DevOps makes your applications more secure or less secure. So we conducted a blind study to research the state of Secure DevOps. We will share our findings such as:
What tools and processes are mature DevOps shops using?
How mature is the average DevOps shop?
How is application security thought of in DevOps methodology?
Common misunderstandings around application security and the resulting risk.
See how we incorporated these findings to help you integrate application security into an Agile or DevOps methodology. You need not compromise.
This presentation will explore not just who is my marketing video audience, but how are they viewing the video? David, Mark, and Mark will discuss the different approaches required for mobile video from the storytelling and the aesthetic/technical perspective.
We'll breakdown these important questions: Can you be sure that your audience will have the audio turned on? Why does direct address to camera work so well for mobile? What’s the ideal length for a mobile video? Could a slick, commercial style video actually be less successful than a playful more personal story?
Addressing these ideas through the concepts of mobile aesthetics, user authenticity, personalization, humor, narrative, and serialization, David, Mark, and Mark explain how to optimize your video marketing for the vast mobile audience.
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
In between scrum meetings, user stories and ever shortening sprints, have you penciled in load testing? How do you detect performance degradation and shorten time spent finding and fixing problems in production? Join us and learn how StormRunner can help you deliver high quality projects faster and make load testing a natural fit into your agile development. Your admission also secures you a live demo of the product.