Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.
Attending this webinar will give you a framework for evaluating AI/ML technologies, including:
- When can AI/ML indeed replace people, and when is it better suited to assist people?
- What types of threats is it best suited for?
- How does AI/ML fit in with other methodologies like security analytics, for threat detection?
- How can AI/ML help with security investigations and incident response?
- How can organizations evaluate vendor claims and ask them the right questions?
2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?
Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:
· Major cybersecurity trends from the past year
· Cybersecurity tactics that worked – and didn’t work – in 2017
· How to take a proactive cybersecurity approach to fending off cyber threats
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.
Each month, we will have a specific theme to help promote awareness and best practices.
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.
This webinar will cover:
•The Next Generation of Data Centers: High Efficiency Meets Scalability
•Streamline Heterogeneous Data Center Management with [SMART]DC
•Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
•Achieve up to 30% in Power Savings for Your Infrastructure
•Minimize Operational Disruptions and Protect Hardware Investment
•How You Can Start Today
With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.
Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.
“SIM providers are going away. It’s just a matter of when.”
—Drew Johnson, VP Engineering & Operations, Aeris
“Automotive transformation via the IoT will become mainstream.”
—Michelle Avary, VP, Automotive Strategy, Aeris
“With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
—Dr. Rishi Mohan Bhatnagar, President, Aeris India
“Security will have to up its game as IoT delivers huge volumes of data.”
—Syed “Z” Hosain, Chief Technology Officer, Aeris
My prediction: This will be the only IoT futuristic view you will need to attend this year!
Sign up now for this futuristic view into the future of IoT.
(ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.
In this webinar we will learn about:
i. Why SSL visibility is important
ii. What new challenges are we facing in SSL
iii. The importance of performance
iv. SSL in the age of virtualization
v. The impact of the evolving datacenter landscape on SSL requirements
How does an established data center-centric organization with high trust and security needs move to the public cloud? How does a waterfall-model-oriented organization make such a move in a timely fashion so as to not be left behind by its competition? What does governance look like for such an organization's use of the public cloud? What can these organizations avoid doing wrong?
These questions are answered by using the fundamentals of Agile methodologies: prioritization by highest value and risk; technical excellence; and continuous delivery of valuable products as seen through the lense of security principles. Those principles include least privilege, separation of duties, data protection, and visibility to examine and provide solutions for the trust, security and governance needs of cloud-new adopting organizations.
With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.
In application security, the size of the security team is always the most scarce resource. The best way to optimize the security team is automation. This presentation will provide an overview of key application security automation principles and practices creating an Application Security Pipeline augmented with automation.
With the rise of docker and serverless patterns, there is a whole new suite of tools available to the pipeline builder. We show you how to get started automating application security tooling and reporting using these new patterns.
Are you concerned about loss of control and visibility as you move applications and workloads to the cloud?
NetScaler Management and Analytics (NetScaler MAS) provides application level visibility, management and automation of your application delivery environment across multiple clouds. NetScaler MAS is available as a Citrix cloud service or can be deployed as software in your data center.
Join this webinar and learn how to:
• Harness and use data about users, apps, and traffic from any NetScaler or HAproxy
• Automate and manage your entire application delivery infrastructure from one console
• Deploy and map applications to infrastructure using stylebooks so that you can easily manage your app’s lifecycle
• Ensure policies are consistently applied by automating provisioning, configuration and SSL certificate management across your environment
• And more!
Machine learning advancements by VMware, new heterogeneous data integration technologies and an innovative hybrid cloud management platform have put predictive analytics in reach for nearly every VMware customer. Hear from Blue Medora Chief Solution Architect, Craig Lee, discuss the tools you’ll need to help you accelerate time to remediate critical components of your IT Stack through root cause analysis.
Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?
Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.
Join us to learn how to enable safe cloud adoption while maintaining compliance.
• How to address security and compliance challenges when migrating to the cloud
• How to support GDPR compliance in the cloud
• Leverage a single data protection solution for email, storage, network, endpoints, and cloud
This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
Die Verlagerung von Testumgebungen in die Cloud bedeutet neue Chancen für Softwarequalitätssicherung und Entwicklungsabteilungen. Durch die deutlich verkürzten Bereitstellungszeiten können Softwaretests in kürzerer Zeit und damit termintreuer, aber dennoch mit höherer Testabdeckung durchgeführt werden. Die Nutzung der Cloud-Technologie für die Testautomatisierung stellt nicht nur eine Alternative zu Hosting und Virtualisierung dar, vielmehr bringt sie einen Quantensprung in Sachen Qualität und Zuverlässigkeit der ausgelieferten Anwendungen mit sich. Tests, die bisher selten durchgeführt wurden, weil sie zu aufwändig oder zu teuer in der Umsetzung waren, können in der Cloud nun mit deutlich weniger Aufwand und Kosten realisiert werden.
Mit StormRunner Functional (SRF) hat Micro Focus genau hierfür eine innovative Lösung auf den Markt gebracht, mit der funktionale Tests für Web-, mobile sowie SAP-Anwendungen einfach aus der Cloud heraus durchgeführt werden können. Die Vorteile auf einen Blick:
- EINE cloudbasierte Plattform für das manuelle, explorative und automatisierte Testen.
- Unterstützt agile Verfahren und Continuous Integration-/Testing-Initiativen.
- Sehr einfache und übersichtliche Bedienung – auch für Business- und Fachabteilungen.
- Keine Installation notwendig, SRF wird rein über den Browser aufgerufen.
- "Out-of-the-Box"-Bereitstellung von Testumgebungen unter Berücksichtigung der verschiedensten Kombinationen hinsichtlich Betriebssysteme, Browsertypen sowie deren Versionen.
- Nuzung von vorhandenen Skripten (UFT, UFT Pro (LeanFT), Selenium).
- Möglichkeit zur Erstellung und Verwaltung von automatisierten Testfällen direkt in der Cloud.
- Integration in agile Projekte über gängige CI/CD-Engines.
Erfahren Sie im Live Webinar am 11. Januar 2018 anhand von ausgewählten Use Cases und einer spannenden Live Demo alles über StormRunner Functional.
Seien Sie dabei und nutzen Sie die Gelegenheit, Ihre Fragen an unseren Experten zu stellen.
In the last ten years, the profile of network traffic has completely changed from the ten years before that. The internet of things (IoT), the variance and number of connected devices, video, images, voice, credit card data and payments processing, wifi, and much more has changed the requirements of what networks must support today.
Retail, specifically, must support various types of network traffic and each must be treated differently, such as separating PCI traffic from guest wifi from voice. This is where segmentation plays a strategic role.
This webinar will cover the following topics:
- What is segmentation as it relates to SD-WAN.
- Why segmentation matters in Retail, illustrated with use cases.
- A live demonstration segmentation with SD-WAN.
According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.
But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.
Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.
ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.
•Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today
•Security challenges: What basic micro-segmentation does, and the compromises it misses
•Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks
빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
In this brief, video clip hear insights from the City of Sparks (NV) IT Manager, Steve Davidek, on the security challenges faced by most governments and business organizations. Learn how Arctic Wolf's industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.
We are excited to be hosting another Vivit SIG Talk [#VivitSIGTalk] event focused on Proven Practices around Quality & Testing for you. The live event is being held on 9 Jan 2018 at 12 PM ET, and a full session replay, along with individual session replays and slides presented will all be available.
For this Vivit SIG Talk session, we will be featuring speakers from the United States, England and Australia. If you have been in the Quality & Testing space for any period of time, you will recognize each of these individuals as experts. We are fortunate enough to have them as speakers, so they can share their thoughts, and provide our members with some thought provoking and actionable content.
Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.
We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
• consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
• incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
• reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
• vastly improving workflows to improve audit preparation from a previously non-auditable change process
Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.
Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.
Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
“Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.
Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.
Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.
This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
Webinar topics include:
• Ergonomics 101
How it impacts workplace productivity
• Sitting vs. Standing
The benefits and costs
• Employee Retention
Why comfort makes employees happy
Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.
Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.
Other items covered include:
Policy optimization for Cisco Firepower
Enhancements to topology to further support “what-if” analysis
Policy Browser search enhancements
Changes to cloud license enforcement
In Nov. 2017, MEF released our MEF 3.0 transformational global services framework for defining, delivering, and certifying agile, assured, and orchestrated services across a global ecosystem of automated networks. Dozens of service and technology firms have publicly embraced MEF 3.0 and currently are involved in MEF 3.0 development work.
MEF 3.0 services provide an on-demand, cloud-centric experience with unprecedented user- and application-directed control over network resources and service capabilities.
Over the next several months, MEF will host a series of webinars covering the key pillars of MEF 3.0:
• Standardized, Orchestrated Services
• Open LSO APIs
• Agile Service & Technology Certification
• Community Collaboration
Our first webinar will provide an overview of MEF 3.0, including:
• Explanation of the MEF 3.0 framework
• Comparing MEF 3.0 to CE 2.0
• Latest developments on inter-provider and intra-provider LSO APIs
• An exciting new approach to MEF certifications
• Expanded community collaboration
While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.
Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:
-How does behavioral security differ from existing security solutions like image scanning?
-How does Falco work?
-What can it detect?
-How to build and customize rules.
-How to extend with alerting options.
Who should attend?
If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
Digitalisierung, Cloud oder DevOps machen auch vor dem Service Management nicht Halt. Die Interaktion zwischen Endanwender und Help Desk soll modern, interaktiv, transparent und mobil sein. Die Anwender wünschen sich ein zentrales, interaktives Portal für alle Anfragen. Transformative Trends wiederum verlangen nach Service Management-Lösungen, die mit ihrer Geschwindigkeit mithalten können. Routinetätigkeiten sollen sukzessive automatisiert werden können und zugleich kosteneffizient sein.
Eine innovative Lösung hierfür ist Service Management Automation-X (SMA-X) von Micro Focus. Sie bietet integrierte virtuelle Agenten mit Chatbots, Social-Collaboration-Funktionen, ein Smart-Ticketing-System und intelligente E-Mail-Programme. All dies sorgt beim Anwender für ein optimiertes Nutzererlebnis. Als erste vollständig containerbasierte und mandantenfähige Plattform für das Service Management bietet SMA-X die größte Bandbreite an Deployment-Optionen. Auch strengste Service Level Agreements können damit kosteneffizient erfüllt werden. Sie verfügen über die Datenhoheit und können so Sicherheit und Speicherort der Daten garantieren sowie Datenschutz- und Compliance-Richtlinien einhalten.
Diese Vorteile von Service Management Automation-X lernen Sie im Webinar kennen:
• Containerbasierte Bereitstellung vom Rechenzentrum bis zur Public Cloud
• Läuft in der Public Cloud mit voller Performance- und Kostenflexibilität
• Code- und versionslose Benutzerführung
• Schlanke und moderne Benutzerführung durch den Einsatz von Big Data Analytics und Automatisierung
• Mandantenfähigkeit durch Containertechnologie
• Zusätzliche Enterprise-Anwendungen
• Verbesserte Smart Ticketing Analytics durch optische Zeichenerkennung und maschinenbasierte Lernsysteme
• Hosting in Deutschland im zertifizierten Rechenzentrum der Materna in Dortmund
Nutzen Sie die Gelegenheit, Ihre Fragen an die Experten zu stellen. Die Teilnahme am Webinar ist für Sie kostenfrei. Wir freuen uns auf Ihre Anmeldung.
Join IBC365 and Tata Communications on Thursday 25 January at 1pm GMT to explore how remote production is changing the way sports broadcasters operate.
Remote production gives broadcasters the ability to produce live broadcasts at a distance from the actual event, by sending raw camera feeds, audio and equipment control over a telecom infrastructure to a central studio facility.
It helps to generate high volume of sports content economically, thereby improving productivity and efficiency for sports broadcasters.
Today, for any live event, about 30-40 people travel to each location with kit and other equipment to produce the broadcast feed at the venue. This is not only expensive but also logistically a nightmare.
By producing feeds remotely at a central location only a handful of camera crew would have to travel while the technical director, commentator and other key crew members can finalise production at a central location.
In this webinar we explore how broadcasters and production companies can overcome any technical and operational challenges to embrace the benefits of remote production.
Jeremy Dujardin, CTO, Media Services, Tata Communications
Dhaval Ponda, Global Sales Head, Media Services, Tata Communications
Josh Liemer, VP Creative Services, VISTA Worldlink
There are quite a few Docker security tools in the ecosystem; how do they compare?
Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/
We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.
Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:
How to secure Docker containers and what are the best practices
Why you need to both static and dynamic (run-time) scanning for your images
What other container security measures and policies are necessary in production
Demo: Comparing and implementing docker security basics with the most popular container security tools
Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.
Join us for our webinar “Putting the Power of Proxy to Work” to learn how:
- Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud
- Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365
- A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization
As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.
There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.
What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.
Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.
Key topics discussed include:
• Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
• Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
• Lessons learned from our most strategic and complex engagements
SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen?
30.01.2018 um 10:00 Uhr - Micro Focus & IT-Onlinemagazin
IT-Abteilungen und SAP-Basisadministratoren sind aktuell nicht zu beneiden: Sie stehen im Spannungsfeld hohen Kostendrucks, steigender Heterogenität der IT-Landschaften, dem SAP-Generationswechsel und ganz neuer Anforderungen durch Innovationsthemen.
Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, werden wir in diesem Expert-Talk diskutieren. Wir werden beleuchten, wie man Routineaufgaben in der SAP Basis automatisieren, wie man Self-Services für die Anwender einrichten und wie man die zukünftigen, hybriden Multi-Cloud SAP-Landschaften sinnvoll Ende-zu-Ende orchestrieren und über den gesamten Lebenszyklus hinweg managen kann.
Unser Anliegen ist es, Ihnen Ideen für Veränderungen im SAP Basis Betrieb aufzuzeigen, die Ihnen gleichzeitig Raum für Innovationen schaffen können. Wenn Sie im Vorfeld Fragen haben, senden Sie diese bitte gerne an: firstname.lastname@example.org.
Sandra Apflauer, Pre-Sales Team Lead Innovation Strategies, Micro Focus
Helge Sanden, Chefredakteur, IT-Onlinemagazin
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
For communication server providers (CSPs), Carrier Ethernet (CE) underpins the vast majority of modern services delivered to enterprise and residential customers. As CSPs seek to expand their service offerings from their networking infrastructure base, they need to leverage their CE access networks to seamlessly connect users to Multi-Access Edge Computing (MEC) applications. The strength of CE service orchestration and service level agreements (SLAs) provides a dynamic, trusted foundation for new revenue generating services. Ethernity Networks’ ACE-NIC 40G Server Adapter integrates field-proven CE services and programmable NFVI acceleration, all optimized to work with Intel servers and DPDK.