Hi [[ session.user.profile.firstName ]]

Virtualization

  • Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Nov 15 2018 55 mins
    Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.

    External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.

    Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
  • Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata, Recorded: Nov 15 2018 60 mins
    Ready to learn how to manage persistent storage for containers in the multi-cloud environment?

    Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.

    In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.


    Presenters:
    Anubhav Sharma, VP, Business Development, Nirmata
    Michael Ferranti, VP, Marketing, Portworx,
  • Walking on Clouds. Distributed File Services Made Easy
    Walking on Clouds. Distributed File Services Made Easy
    Paul Nashawaty - Product & Solution Marketing at HYCU | Devon Helms - Marketing Strategist at Nutanix Recorded: Nov 15 2018 41 mins
    Scaling out your file-based data storage just got easier. Never again do you have to sacrifice protection of an on-premise deployment with a seamless public cloud experience.

    Your Enterprise Cloud brings a common software layer to eliminate the complexity of deploying and managing separate infrastructures.
    Join this webinar and learn how to increase capacity dynamically while enhancing the protection and recovery of files and scaling on-demand.

    Throughout the webinar we will walk you through:

    -Recovery leveraging snapshots for impact-free backups
    -Reduction of incremental backups by up to 90% with Change File Tracking (CFT)
    -Protection of your files with agentless backup and recovery

    Did we mention no overlapping technology?
  • Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Application Explosion - Rediscovering the Lost Art of Protection Service Levels
    Storage Switzerland, Micro Focus Recorded: Nov 15 2018 57 mins
    The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.

    Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.

    By attending this webinar you’ll learn how to:
    * Implement service levels like RPO and RTO throughout the data center
    * Establish NEW service levels for copy management and recovered performance
    * Fix the disconnect between service levels and data protection applications
  • Geek Out: Data Automation in the Modern Software Defined Data Center Explained
    Geek Out: Data Automation in the Modern Software Defined Data Center Explained
    Charles Milo, Nic Bellinger, Narasimha Valiveti, Bill Borsari, Sailesh Mital Recorded: Nov 15 2018 61 mins
    Have questions on how to automate your data environment at scale and want answers? No presentations, no scripts, no marketing gimmicks, just your questions answered straight up without intervention by corporate hacks. Special guest, Charles Milo, Senior Solutions Architect at Intel joins our senior team of geeks from Datera to answer your questions on how to massively scale and automate a high-performance data environment using applied machine learning to achieve a software defined data infrastructure. You'll learn about what works and doesn't work with a 100% software-driven infrastructure used to power cloud-native applications, get the most out of new technologies like new flash drives and NVMe and not just what Datera does, but why we built the system the way we did and how it operates to powers your data.

    Bring your questions, and challenge Nic Bellinger, Chief Architect, Bill Borsari, Field Technical Leader, Shailesh Mittal, Senior Software Architect, and Narasimha Valiveti, our Head of Engineering and Charlie will sit down, geek out with you and get all your questions answered on data today.
  • Using Modern Authentication Methods with Legacy Assets
    Using Modern Authentication Methods with Legacy Assets
    Brandon Dunlap, Moderator, (ISC)², Jason Garbis, Vice President Cybersecurity Products, Cyxtera Recorded: Nov 15 2018 60 mins
    There are a large proportion of business critical legacy applications unable to accept modern forms of authentication.
    Refactoring legacy applications is costly and sometimes virtually impossible. Yet these applications are accessing highly valuable data across networks and they are a data breach ready to happen.

    Join us as we discuss how to secure legacy applications with modern Zero Trust security.

    Brandon Dunlap, (ISC)² Moderator and Jason Garbis from Cyxtera will discuss:
    -Problems with how legacy applications are secured today
    -Options for security without refactoring these applications
    -Simplicity and speed to security that reduces operational complexity and scope of audits
    -A process for gradual end-of-life legacy assets, while still operating day-to-day normal business
  • Programmable Storage, Software-Defined with no Hardware Requirements
    Programmable Storage, Software-Defined with no Hardware Requirements
    Hal Woods, CTO Datera Recorded: Nov 15 2018 3 mins
    Hal Woods, CTO at Datera talks about the need of the Software Defined DATA Center for 100% programmable storage and how Datera delivers it architecturally.
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Nov 14 2018 43 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Networking Requirements for Scale-Out Storage
    Networking Requirements for Scale-Out Storage
    John Kim, Mellanox; Saqib Jang, Chelsio; Fred Zhang, Intel Recorded: Nov 14 2018 44 mins
    Scale-out storage is increasingly popular for cloud, high-performance computing, machine learning, and certain enterprise applications. It offers the ability to grow both capacity and performance at the same time and to distribute I/O workloads across multiple machines.

    But unlike traditional local or scale-up storage, scale-out storage imposes different and more intense workloads on the network. Clients often access multiple storage servers simultaneously; data typically replicates or migrates from one storage node to another; and metadata or management servers must stay in sync with each other as well as communicating with clients. Due to these demands, traditional network architectures and speeds may not work well for scale-out storage, especially when it’s based on flash. Join this webinar to learn:

    •Scale-out storage solutions and what workloads they can address
    •How your network may need to evolve to support scale-out storage
    •Network considerations to ensure performance for demanding workloads
    •Key considerations for all flash
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Nov 14 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • One Dashboard to Rule Them All: The Technical Evolution
    One Dashboard to Rule Them All: The Technical Evolution
    Christine Quan and Caitlan Yu, solutions engineers at Periscope Data Recorded: Nov 13 2018 16 mins
    In a more aggressive competitive landscape than ever, data analysis is proving to be the key differentiator between winners and losers. But simply collecting information is not enough to get ahead; companies have to be able to blend data and build effective visualizations in order to optimize their business intelligence.

    To create a dashboard that can be used as single source of truth, there are many steps that need to be taken. Join Christine Quan and Caitlan Yu, two solutions engineers at Periscope Data, as they discuss the process to create this common data resource, such as:

    - Nurturing cross-team partnerships between chart creators and consumers
    - Sharing knowledge of data sources and connecting them to business value
    - Choosing the right chart type for an insight
    - Building advanced charts in R and Python

    This is part one of a two-part “One Dashboard to Rule Them All” webinar series. Make sure you keep an eye out for the companion webinar, “One Dashboard to Rule Them All: The Business Impact,” presented by Greg Strickland, COO at Periscope Data.
  • The Software Matters in Open Networking
    The Software Matters in Open Networking
    Storage Switzerland and Pluribus Networks Recorded: Nov 13 2018 61 mins
    Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can be confusing, and migrating away from legacy infrastructure can seem fraught with peril. Is the journey worth it?

    Join Storage Switzerland and Pluribus Networks where we will answer the following questions:
    • What are the benefits of open networking and SDN in the data center?
    • How can I safely migrate to a disaggregated white box architecture when I have incumbent vendors deployed throughout my network?
    • How do I deploy SDN in my data center and do I need a full hardware refresh to do it?

    Register before November 9th and receive an exclusive copy of Storage Switzerland's newest eBook "Virtualizing and Automating the Network - A Guide to White Box Switches, Network Operating Systems and Software-Defined Networking."
  • Driving Digital Transformation with SUSE Global Services
    Driving Digital Transformation with SUSE Global Services
    Stacey Miller, Product Marketing Manager, SUSE Global Services & Jeff Loomis, SUSE Services Director, North America Recorded: Nov 13 2018 26 mins
    The digital economy is here and you are under tremendous pressure to transform your IT department to meet the new normal of delivering exceptional customer experiences.  At the same time, you have to continue to meet the needs of everyday business and maintain core legacy IT systems. With skills scarce and in high demand, how do you do both?  

    The answer is partnering with a trusted open source provider with a strong services arm.  One who can jumpstart your transformation and stand by your side as an advocate for your business.

    SUSE Global Services has flexible consulting delivery solutions and premium support services options to maximize value from open source solution investments.
  • What's Your DNS Security Risk? Insights from recent Ponemon Survey
    What's Your DNS Security Risk? Insights from recent Ponemon Survey
    Lindsay Drabwell, Head of Membership EMEA, (ISC)², Malcolm Murphy, Chief of Staff EMEA, Infoblox Recorded: Nov 13 2018 58 mins
    Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into:

    •The level of visibility these organizations have, especially in today’s complex network deployments
    •Their use of threat intelligence and the effectiveness of threat intelligence
    •The efficiency of their security operations
  • Using Inline Security Tools to Achieve Your Security Goals
    Using Inline Security Tools to Achieve Your Security Goals
    Adrian Rowley, Technical Director EMEA, Gigamon, Lindsay Drabwell, Head of Membership Services EMEA, (ISC)² Recorded: Nov 13 2018 58 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
    The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
    Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Enterprise Data Protection Across Private and Public Clouds
    Enterprise Data Protection Across Private and Public Clouds
    Radha Manga Sr. Director Customer Solutions at Pure Storage & Pratik Chava,Technical Sales leader, Cohesity Recorded: Nov 13 2018 41 mins
    Its no secret that data quantities are increasing relentlessly, well expectations for fast performance are making Flash memory more prevalent than ever. At the same time, organizations of all sizes are relying on coming to the cloud to augment their IT Infrastructure. In this challenging environment, data protection technologies have never been more important

    Experts from Pure Storage and Cohesity will discuss the industry’s first all-flash, scale-out file storage, purpose-built for high-performance and immediate access to mission critical file and object data.

    Pure Storage FlashBlade provides unparalleled performance across a broad range of environments. Cohesity, the leader of hyperconverged secondary storage makes your data work for you by consolidating secondary storage silos onto a web-scale data platform that spans both private and public clouds.
  • Veeam + Pure
    Veeam + Pure
    Jörg Schneider Systems Engineer bei Pure Storage Recorded: Nov 9 2018 35 mins
    Veeam & Pure Storage - Damit Backup und Restore Spindeln von gestern sind.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Nov 8 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • Holistic Disaster Recovery; from Data Center to Endpoint
    Holistic Disaster Recovery; from Data Center to Endpoint
    Storage Switzerland, KeepItSafe, Veeam Recorded: Nov 8 2018 62 mins
    Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as well as endpoint need inclusion into the organization’s disaster recovery plan.

    Today disasters like ransomware and other cyber-threats can impact both data center servers and user endpoint. And, both endpoints and data center servers are susceptible to “minor” disasters like hardware failure and software bugs, which at the time seem major to those impacted. Endpoints, unlike servers also face another type of disaster loss or theft.

    Register now for our upcoming webinar where experts from Storage Switzerland, Veeam and KeepItSafe discuss how to create a disaster recovery plan that covers all of the organizations digital assets.
  • Strengthen Security While Ensuring Network Uptime
    Strengthen Security While Ensuring Network Uptime
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Nov 8 2018 38 mins
    Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.

    To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to Next-Generation Network Packet Brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:

    • Delivers complete network-wide visibility across physical, virtual and cloud environments.
    • Scales metadata extraction for improved forensics.
    • Isolates applications for targeted inspection.
    • Gives you visibility into encrypted traffic for threat detection.

    See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:

    • Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
    • Scale to speed of the network without “rip and replace” by load balancing across tool groups.
    • Remove single points of failure and increase availability of both the tools and the network.
    • Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.

    Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
  • Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 43 mins
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
  • Webroot Protezione DNS Demo Webinar (in Italiano)
    Webroot Protezione DNS Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 45 mins
    Webroot Protezione DNS Demo Webinar (in Italiano)
  • Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 51 mins
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
  • Cybersecurity Ratings Part 2: Many Use Cases - Some Obvious - Some Less So
    Cybersecurity Ratings Part 2: Many Use Cases - Some Obvious - Some Less So
    Brandon Dunlap, (ISC)², Nick Trigg, BitSight Technology, Thomas Born, Vodafone Group Services Recorded: Nov 8 2018 60 mins
    In the last (ISC)² and Bitsight webinar we covered good reasons for utilising security ratings, covering the big topics of visibility, collaboration and agility.

    Join us for this session where Nick Trigg, BitSight’s Risk Consultant, will share real life examples and use cases. Alongside Nick, we are pleased to welcome Thomas Born, Chief Security & Privacy Officer from Vodafone Automotive at Vodafone Group Services who will share his topical experiences.

    To catch up on Part 1 in this series, copy and paste the following link in your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=336859
  • Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Lionel Meoni, Systems Enginee Manager, Rubrik France Nov 20 2018 9:00 am UTC 33 mins
    Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise

    Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Nov 20 2018 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Trust No One Part 2.  What Does Zero Trust Mean for You?
    Trust No One Part 2. What Does Zero Trust Mean for You?
    Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Richard Archdeacon, Duo, Daniel Cuthbert, Banco Santander Nov 20 2018 2:00 pm UTC 60 mins
    As early as 2003 the Jericho Forum was created to tackle "de-perimeterisation" and later in 2014 Google released their "BeyondCorp" paper detailing how they made it happen. However, have Zero-Trust security models been adopted in the enterprise and what challenges do organisations face when considering de-perimeterisation?

    Join the discussion between Richard Archdeacon from Duo Security and Daniel Cuthbert from Banco Santander in Part 2 of the Zero Trust series and learn about Zero Trust deployments within the enterprise.
    Speakers:
    Richard Archdeacon, Advisory CISO, Duo Security
    Daniel Cuthbert, Global Head of Cybersecurity Research, Banco Santander

    For Part 1 in the Zero Trust Series, copy and paste this link into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part2
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Monitoring and Alerting of Availability Groups
    Monitoring and Alerting of Availability Groups
    Shawn Meyers, Principal Architect Nov 20 2018 5:00 pm UTC 60 mins
    So you have your Availability Groups (AG) configured and everything reports green. Learn how to measure for Service Level Agreement (SLA) compliance! Know when replication is delayed! Get notified when a failover occurs! In this session, we will teach the attendee how to implement proper monitoring and alerting. We will also show you what metrics and reports you should be reviewing regularly to ensure there are no surprises, such as pauses replication or unacceptable delays. For example, we will look at the DMVs, extended event sessions, perfmon counters, SQL agent jobs and alerts. We will show what to monitor in your AG, and how to setup alerting so you know when to take action.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Nov 21 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • PAM: The Critical Missing Piece in Your Security Strategy
    PAM: The Critical Missing Piece in Your Security Strategy
    Brandon Dunlap, Moderator, (ISC)², Karl Lankford, Lead Solutions Engineer EMEA, Bomgar Nov 22 2018 1:00 pm UTC 60 mins
    Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). Our own research backs this up with the 2018 Privileged Access Threat Report revealing organizations using automated PAM technology experience far fewer serious breaches than those that did not. Karl Lankford, Lead Solutions Engineer EMEA at Bomgar will discuss what ‘privilege’ means to your business and how implementing a PAM solution can drive significant improvements across the organisation. You will learn:

    •Why organisations should make PAM their top 2019 investment
    •Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success
    •Help you to prepare the business case for your PAM project and to get Executive Leadership buy in
  • Building Resilient SAP Landscapes on SUSE Linux
    Building Resilient SAP Landscapes on SUSE Linux
    Alan Clarke Nov 22 2018 2:30 pm UTC 45 mins
    Join this webinar to hear the latest on SUSE for SAP version 15, along with the Linux management capabilities and advantages of SUSE Manager and the Live Patching module.
  • Pure Storage "Active Cluster" Vorteile im Hersteller-Architekturvergleich
    Pure Storage "Active Cluster" Vorteile im Hersteller-Architekturvergleich
    Tom Gempe und Terence Canaday, Systems Engineers bei Pure Storage Nov 23 2018 9:00 am UTC 60 mins
    "Im ersten Teils dieses Webinars werden wir einen Architekturvergleich zum „standortübergreifenden synchronen Spiegel“ mit Blick auf die Verwendung von VMware vSphere beleuchten. Dabei gehen wir abgrenzend zu anderen Herstellern und Lösungen auf die Vorteile des Pure Storage ActiveCluster detailliert ein, um den automatischen transparenten Failover der ESXi Server in den einzelnen Szenarien zu würdigen.
    Im zweiten Teil des Webinars geht es um VVOLs mit Pure. Was sind VVOLs, was machen VVOLs eigentlich und wie gehen wir mit VVOLs um. Eine kurze Darstellung, was sich VMware bei VVOLs gedacht hat, und warum wir die besten dafür sind."
  • SUSE Enterprise Storage 5.5 - was ist neu?
    SUSE Enterprise Storage 5.5 - was ist neu?
    Michael Bill & Michael Jonas, SUSE Linux GmbH Nov 23 2018 9:00 am UTC 60 mins
    Im September hat SUSE die Version 5.5 von SUSE Enterprise Storage vorgestellt. Die skalierbare, zuverlässige und fehlertolerante Storage-Lösung auf Basis von Ceph wurde bereits mehrfach ausgezeichnet, zuletzt mit dem Storage Insider Award in Platin. Mit einem innovativen Subskriptionsmodell, einem umfassenden Hardware-Zertifizierungsprogramm und technischem Support hat es SUSE geschafft, dass sein Enterprise Storage-Server die niedrigsten Gesamtbetriebskosten (TCO) aller softwaredefinierten Storage-Lösungen am Markt aufweist.
    Die neue Version SUSE Enterprise Storage 5.5 bietet zahlreiche Neuerungen wie openATTIC-Erweiterungen und Open-Stack-Integration. Erfahren Sie im Webinar mehr über die neuen Funktionen und Einsatzmöglichkeiten.
  • Benefits of Moving Your SOC Into the Cloud
    Benefits of Moving Your SOC Into the Cloud
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Ollie Sheridan, Principal Engineer, Gigamon Nov 27 2018 1:00 pm UTC 60 mins
    In this webcast Ollie Sheridan, Principal Engineer at Gigamon talks about the benefits of moving your SOC into the Cloud and how this differs from the challenges of creating a SOC yourself by combining monitoring tools and integrating them into an onsite SIEM.

    During this presentation you will learn:
    •How the security market is changing
    •The paint points of implementing and managing your own SOC
    •How and why you would put security into the cloud
  • What's New with SUSE Linux for Arm
    What's New with SUSE Linux for Arm
    Michael Tabron & Jay Kruemcke, SUSE Linux for Arm Experts, SUSE Nov 27 2018 3:00 pm UTC 60 mins
    The Arm server market is finally starting to take off.
    We have seen the first HPC clusters based on Arm processors hit the TOP500 HPC list and how customers have started to use SLES for Arm to move their manufacturing lines into the future.
    This webinar will review what is new with the Arm industry and how SUSE Linux for Arm can address customer needs from IoT to HPC. 
  • Enabling Edge to Cloud Computing with Supermicro’s uCPE Intel Select Solution
    Enabling Edge to Cloud Computing with Supermicro’s uCPE Intel Select Solution
    Mory Lin, DIrector, Embedded System Product, Supermicro Nov 27 2018 4:00 pm UTC 60 mins
    Accelerate and transform computing convergence at the edge using software-defined networking (SDN) hardware and infrastructure solutions from Supermicro and Intel. Universal customer premises equipment (uCPE) is an emerging category of network functions virtualization (NVF)-based edge computing and service provisioning systems. This new generation of systems provides network platform suppliers, systems integrators and software vendors the ability to quickly deliver managed services using software-driven and virtual network functions (VNFs). Intel® Select Solutions are verified hardware and software stacks that are optimized for specific software workloads and are designed to be easy to deploy. Join us on this webinar to learn how Supermicro’s verified Intel® Select Solutions for uCPE are enabling customers in their deployments.
  • Crafting a Next-Generation Enterprise Architecture
    Crafting a Next-Generation Enterprise Architecture
    Johna Till Johnson, CEO & Founder, Nemertes Research Nov 27 2018 4:00 pm UTC 60 mins
    Enterprise Architecture is dead. Long live Enterprise Architecture!

    In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed, inflexible architecture.

    Next-generation Enterprise Architecture needs to be fast, flexible, and as adaptive as next-generation development methodologies. It needs to encompass the radical changes in infrastructure, from virtualization to cloud- and mobile-first.

    And it's absolutely essential for enterprises who want to align their technology investments with their fast-moving business goals.

    This webinar reviews the fundamentals of enterprise architecture and provides a blueprint for a next-generation EA that encompasses DevOps, cloud, mobility, virtualization, microservices, and more!
  • Self-service Information Consumption Using Data Catalog (APAC)
    Self-service Information Consumption Using Data Catalog (APAC)
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Nov 28 2018 1:30 am UTC 60 mins
    Market research shows that around 70% of the self-service initiatives fare “average” or below. Denodo 7.0 information self-service tool will offer data analysts, business users and app developers searching and browsing capability of data and metadata in a business friendly manner for self-service exploration and analytics.

    Attend this session to learn:
    - How business users will be able to use Denodo Platform integrated google-like search for both content and catalog
    - With web based query UI how business users can refine queries without SQL knowledge
    - With tags and business categorization, how to standardize business / canonical views while decoupling development artifacts from the business users

    Agenda:
    - The role of information self-service tool
    - Product demonstration
    - Summary & Next Steps
    - Q&A
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Nov 28 2018 1:00 pm UTC 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Nov 28 2018 4:00 pm UTC 75 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
    2019 Storage Strategies Series - What’s Your Plan for Object Storage?
    Storage Switzerland, Caringo, Cloudian, Scality Nov 28 2018 6:00 pm UTC 60 mins
    Join Storage Switzerland, Caringo, Cloudian and Scality, for a live roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts will discuss what object storage is, what is better/different about object storage than other types of storage and what are the use cases enterprises should consider.

    Our Object Storage Panel will provide specific details on how to get started with object storage, what use cases pay the most immediate return on the investment and where object storage fits in an organization's overall storage strategy. The panel will also discuss what is coming next in object storage. Each expert will also give a brief overview of their company's object storage solution. We will close out the roundtable by taking questions from our live audience.

    By attending one webinar, you’ll learn everything you need to know about object storage, provide actionable information in developing an object storage strategy and hear from three top vendors about how their products will fit into those plans.
  • Grow Your Business with New Service Offerings
    Grow Your Business with New Service Offerings
    Alexander Kirov, Ivan Loginovskikh, Anastasia Dobrodeeva Nov 29 2018 2:00 pm UTC 60 mins
    Join the Virtuozzo Program Management Team for a live webinar to learn more about ways how to drive new revenue streams with storage-based service offerings.

    Our team will guide you through:
    •Key considerations for Storage as a Service (STaaS) models;
    •Best practices on technologies to use for STaaS solutions;
    •Top STaaS use cases for service providers
  • 2018: State of Virtualization in the Cloud
    2018: State of Virtualization in the Cloud
    W. Curtis Preston, Chief Technical Architect, Druva Nov 29 2018 3:00 pm UTC 44 mins
    Momentum of cloud adoption for virtual workloads continues to grow, but it’s not without challenges. While there are a variety of motivations driving this transition, one thing is clear: organizations are still figuring out what the best approaches are. No matter where you are on your journey to the cloud, understanding the role the cloud plays with your virtual environment has become an integral part of your IT initiatives.

    Join us for this presentation by W. Curtis Preston where he will discuss the recent findings from Druva’s “2018 State of Virtualization and the Cloud Survey,” such as:
    - Cloud adoption trends for virtual workloads
    - The challenges organizations face on their journey to the cloud
    - The motivations - and risks - associated with these IT initiatives
    - How organizations globally are approaching moving virtual workloads to the cloud
  • Designing Storage Architectures for Data Privacy, Compliance and Governance
    Designing Storage Architectures for Data Privacy, Compliance and Governance
    Storage Switzerland and Hitachi Nov 29 2018 6:00 pm UTC 60 mins
    Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them to not only protect data but also organize it so it can be found and deleted on request. Traditional backup and archive are ill-equipped to help organization adhere to these new regulations.

    In this live webinar join Storage Switzerland and Hitachi Vantara for a roundtable discussion on the meaning of these various regulations, the impact of them on traditional storage infrastructures and how to design a storage architecture that can meet today’s regulations as well as tomorrows.
  • The Future of Work: Growth Opportunities and Trends
    The Future of Work: Growth Opportunities and Trends
    Rob Arnold, Industry Principal, Connected Work, Frost & Sullivan Nov 29 2018 7:00 pm UTC 60 mins
    Is your workforce built for disruption and a rapidly ever-changing future of work?

    Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.

    Key Takeaways:
    • Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
    • Discover the devices and applications that will support the workplace of the future.
    • Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
  • Targeted Attacks: How to Recognize From a Defender's POV
    Targeted Attacks: How to Recognize From a Defender's POV
    Sam McLane, CTSO, Arctic Wolf Networks Nov 29 2018 7:00 pm UTC 37 mins
    Cybersecurity is the biggest risk law firms face, and they can expect to face greater scrutiny from clients on how they use, store and protect client data. An effective cyber risk program often requires advanced threat detection and response capabilities that can challenge even a well-resourced internal IT team. While many recreations and online exploits are presented from the attacker's point of view, what do these attacks look like on the defender's side?

    In this webinar, top security operations center (SOC) expert, Sam McLane, will share war stories on how attacks appeared in targeted organizations, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.

    After attending, we will help you answer the following key questions:

    - How can law firms demonstrate to their clients the effectiveness of their cybersecurity programs?
    - What are the key risk factors that law firms face and how can they be mitigated?
    - Why are law firms particularly vulnerable to the new cyberattacks that are becoming more prevalent?
    - What is the right way to manage a cybersecurity breach?

    Register now to hear from this security expert!

    About our key speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Steve Hunt, Dir. Product Management - DataCore Nov 29 2018 7:00 pm UTC 60 mins
    IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.

    This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.