Hi [[ session.user.profile.firstName ]]

Virtualization

  • Network Upgrades Giving You Security Headaches?
    Network Upgrades Giving You Security Headaches?
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Jan 16 2019 58 mins
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Storage Switzerland, KeepItSafe, Veeam Recorded: Jan 16 2019 56 mins
    Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster strikes. DRaaS resolves these issues by creating an on-demand DR site where the cloud delivers IT resources as they are needed. IT planners though, may overlook some aspects of DRaaS solutions, especially when using the large public cloud providers.

    In this webinar join Storage Switzerland, Veeam and KeepItSafe where we leverage a panel of backup and recovery veterans to identify common oversights seen in organizations’ DRaaS strategies and how to address them.
  • Top 5 Reasons Why SOCaaS is the Right Choice
    Top 5 Reasons Why SOCaaS is the Right Choice
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Jan 15 2019 46 mins
    As the rapid digitization of business processes continues, the risks from cyberattacks have become increasingly daunting. Data breaches can disrupt business operations and cause significant economic damage, especially to businesses that don't have the resources to build a fully operational Security Operations Center (SOC). Smaller businesses often incorrectly assume that investing in endpoint and perimeter security products is enough to keep them safe. This approach is now outdated and ineffective.

    A recent survey commissioned by Arctic Wolf of over 400 cybersecurity professionals indicates an increasing shift towards outsourced security operations across businesses in a variety of industries. Join this webinar as cybersecurity expert from Arctic Wolf, Louis Evans, explores:

    ● Why investing in antivirus or perimeter security solutions alone is not enough
    ● The top reasons why a SOC-as-a-Service is the right choice for security operations
    ● What you can do to transform your business overnight with outsourced security

    To see why SOCaaS is the Right Choice, save your seat now!
  • Stories From the Front Lines of Cybersecurity
    Stories From the Front Lines of Cybersecurity
    Brandon Dunlap, Moderator, (ISC)², Zeki Turedi, Technology Strategist, EMEA Recorded: Jan 15 2019 56 mins
    CrowdStrike’s latest Cyber Intrusion Services Casebook continues to shine a light on how quickly attackers can gain access into an organisation. This webcast, drawn from real-life engagements from the past 12 months, takes a deep dive into the advanced and ever-evolving tactics, techniques, and procedures (TTPs) used by today’s most dangerous attackers.

    We’ll discuss the following key trends:

    -There is no slowdown in adversaries’ invention and brazenness
    -Attackers operate quickly and at depth — waiting patiently to achieve their objectives
    -Attackers are often hiding in plain sight
  • Webroot 2019 Threat predictions
    Webroot 2019 Threat predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Jan 15 2019 46 mins
    The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.

    Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.

    Some of the topics that will be covered:
    - AI Disruption
    - US adoption of similar GDPR legislation
    - Cryptojacking will keep rising while ransomware will decline


    Register today!
  • Fifteen Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
    Fifteen Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
    Storage Switzerland and Igneous Recorded: Jan 11 2019 17 mins
    Join Storage Switzerland and Igneous for another Fifteen Minute Friday: Storage Tips for the Weekend. Most organizations are not satisfied with their ability to backup, recovery and correctly retain unstructured data. The combination of unprecedented growth and increased scrutiny caused by regulations like GDPR and CCPA is pushing organizations to the brink. It's time to stop the madness!

    By joining this short webinar, you’ll learn tips to overcome:
    - The Unstructured Data Backup Challenge
    - The Archive Challenge
    - The Data Privacy / Data Retention Challenge

    Attendees to the webinar will also receive a copy of Storage Switzerland’s latest white paper “How to Evolve from Unstructured Data Protection to Unstructured Data Management.”
  • Is GDPR Working? What We're Learning From Data and Lessons from the Field
    Is GDPR Working? What We're Learning From Data and Lessons from the Field
    Brandon Dunlap, Moderator, (ISC)², Jacob Olcott, Vice President, BitSight, Julian Parkin Founder, Parcadian Recorded: Jan 10 2019 62 mins
    After years of debate over whether to impose new cybersecurity regulations on companies, the General Data Protection Regulation (GDPR) went into effect in Europe in May 2018. Already we’re seeing data breach victims ordered to pay fines under the new rules, and cookie disclosure notices are popping up on more websites than ever.
    But what about the bigger picture: Is GDPR working? How would we know? We'll explore these and other issues, including an examination of what the data tells us as well as stories from GDPR implementation.
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Jan 10 2019 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • SUSE Cloud Application Platform - What's New?
    SUSE Cloud Application Platform - What's New?
    Vinicius Neuhaus Recorded: Jan 9 2019 45 mins
    Registre-se e participe do nosso primeiro webinar do ano, onde falaremos de como a nossa plataforma elimina a configuração manual de ti e ajuda a acelerar a inovação, obtendo aplicativos para o mercado mais rapidamente.
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks Recorded: Jan 8 2019 57 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Next Generation Central Office for Network Transformation
    Next Generation Central Office for Network Transformation
    Amy Chang, QCT/ Ulysses Lu, QCT/ Purvi Thakkar, Intel Recorded: Jan 8 2019 42 mins
    QCT is going to hold an NGCO launch event together with Intel and 10 VNF partners. In the NGCO event, QCT together with solution partners are going to elaborate the achievements which are building for next-generation central office and how to proceed next step for fixed & mobile convergence for the future 5G. This webinar is going to present a preview of NGCO launch event and how Intel® Select Solutions add value.
  • Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, Druva Recorded: Jan 8 2019 41 mins
    Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.

    Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.

    Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.

    Don't miss this informative webinar register today!
  • Nirmata's Application Management Platform
    Nirmata's Application Management Platform
    Ritesh Patel Recorded: Jan 3 2019 22 mins
    Nirmata Co-Fonder and VP of Products, Ritesh Patel meets with #TalkKubernetes at KubeCon 2018. Ritesh reveals an overview of how the Nirmata platform transforms application management for the enterprise.
  • Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Daud Qazen storage specialist, , Red Hat & Ricky Nelson senior solution architect, Red Hat Recorded: Jan 3 2019 47 mins
    In this webinar, we'll discuss a high-performing, cost-competitive hyperconverged infrastructure solution. Red Hat® Hyperconverged Infrastructure is the only open, integrated virtualization and software-defined storage solution. We'll cover:

    - What it is and how it can help you
    - How it's different than what's currently in the market
    - A live demo creating a virtual machine (VM) from a GUI and with Ansible®, creating templates of VMs, and migrating a VM to a different host
  • The State of Hyperconverged Infrastructure in the Evolving Threat Landscape
    The State of Hyperconverged Infrastructure in the Evolving Threat Landscape
    Mike McGhee - Technical Marketing Engineer at Nutanix | Shaun Donaldson - Director of Strategic Alliances at Bitdefender Recorded: Dec 27 2018 58 mins
    In the last few years, hyperconverged infrastructure has become an optimal way to run enterprise cloud. Meanwhile, the cyber threat landscape has worsened, demanding new approaches to protecting from advanced attacks.

    Join this webinar to learn about:

    - An easy way to build a cutting-edge enterprise cloud for your environment
    - A bullet-proof combination of a hardened cloud and next-generation security for its files and workloads
    - An integrated solution to help you save time on infrastructure and security management and compliance
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks Recorded: Dec 26 2018 40 mins
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Defense Intense - Portable Multi-Cloud Security for the Agile Era
    Defense Intense - Portable Multi-Cloud Security for the Agile Era
    Nathan Mckay- Solutions Marketing Manager, F5 Networks Robert Haynes- Cloud Technical Marketing, F5 Networks Recorded: Dec 26 2018 57 mins
    Defending apps in the cloud can be difficult – especially if you are pursuing a multi-cloud strategy. No matter where you deploy, your apps need resilience, which means robust defenses to ensure their continued availability. Ensure your customers (and their data) get the protection they need in the face of current and emergent threats. Not all risks are related to software vulnerabilities - some, such as “credential stuffing”, are inherited from breaches that have occurred elsewhere.

    Portable, proactive security is possible. Make sure your development teams have access to the tools they need to enable them to move fast while still delivering the confidentiality, integrity, and availability your customers expect and deserve. There are lots of options; be sure to leverage the ones best suited to protect your technology platforms and business priorities.

    In this webinar you will learn:

    - How to build an application protection strategy that will proactively protect your assets across clouds
    - How you can go beyond vulnerability management and address real business risks, such as denial of service, fraud, and intellectual property theft
    - How multi-cloud can help you stay ahead of your competitors and reap the rewards of economy scale and pricing
    - How F5 can help your organization identify and solve problems that are impacting your bottom line
  • Grow Your Business with New Service Offerings
    Grow Your Business with New Service Offerings
    Alexander Kirov, Ivan Loginovskikh, Anastasia Dobrodeeva Recorded: Dec 20 2018 45 mins
    Join the Virtuozzo Program Management Team for a live webinar to learn more about ways how to drive new revenue streams with storage-based service offerings.

    Our team will guide you through:
    •Key considerations for Storage as a Service (STaaS) models;
    •Best practices on technologies to use for STaaS solutions;
    •Top STaaS use cases for service providers
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Dec 20 2018 53 mins
    Windows 10 and the proliferation of BYOD introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Brute-force Attack: Top Security Expert Breaks Down Law Firm War Story
    Brute-force Attack: Top Security Expert Breaks Down Law Firm War Story
    Sam McLane, CTSO, Arctic Wolf Networks Recorded: Dec 19 2018 2 mins
    In this webinar clip, top security operations center (SOC) expert, Sam McLane, shares a key war story on how attacks appeared in a targeted organization, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy.
  • Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Jim Bugwadia Recorded: Dec 19 2018 65 mins
    In this episode of the Enterprise-Wide Kubernetes series, we will show
    how Nirmata makes it easy to integrate your Kubernetes clusters and
    workloads with Vault for enterprise grade secrets management.

    What to expect:
    1. Learn best practices for managing secrets in Kubernetes.
    2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
    3. Discover Nirmata integrations with Vault.
  • Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAlta Recorded: Dec 19 2018 51 mins
    TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:

    * Who is TransAlta and why data driven insight is critical for their energy trading system
    * Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
    * How Data Virtualization offers a faster and better data integration over legacy systems
  • 10 Key Strategies to Optimize Costs and Govern AWS
    10 Key Strategies to Optimize Costs and Govern AWS
    Jason Monden, VP, Cloud Solutions & Technology Services Recorded: Dec 19 2018 60 mins
    The public cloud with its unlimited resource, requires higher financial discipline from IT when compared to traditional data center budgeting/spending. Without any cost controls and governance in place, cloud spend could blow past budgets and derail projects. Customer needs to adopt a proactive approach to avoid out of control spend and poor governance, which can result in significant security issues.

    In this webinar, we will provide 10 strategies to help you
    • Choose wisely among all available AWS alternatives
    • Streamline your operations in AWS, and
    • Continuously optimize your deployment to take advantage of best practices and available arbitrage opportunities within the hundreds of millions of combinations available to you on AWS

    You will have the opportunity to listen to Burwood Group’s Cloud Architect, James Anderton, on tips and tricks to continuously optimize your cloud, take advantage of new technologies from AWS and get more bang for your AWS buck. Learn how you can kick it up a notch with intelligence, analysis and automation to deliver faster results for new and existing workloads.

    You’ll also receive a complimentary copy of our e-book that provides valuable insights into how you can optimize your AWS environment while saving 30-50% of your cloud computing costs.
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Recorded: Dec 19 2018 58 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    Speakers:
    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Dilan Yuksel, Host, VentureBeat

    Sponsored by Nutanix
  • Why Machine Learning is Fun and How you can Master It!
    Why Machine Learning is Fun and How you can Master It!
    Joanna Hu, Principal Data Scientist, Exabeam Recorded: Dec 19 2018 49 mins
    Machine learning, or AI, may be considered as sophisticated technology which can only be understood by crazy nerds, or some dangerous technology can destroy human beings one day. As a machine learning data scientist, Joanna wants to tell you that machine learning is not either. It is very fun, can be learnt and mastered, and do more benefits than harm to the human beings. More important, it is a very suitable career for women.

    In this presentation, Joanna will use a few use cases to represent its values and its technology (including deep learning), etc. I will also talk about the skill sets needed for machine learning.


    Join this live webinar with Joanna Hu, Principal Data Scientist at Exabeam and recent nominee for Data Leader of the Year for Silicon Valley's Women in IT Award. Joanna will discuss:

    - The data science behind the 2016 US presidential election
    - What is machine learning / artificial intelligence?
    - Use cases of machine learning: cyber security, shopping, search
    - Skills and mindset needed for machine learning and why it's very suitable for women
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Jan 17 2019 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Kontejnery a jejich dopad na IT infrastrukturu
    Kontejnery a jejich dopad na IT infrastrukturu
    Martin Zikmund - Technical Account Manager, SUSE Jan 17 2019 2:00 pm UTC 30 mins
    Kontejnery jsou velmi horké téma současného IT světa. V rámci webináře se dozvíte, k čemu jsou kontejnery vhodné, jaké jsou jejich výhody a zároveň jaký dopad mají na změnu IT infrastruktury. Na tento webinář bude navazovat detailnější půldenní workshop.
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Jan 17 2019 5:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Michael Ocampo, Product Mgr, Supermicro; Jason Kennedy, Director, Data-Centric Product Mktg, Intel Jan 17 2019 5:00 pm UTC 60 mins
    The 5th generation of Supermicro’s Twin Architecture has been optimized to support cloud application solutions. In this Webinar, we will learn how companies configure their cloud infrastructure to maximize the BigTwin’s compute, memory and storage resources with virtualization. We will take a deep look into how BigTwin offers cost-effective memory bandwidth, which is critical for cloud applications and NoSQL performance.
  • How to Put an End to Hyperconverged Silos
    How to Put an End to Hyperconverged Silos
    Storage Switzerland, Axellio Inc. Jan 17 2019 6:00 pm UTC 60 mins
    Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
  • Virtualization and Storage Networking Best Practices
    Virtualization and Storage Networking Best Practices
    Cody Hosterman, Pure Storage; Jason Massae, VMware; J Metz, Cisco Jan 17 2019 6:00 pm UTC 75 mins
    With all the different storage arrays and connectivity protocols available today, knowing the best practices can help improve operational efficiency and ensure resilient operations. VMware’s storage global service has reported many of the common service calls they receive. In this webcast, we will share those insights and lessons learned by discussing:
    - Common mistakes when setting up storage arrays
    - Why iSCSI is the number one storage configuration problem
    - Configuring adapters for iSCSI or iSER
    - How to verify your PSP matches your array requirements
    - NFS best practices
    - How to maximize the value of your array and virtualization
    - Troubleshooting recommendations
  • How GameStop Leverages the Cloud to Meet SLAs
    How GameStop Leverages the Cloud to Meet SLAs
    Jon Gery International IT Manager, GameStop and Seyi Verma Product Marketing Director, Druva Jan 22 2019 10:00 am UTC 52 mins
    GameStop, a global Fortune 500 company (NYSE: GME), needed an efficient cloud backup and recovery solution to meet business continuity requirements across its 7,200 retail stores in 14 different countries. The company had a myriad of virtualized environments with over 250TB of data but its on-premises backup infrastructure and procedures were so complex and inefficient, that GameStop was unable to meet business continuity SLAs.

    GameStop turned to Druva, and secured its data in enterprise server workloads and virtual environments through Druva Phoenix. Register for this webinar with special guest speaker Jon Gery, International IT Manager at GameStop, to hear how the company was able to:

    Unify global data protection requirements within a single system
    Increase the backup footprint of virtual machines by 20%
    Easily achieve their business continuity SLAs
    Reduce backup and recovery operating expenses by 70%
    Don't miss this informative webinar — Register today!
  • Infoblox Part 1: Remediating Threats by Bridging Islands of Security
    Infoblox Part 1: Remediating Threats by Bridging Islands of Security
    Brandon Dunlap, Moderator, (ISC)². Chris Marrison, System Engineer, Infoblox Jan 22 2019 1:00 pm UTC 60 mins
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organisation solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² for an examination of how Infoblox and Fortinet have joined together to assist organisations in improving their security operations and reducing time to containment.
  • Straight Talk: When is VMware Cloud on AWS Right for You?
    Straight Talk: When is VMware Cloud on AWS Right for You?
    Eric Shanks, Solutions Principal (AHEAD) + Shea Lutton, Cloud Infrastructure Architect (AWS) Jan 22 2019 5:00 pm UTC 61 mins
    Migrations to the cloud sometimes face difficulties in transitioning apps, operational inconsistencies, and incongruent networks. VMware Cloud on AWS is an on-demand hybrid cloud service designed to preserve existing investments and legacy applications, while reaping the rewards of cloud scalability and flexibility.

    But what are the right use cases for VMware Cloud on AWS, and how do you best approach this new solution? Download our webinar to find answers to both questions, and to see specific use cases like migration, disaster recovery, and M&A integration.

    Watch this AHEAD-AWS webinar to learn:

    -How to prepare and validate your environment for integration

    -The right circumstances for and expected benefits of deploying VMware Cloud on AWS

    -The value of deploying a right-sized VMware Cloud on AWS environment based on your application needs
  • What NVMe™/TCP Means for Networked Storage
    What NVMe™/TCP Means for Networked Storage
    Sagi Grimberg, Lightbits; J Metz, Cisco; Tom Reu, Chelsio Jan 22 2019 6:00 pm UTC 75 mins
    In the storage world, NVMe™ is arguably the hottest thing going right now. Go to any storage conference – either vendor- or vendor-neutral, and you’ll see NVMe as the latest and greatest innovation. It stands to reason, then, that when you want to run NVMe over a network, you need to understand NVMe over Fabrics (NVMe-oF).

    TCP – the long-standing mainstay of networking – is the newest transport technology to be approved by the NVM Express organization. This can mean really good things for storage and storage networking – but what are the tradeoffs?

    In this webinar, the lead author of the NVMe/TCP specification, Sagi Grimberg, and J Metz, member of the SNIA and NVMe Boards of Directors, will discuss:
    •What is NVMe/TCP
    •How NVMe/TCP works
    •What are the trade-offs?
    •What should network administrators know?
    •What kind of expectations are realistic?
    •What technologies can make NVMe/TCP work better?
    •And more…
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jan 22 2019 6:00 pm UTC 60 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Strengthen your security posture with SonicWall virtual firewalls
    Strengthen your security posture with SonicWall virtual firewalls
    Srudi Dineshan, Product Marketing Manager & Mallikharjun Vatti, Sr. Product Manager, SonicWall Jan 23 2019 4:00 pm UTC 45 mins
    With cloud adoption growing each day, next-generation firewall capabilities are essential to protect workloads in the cloud from advanced threats via automated real-time detection and protection

    Join our product team, to learn more about how SonicWall Network Security virtual (NSv) firewall series can help strengthen the security posture of your hybrid and multi-cloud environments.
  • Expanding Your Data Center to the Resource and Space Conscious Edge
    Expanding Your Data Center to the Resource and Space Conscious Edge
    Jeff Ready, CEO and Co-Founder of Scale Computing Jan 23 2019 6:00 pm UTC 60 mins
    In today’s global economy, businesses and governments are instrumenting the edge with ever greater intelligence, so the desire for reliable, scalable and agile edge infrastructure solutions continues to grow. Implementing a solution ideal for highly distributed, on-premises environments, such as retail stores, bank branches or manufacturing, with multiple locations managed by the enterprise from a central location has become and will remain critical.

    Learn how providers are addressing this market by providing edge infrastructure that has the capacity to run various IT and OT workloads, is space conscious and can be managed at each individual location by generalists. This in return reduces the time and budget spent managing technology and allows companies to focus more on growing their business and serving their customers.

    Attendees will learn:
    How to maximize uptime at the edge
    The extraordinary ease of use
    How a converged platform simplifies deployment and management
    Total management cost reductions of 60%-80% with automation and intelligence

    Jeff Ready, CEO of Scale Computing, is a high tech entrepreneur and executive with deep roots in technology and industry trends. Jeff has a keen interest in current and future technologies of IT infrastructure to help alleviate the management and overall costs of IT in your business.
  • Powering Digital Transformation and the Modern Enterprise
    Powering Digital Transformation and the Modern Enterprise
    Becky Wanta, CEO & President, RSW1C Consulting Jan 23 2019 10:00 pm UTC 45 mins
    Having successfully transformed several F50+ companies, Becky Wanta offers a real-world, executable “been there
    done that and got the T-shirt” pragmatic approach to help you digitally transform your respective companies.

    There is a lot of hype and misinformation out there regarding Digital Transformation. Join this live webinar as Becky removes the hype and discusses the “What, Why, How & Win” for why Digital Transformation is cornerstone for your company’s survival and ultimately thriving in a fast changing/continuous competitive marketplace.

    Key takeaways:
    - Digital Transformation requires Executive Sponsorship
    - Data is the Currency & the “Why IT?”
    - Digital Transformation is the Strategy
    - Cloud & Everything else are just the tactics
    - Digital Transformation is not easy nor a “one and done!” – It is a journey
    - I believe I can change the World – DO YOU?
    - Fail Fast & Carry On!
  • AI in Financial Services, it's all about the data
    AI in Financial Services, it's all about the data
    Patrick Smith, Pure Storage Jan 24 2019 10:00 am UTC 45 mins
    The increasingly competitive climate within Financial Services means that enhancing business outcomes by leveraging AI is essential. Data has never been more important to business success and a key aspect to optimising its value is in conjunction with AI.

    In this session we will discuss the areas in which Financial Services are looking to leverage their data together with AI and some of the considerations for successful implementation of an AI infrastructure that accelerates time to value for these projects.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Jan 24 2019 11:00 am UTC 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Data Center Transformation with HPE Microsoft Storage Solutions
    Data Center Transformation with HPE Microsoft Storage Solutions
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Jan 24 2019 4:00 pm UTC 60 mins
    Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
  • IoT Series [Ep.2]: Current State -- Maturity and Success
    IoT Series [Ep.2]: Current State -- Maturity and Success
    Johna Till Johnson, CEO & Founder, Nemertes Research Jan 24 2019 4:00 pm UTC 60 mins
    Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

    This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
  • The Hybrid Cloud Metadata Problem and How to Fix It
    The Hybrid Cloud Metadata Problem and How to Fix It
    Storage Switzerland, Infinite IO Jan 24 2019 6:00 pm UTC 60 mins
    Most organization’s use of public cloud storage resources is the hybrid use case. A hybrid cloud strategy enables organizations to leverage the location and resources that make the most sense for the given workload. A hybrid cloud strategy though requires a free-flow of information between on-premises and cloud storage. The problem is that most of the information exchange is metadata, not actual data and most cloud solutions don’t specifically address metadata acceleration.

    Key Takeaways:
    - A clear understanding of why lack of metadata management breaks hybrid cloud
    - Why most cloud solutions don’t solve the metadata problem
    - How to finally fix the hybrid cloud meta problem and create the ideal hybrid cloud infrastructure
  • Kubernetes Use cases: Cloud Native Apps, Hybrid Clouds, at the Edge
    Kubernetes Use cases: Cloud Native Apps, Hybrid Clouds, at the Edge
    Vamsi Chemitiganti, Chief Strategist Jan 24 2019 6:00 pm UTC 75 mins
    Organizations can leverage containers for digital acceleration and to simplify application development. As environments scale and grow, managing all the containers becomes increasingly difficult. This is where Kubernetes can help. Platform9 Managed Kubernetes enables organizations to get value from containers, fast, with container orchestration delivered as a service.

    In this webinar we will outline the benefits of three key use cases:

    1. Manage and monitor Hybrid Clouds: Manage environments that consist of on-premises, public and private clouds.

    2. Cloud-native application development ensures consistency: Leveraging containers and Kubernetes ensures consistency in application development and deployment.

    3. Compute resources at the edge: Organizations are finding more and more need for resources to be closer to where information is generated for faster analysis.

    Join us to learn more about these uses cases!
  • Hybrid Defense: Boost Your Security with Hybrid AI
    Hybrid Defense: Boost Your Security with Hybrid AI
    Matthew Thurston, Chief Architect - Arctic Wolf Networks Jan 24 2019 7:00 pm UTC 48 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Automated Continuous Delivery to Kubernetes
    Automated Continuous Delivery to Kubernetes
    Damien Toledo, VP Engineering at Nirmata Jan 24 2019 7:00 pm UTC 60 mins
    Enterprises are looking to automate end-to-end delivery of their applications. Creating continuous delivery pipelines, not only allows enterprise software teams to move faster but also enables them to respond quickly to any failures.

    In this webinar, we will discuss how to set up a continuous delivery pipeline to deploy to Kubernetes using Jenkins and Nirmata.
  • Get your SAP systems back in production faster with NVDIMMs
    Get your SAP systems back in production faster with NVDIMMs
    Christian Holsing, Senior Product Manager, SUSE Jan 29 2019 3:00 pm UTC 30 mins
    Join us as we explore the benefits and challenges of using NVDIMM technology for SAP HANA in-memory databases.
  • Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, Druva Jan 29 2019 3:00 pm UTC 41 mins
    Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.

    Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.

    Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.

    Don't miss this informative webinar register today!