Einfach gesagt nutzt Social Innovation innovative Technologien und Lösungen, um übergeordnete gesellschaftliche Trends zu addressieren. Die Themen reichen hierbei von Urbanisierung, Smart & Connected Technologies bishin zu neuen Formen des Gesundheitswesens und zur Schonung natürlicher Ressourcen. HDS bietet Social Innovation Lösungen und Dienstleistungen mit dem Fokus auf dem Internet der "wichtigen" Dinge.
Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!
What you'll learn:
• How data encryption helps prevent data breaches
• How to address PCI compliance requirements in the cloud
• How to safeguard cardholder information that is stored in a variety of different databases and versions
• The HOSTING and Vormetric approach to securing data in motion and at rest
Cyber-attacks are growing in complexity, and the rise of Advanced Persistent Threats (APTs) and insider threats has made organisations and government agencies more aware of their vulnerability. A comprehensive defense requires capabilities that go far beyond the firewall to protect against attackers that have penetrated the network perimeter. While no point security solution—technology-based or otherwise—can fully protect an organisation from cyber-attacks and APTs, today’s availability of cross-domain security solutions can help organisations protect themselves better than ever before.
In this roundtable discussion, participants from the National Bank of Kuwait, Accenture and CA Technologies will examine the current cyber security challenges facing organisations, including in the Middle East, and debate how the need for identity-centric security is critical today.
Tamer Gamali, President, (ISC)² Kuwait Chapter; Board Member, (ISC)² EMEA Advisory Council; CISO, National Bank of Kuwait
Shirief Nosseir, Business Lead, Information Security for the CA Technologies business in the Eastern Europe, Middle East and Africa
IT Strategy, Infrastructure & Security Consulting & Outsourcing Director, Accenture Middle East
WIN A FREE TICKET TO (ISC)² SECUREDUBAI CONFERENCE!
(ISC)² is giving away 3 non-member passes for the ISC)² SecureDubai Conference (November 24) to delegates who view the webinar for a minimum of 45 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://goo.gl/y3YzK2
Organisations worldwide rely on Oracle databases and applications to support their business objectives. Learn how the Hitachi Unified Compute Platform (UCP) for Oracle Database solution can help you Lower TCO and meets your Oracle Performance, Resilience and growth objectives.
In this webinar we'll discuss running business critical applications with Virtual SAN, VMware’s hypervisor-converged Software Defined Storage (SDS). Join Patric Chang, Senior Director from SanDisk and Michael Haag, Product Line Marketing Manager, VMware Storage and Availability from VMware to learn about the following:
1. Key features, highlights and benefits of Virtual SAN 6, VMware’s hypervisor-converged Software Defined Storage (SDS).
2. Business benefits of running Business Critical and other Applications with Virtual SAN
3. Virtual SAN reference architectures and solutions that can deliver very high and consistent performance for Oracle 12c and SQL Server OLTP databases
4. An All-Flash Virtual SAN solution that can deliver over 3 Million New Orders Per Minute (NOPMs) using SQL Server
As more organizations virtualize their mission-critical workloads, they often experience high latency and unpredictable performance. Virtualization can also complicate the storage administration process. Flash storage has the potential to address these challenges, but each vendor has its own approach. One approach may work for some but not others. Which one will work for your organization? Join Chris Tsilipounidakis as he examines the different flash-based storage architectures available today and how they may or may not meet your performance and capacity needs.
The "Practical Guide to Cloud Computing" whitepaper was written by the CSCC to help enterprise IT and business decision makers adopt cloud computing to solve business challenges. This webcast will help cloud customers evaluate the market from the point of view of their organization’s needs. You will learn how to select the right cloud architecture and implementation approach through the use of in-house staff, cloud vendor(s) or both.
Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charge for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Mobility, the Internet of Things, SaaS, IaaS and content delivery all depend on network performance. This presentation will look at the following issues:
- How will Open-IX and the launch of European-model exchanges impact the interconnection market?
- What are the networking and datacenter technologies that can disrupt this market?
- What are the advantages of Direct Connect services?
We know that DevOps principles and patterns have been pioneered by the “unicorns,” the likes of Google, Amazon, Facebook, Netflix, Twitter and so forth, doing tens, hundreds or even thousands of deployments per day, while preserving world-class availability, reliability and security. However, unique challenges exist when DevOps transformations are undertaken in large, complex organizations.
The unique challenges include legacy applications, lack of automated testing, tightly coupled architectures, operating in regulated industries, powerful change management approval boards, security and compliance requirements, low trust bureaucratic cultures, and so on.
However, large, complex organizations are successfully transforming using DevOps, such as GE, Macy’s, Ticketmaster/LiveNation, Barclay’s, Nordstorm, Target, Raytheon.
In this webinar, Damon Edwards, Gary Gruver, John Willis, and Gene Kim will share their experiences and lessons learned about the unique challenges and solutions of implementing DevOps in large, complex organizations. They will also include lessons learned from the DevOps Enterprise Summit 2014 and goals for the conference this year.
-- Gene Kim, CTO, Tripwire;
-- Damon Edwards, Managing Partner, DTO Solutions, Inc;
-- Gary Gruver, author and experience technologist in Continuous Delivery and DevOps;
-- John Willis, author and evangelist at Docker, Inc.
As communications service providers begin to transition network functions to the cloud to bring new and exciting real time communications services to market quickly and more efficiently, they are looking to key vendor ecosystems to help accelerate the deployments with integrated and differentiated network functions virtualization (NFV) and software defined networking (SDN) solutions that use open approaches.
This webinar demonstrates the power of solutions from vendor ecosystems and highlights the integration of differentiated network infrastructure products from leading vendors bringing unique, end-to-end Carrier Grade NFV solutions to market for service providers.
Tom Foremski with featured speakers from the Virtualization Summit
Silicon Valley Watcher editor Tom Foremski moderates a panel of featured speakers from BrightTALK's Virtualization Summit as they respond to questions and engage in a lively discussion of the ins and outs of virtualization.
Now, corporations truly understand that it’s not a matter of if a disaster will occur, but when. Hurricane Katrina is one example of a major disaster that has forced companies to pause and reevaluate their Disaster Recovery strategy. Virtualization technologies have created an affordable DR approach, yielding greater environment flexibility and mobility. However, many manual steps must still be taken to recover or failover an entire IT environment. VMware’s Site Recovery Manager (SRM) can automate most of those manual steps to provide a repeatable, reportable and recoverable solution to complement your corporate DR plan. This presentation will focus on the benefits of SRM and key points of consideration when looking to automate your DR steps.
While the cost, flexibility and scalability benefits of virtualization are undeniable, so are the systems and network management challenges created by the virtual data center. Cautionary tales abound, examples of organizations who have not just figured out how to manage their virtualized environments, but how to use management to maximize their performance and availability are still fewer than one would expect. In this Webcast, Javier Soltero, CEO of Hyperic will address best practices for managing and monitoring your virtualized data center, once created. He will also provide expert input on how to evaluate virtualization management tools, tricks for streamlining application-level management, common misperceptions and pitfalls that can be avoided and much more. Last he will offer clear cut examples of companies that have successfully overcome virtualization management hurdles.
Any IT transformation is complex and high risk, requiring significant change in technology, process and culture. This is why an incremental, plan-driven approach is critical for successful transformation. The Cloud Computing Adoption Model is a graduated, stepwise approach for adoption of cloud technologies. It helps to cut through the hype and lay out a clear game plan incrementing toward cloud without putting projects, budgets and even careers at risk based on a 5-step framework loosely modeled after the Capability Maturity Model (CMM) from the Software Engineering Institute (SEI) at Carnegie Mellon University. For each level, the Model outlines the strategic goals, key investment requirements, expected returns, risk factors, and readiness criteria for graduating to the next step.